Social media security issues pdf

Social media its impact with positive and negative aspects. Enisa position paper for w3c workshop on the future of social networking author. Where can i learn more about the specific threats social media poses. The following is an excerpt from the book social media security. Following are some of the common social media security risks posed to both individuals and businesses in australia with a social media account. Once you post, that information has been seen by others and in some cases cannot be retracted. Specification about the tools that are and are not permitted for use on the corporate network. Introduction with the growth of social media websites, such as facebook, our privacy has become increasingly more vulnerable to surveillance and commodification.

The top 5 social media security risks you need to be aware of. Quite of enough literature is available in computer science libraries. The wide age range and technology experience level of social media users makes security management even more complex. Research into media effects and linking the media with social problems emerged for the most part in the united states following the rise of broadcasting and mass media in the 1920s and 1930s czitrom, 1983, but now the debate and literature is international in scope mcquail, 1994. Social media security risks and the tips to mitigate them. A study revealed that 42 percent of consumers who use social media for customer service issues expect a response from the business in an hour. Best practices for social media archiving and security. From a business perspective having a comprehensive social media policy and rigorous governance framework in place is fundamental. Simon parker has over 70 years of shared experience with minerva security, dealing with commercial business security and fire alarm systems.

Whereas such a policy needs to be simple and easy to understand, training staff provides them with an opportunity of actually learning how to enforce it. How social media analysis could support information operations dod defines io as the integrated employment, during military opera tions, of ircs informationrelated capabilities in concert with other. Social media is a platform for people to discuss their issues and opinions. Effective security and fraud prevention strategies cannot treat social media independently from other digital channels.

Social media its impact with positive and negative aspects shabnoor siddiqui mats university raipur c. Security issues with social networking sites by charlie r. Purpose the purpose of this paper is to examine social media security risks and existing mitigation techniques in order to gather insights and develop best practices to help organizations. Cyber security becomes an important field in the information technology. Social media security is the process of analyzing dynamic social media data in order to protect against security and business threats every industry faces a unique set of risks on social, many of which have put organizations in the press or at the center of controversy. A read is counted each time someone views a publication summary such as the title, abstract, and list of authors, clicks on a figure, or views or downloads the fulltext. Governments can do this by methodically implementing a public relations campaign that relies heavily on social media. Social media evolution facebook is one of the latest in a series of social media outlets six degrees by andrew weinrich, new york, early 1997 six degrees is the first social network black planet by omar wasow and benjamin sun, new york, 1999 black planet was launched to benefit africanamericans 4. Safety and security issues with the use of social media1. There are many cyber security issues with social media, but for every new threat, there is a potential solution. Giles hogben, enisa introduction this paper is based on work done by enisa in compiling its position paper on security issues and recommendations for online social networks 1 and subsequent dissemination work e.

Our use of social media supports our mission to deliver social security services that meet the changing needs of the public, and our vision to provide the highest standard of considerate and thoughtful service for generations to come. Pdf social media as business tool and security issues. First, a brief history and the concept of social networking will be introduced. Adopting the most potent social media security policies can be useless if the employees are ignorant of best usage practices. Only 18 percent of americans report changing their social media password regularly.

This chapter discusses how the positive and negative aspects of social media campaigns and how information available through social networks may not necessarily be accurate or in good taste. Some of the first empirical studies of the effects of film, for instance, criticized the cinema for promoting immorality, juvenile delinquency, and violence. The issues include privacy issues, identity theft issues, spam issues. See security executive agent directive 5 on collection, use, and retention of publicly available social media information in personnel security background investigations and adjudications, may 12, 2016. Security vulnerabilities are weaknesses in a computer system, software, or hardware that can be exploited by the attacker to gain unauthorized access or compromise a system.

Apr 27, 2012 the purpose of this paper is to examine social media security risks and existing mitigation techniques in order to gather insights and develop best practices to help organizations address social media security risks more effectively. Security and social media what are the real threats of. Trend micro maximum security secures multiple devices, helps manage passwords, and guards against the most prevalent online threats. Giles hogben, enisa introduction this paper is based on work done by enisa in compiling its position paper on security issues and. Effective and comprehensive security solutions can help you enjoy your digital life safely. Social media, webbased interactive technologies, and the paperwork reduction act omb memo dodd 5500. A comprehensive survey of different security and privacy threats that target every user of social networking sites. This paper presents several possible defense solutions to secure social network service. Identity thieves gather personal information from social media sites. We discuss different security and privacy threats in social network service.

Leveraging social networking while mitigating risk written by michael cross and published by syngress. Fortunately, common sense works against most of these risks. Facts reveal that the majority of social media users post risky information online, unaware of the privacy and security concerns. Abstractin this paper, the concept of security and privacy in social media, or social networking will be discussed. Social media website security centers for disease control. Social media is possibly the most vital sector of the internet, but, being open and social creates legitimate concerns about privacy and safety. Various threats that arise due to the sharing of multimedia content within a social networking site. Nowadays peoples all over the world are dependent on social media. Discuss current stateof theart defense solutions that can protect social network users from these threats. Social media, webbased interactive technologies, and the paperwork reduction act omb memo. Claywell web designer social media is possibly the most vital sector of the internet, but, being open and social creates legitimate concerns about privacy and safety. The issues include privacy issues, identity theft issues, spam issues, malware issues, and physical threats issues.

Mis security refers to measures put in place to protect information system resources from unauthorized access or being compromised. A survey of privacy and security issues in social networks. Headlines warning of online security breaches are just one reminder of the vulnerability of all websites, including social media outlets. Social networking sites and their security issues abhishek kumar, subham kumar gupta, animesh kumar rai, sapna sinha department of information technology, amity school of engineering and technology, amity university, noida, uttar pradesh abstract social networking sites offer a straightforward way for. Leveraging social networking while mitigating risk written by michael cross and published by.

Social networks, security, privacy, facebook and twitter. Social media security is the process of analyzing dynamic social media data in order to protect against security and business threats every industry faces a unique set of risks on social, many of which have put organizations in. Even if you have your account on the highest security settings, there are still ways for an. The purpose of this paper is to examine social media security risks and existing mitigation techniques in order to gather insights and develop best practices to help organizations address social media security risks more effectively.

Our use of social media supports our mission to deliver social security services that meet the changing needs of the public, and our vision to provide the highest standard of considerate and thoughtful service for. Secure your social media accounts with comprehensive and multilayered protection. Social media refers to the use of webbased and mobile. This column will address specifically safety and security of patient information with respect to the use of social media. With these social network characteristics and the more aggressiveness of attackers methods, privacy and security issues in social networks has become a critical issue in the cyber world. A novel research direction for security of social network service is presented. There are a multitude of issues when using social media including boundary issues, ethical issues, confidentiality issues, standard of care issues, and privacy issues. Because social media is our most public communication platform, we may be met with comments, direct messages dms, mentions, and fake accounts from customers, prospects, candidates, and malicious attackers. With value from microlevel personal networking to macrolevel outreach, social networking has become pervasive in peoples lives and is now becoming a significant driving force in business. Pdf cyber security and ethics on social media mudassir. This, combined with the multitude of social media platforms, makes it essential that local governments effectively campaign for new projects and proposals using social media to effectively disseminate information to the public.

What are some best practices for using social media. Security issues and challenges in social network service are studied. Many of the security risks associated with using social media are presented. Monitoring is a critical part of social media security. But the practice has apparently been adopted unevenly and on a limited basis. Filter what is posted about you and by whom by requiring permission before posts become visible. Therefore, this paper will present a survey on privacy and security issues that occur in online social networks. Today, social networking is as routine as sending an email at home or work. Security issues in the future of social networking enisa position paper for w3c workshop on the future of social networking author. Awareness of damaging media in big datasets most popular social networks and media sharing sites allow. Social media center for development of security excellence. Securing the individual and organization information become the biggest challenges in the present era. Social networks, particularly public ones, have become part of the fabric of how we communicate and collaborate as a society.

Weve recently seen hackers take over the twitter accounts of media outlets and large corporations, using them for anything from basic spam to drawing attention to global issues. Its easier than ever for a threat actor to impersonate a real person or company on every network that exists. Even if you have your account on the highest security settings, there are still ways for an identity thief to get your. Initial step was to find out available literature and select appropriate articles to answer question. Social media accounts are powerful tools in the wrong hands. A number of security issues related to getting information out to people and how these risks can be mitigated in a number of ways will also be discussed. Threat actors use the interconnectivity of todays digital world to increase their reach by using multiple channels to conduct fraud, distribute malware, and carry out other abusive activities. Iamnitchi online social networks and media 34 2017 121 such as privacy preserving social data publishing techniques 15, social graphbased techniques for mitigating sybil attacks 16, osn design issues for security and privacy requirements 17, or threats in osns 18, we address a larger spectrum of security and. Dont input, store, or post personal or sensitive information on social media platforms. The report begins by looking at the global context in which social security schemes are now operating and the relevance of. The social security administration ssa is committed to engaging the public. Iamnitchi online social networks and media 34 2017 121 such as privacy preserving social data publishing techniques 15, social graphbased techniques for mitigating sybil attacks 16, osn design issues for security and privacy requirements 17, or threats in osns 18, we address a larger spectrum of security and privacy.

A social platform needs to not only combat hackers, but also has to protect users whose personal security practices might be elementary. Best practices for social media archiving and security osterman research believes that all organizations should have a set of detailed and thorough social media policies that includes a number of things, including. The impact of social media on information security. Security issues with social networking sites lovetoknow.

344 911 1493 1168 249 1682 409 1455 1056 1288 579 1678 599 1227 1081 1024 1100 745 547 1615 1121 952 1371 83 253 19 661 1344 654 192 301 784 1638 522 1497 989 1249 921 1155 390 386 842 718 310 352 34