Friday, March 15, 2019

Essay --

INTRODUCTIONSecurity threats are potential causes of unwanted hap which may result in becoming harmful to the system or organization and assets. The security threats are destruction, modification or unauthorized disclosure of information, destruction or loss of the IT assets, spam and malware.Social networking is a sanctified website or finish that enables substance abusers to informally communicate with individually other by posting, tweet, comment and share. Some example of neighborly networking site is Facebook, chitter, YouTube, Tumblr and LinkedIn.A social networking is built on trust. It is designed for communication that allows users to directly interact with each others. Social networking helps to form network of associates, friend, relatives and acquaintances. It enables users to share information about day-by-day life and have intimate relation with others. There are massive numbers of users in social media Facebook is the highest popular rate that has 1.15 billi on users and half(prenominal) of it penetration to the Facebook every day. Based on social media today until November 2013, there are to a greater extent than 10 one million million applications developed in Facebook. Twitter becomes the second most popular media social which has more than 500 million users and 288 million are active users. There are about 20 million fake accounts in Twitter. This number of social networking users will ontogeny in time. By this huge numbers of users in social media there is high risk for users to expose to the social networking threats. Cybercriminals have become more smart and crafty in manipulating with advance technology. It is abusing the users in social media by breaking the users trust. They take advantage of user relationship to click on malicious link or advertisement to get to the... ...ing and this gives the chances for malicious tie in and threats to disguise as one of the advertisement based on the user interest.User unknowingly will click on these links that popped up to close it, but some of them will already have the access to the user information. There are also bot accounts that will post their circumscribe to the users wall some even post the content to the users groups and friends when the user click on the link that offense their interest.2.Mobile platformThe increment of mobile phone users also inspires the growing of social media users. The rise of social media is inextricably linked with the revolution in mobile computing, which has spawned a huge industry in mobile application development. Naturally, whether using their own or company-issued mobile devices, the users will download more mobile applications just because they want to.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.