Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Data protection in social networks Majidov Alisher & Muslimova Shirin B21-565 Plot: • 1. Intro • 2. What happens if data in social networks is not protected clearly • 3. How to protect • 4. Conclusion Intro The social networks websites used at global level represent the place where people interact online, discuss, exchange photos or music or share their experiences. Due to the fact that the information posted on the social networks websites become mainly accessible to the public, we have to pay extra care to the information that we disclose about us, which simply by becoming known to a large number of person can lead to the creation of a risk to privacy or even to the physical safety of a person. What happens if data in social networks is not protected clearly? Hackers can use social media data breaches to create detailed profiles of potential victims and conduct targeted phishing attacks. Some common reasons for hacking include basic bragging rights, curiosity, revenge, boredom, challenge, theft for financial gain, sabotage, vandalism, corporate espionage, blackmail, and extortion. Hackers are known to regularly cite these reasons to explain their behavior. How to protect? Some security tips and advices Site features Ensure you familiarize yourself with the social media site’s functionality before you broadcast or share any messages. You may consider customizing the privacy settings on your media to minimize personal information on the same platform. Adjust your Privacy Settings For every social media platform you are using, always check the default privacy settings on their site. Most default privacy settings on social media may permit the sharing of your information with other third-party online users. Avoid clickbait No social media will take responsibility for third-party apps. When prompted to ‘comment below to see magic’ or ‘check which celebrity you share a birthday with,’ avoid clicking these random baits. Some additional security tips: • Choose a “strong,” secure password. • Change your passwords frequently. • Avoid logging into public computers or using friends’ phones to log in to your social media accounts. • Use caution with public wireless connections when accessing your social media accounts. If possible, use a VPN. • Avoid using public or shared devices to access your social media accounts. • Avoid clicking on social media links, even the ones sent to you by a friend. • Secure your devices with password protection to protect your social media and other information in case they are stolen or lost. Conclusion In the future, social media apps may partly be required to protect their user’s privacy and keep them safe. But until then, you can take these steps to protect your own privacy.