Skip to main content

Threat of Social Media and Counter Measures - (PART-1)

Threat of Social Media and Counter Measures - (PART-1)



Today ,the on line social network users are facing prevalent and varied security and privacy threat,many software solutions  and techniques exist today,which can assist users  in better defending themselves against these threats.In addition to these solutions and techniques ,several easy to apply methods can be used by the people and their families to improve their security and privacy on Facebook and tweeter.all people and their families are obligated to safe guard their secrets and information.Additionally they are need to ensure the same for the their wards and families by emphasizing in the need to be extra cautious while using online social network.In this regard following counter measures are recommended

(1) Do not share personal related information unnecessary.All users and their families must review the detail they have mentioned in their on line social network accounts and remove all such information that reveals identity of their spouse or parents.

(2) There are many online social group related to negative activities which are used for undesirable discussion and sharing information.These groups are more vulnerable as joining them is relatively easy compared to joining a friend's list.More over ,profiling of like minded people also reduces workload of  hackers.Common people must avoid joining such groups.



(3) Do not accept Friendship from strangers.Fake profiles are quite common and often dangerous.Therefor if a person receives a friend request from  an unknown person ,ignore such a request even if you feel inclined and tempted to accept the request.If the person is uncertain and is considering  approving the friend request,perform a short background check on the new ''friend ''by inserting the friend's profile image to Google images search and submit the friend's full name and other details to other search engine  in order to validate the credibility of the individual.In order to identify and remove  strangers already  listed as friends with the users ,it is recommended that  users should examine their friend lists periodically and remove unknown people from friend's list.Additionally if parents want to better monitor their children's activity ,it is strongly recommended that they and their children scan the friend's list together in order to remove un welcomed stranger ''friends''.If you receive a friend's request from some one you do not know or recognize contact or e mail them directly before you make the decision to add them to your account or to your circle of trust.Ask how they know you and check if they are legitimate.Remember it is not only your privacy ,you are protecting but also that of all your friends.

(4) Always protect your E mail account.Try to use a disposable Email address for registering with social networking sites and and avoid using your real name for the address.To avoid giving away e mail addresses of your friends ,do not allow social networking services to scan your e mail address book .When you join new social net work ,you might receive an offer to enter your e mail address and pass word to find out if your any contact are on network.The site might use this information to send e mail messages to every one to your contact list or even every one you have sent an e mail using that e mail address.Social networking sites are bound to warn individuals of this fact ,but some do not.

(5) Privacy and security policy settings .Familiarize yourself with both the privacy settings and and the security policy of any social and professional networking site you use.If you are not happy with them ,stop using the site.Some of these settings and policies are changed and updated automatically by operators of the site without the consent of the users.Accordingly every one must review these settings  on regular basis.


(6) When you create your profile ,review each piece of information that you share and ascertain if it is really necessary or even relevant to that site.For example do you need to share telephone numbers while creating an e mail account?Certainly not.Think practically and do not complete a form just because it is in front of you.Even if it essential ,prefer feeding the dummy entries.       

(For more detail & information read its next part-2 )












       

Comments

Popular posts from this blog

THALASSEMIA AND COUSIN MARRIAGE

THALASSEMIA AND COUSIN MARRIAGE According to the latest medical research it is proved that Thalassamia is the inherited blood disorder due to abnormal condition of hemoglobin.Commonly this disease is inherited from parents and cousin marriage is also a vital cause behind this disease.More over i t’s due to either a genetic mutation or a deletion of certain key gene fragments.  .Basically this disease is divided into two main categories (a)  Alpha Thalassemia; In this category atleast one of the alpha globin genes has a mutation (b) Beta Thalassemia; In this category beta globin genes are affected As i already told you that Thalassemia is an inherited blood disorder in which Hemoglobin adopts the abnormal shape.In actual hemoglobin is found in red blood cell in the form of protein molecule and its function is to carry oxygen.Due to this disorder majority of the red blood cell are destroyed,consequently patient becomes victim of anemia.due to this anemi...

Tesla & BMW---Great Competition

Tesla & BMW---Great Competition It is very big news for fans of Tesla that company is going to release its mass market model 3 with in the forthcoming few month.More over the respective automaker is about to bring its related Giga factory online in Nevada in order to induct concern solar roof product so that Tesla energy business may be increased vastly.Model 3 is the hot and burning issue with price $35,000 prior to incentive .An other amazing news is that Tesla is launching a semi truck with an electric ,self driving in forthcoming September and according to the Elon Musk this pick up will follow within 18 to 24 months.But most exciting news for Tesla's lover is Tesla is about to launch a new roadster which will certainly be very sexy,thrilling.fast & furious connected with all necessary electric style roots.It can be converted into sports car which will have the quality to take the automaker back to its respective root.It is also known that this roadster was ...

The World's Fastest & Most Powerful Muscle Car Ever-2018-

The World's Fastest & Most Powerful Muscle Car Ever-2018- Dodge Challenger SRT Demon  The new and the latest Dodge Demon is so fast and powerful muscle car that ultimately NHRA had to banned officially.This amazing 2018 Dodge challenger SRT Demon is 840 horse power having torque of 770 pound from 6.2 liter HEMI  along with V-8 super charger engine are its some prominent features and specifications.From aforesaid specification and features we come to conclusion that it is not only the most powerful car ever but it consists of the highest horse power due to provision of  V-8 engine.More over this stunning car is also included a Guinness world Record due to its first ever front wheel lift in a production with small gap of tires  off the ground just 2.92 ft of driving distance which really amazing and stunning feature of this car There is no doubt that Dodge brought a revolution in the world of auto vehicle technology by giving amaz...