Skip to main content

Threat of Social Media and Counter Measures - (PART-2)



Today ,the on line social network users are facing prevalent and varied security and privacy threat,many software solutions  and techniques exist today,which can assist users  in better defending themselves against these threats.In addition to these solutions and techniques ,several easy to apply methods can be used by the people and their families to improve their security and privacy on Facebook and tweeter.all people and their families are obligated to safe guard their secrets and information.Additionally they are need to ensure the same for the their wards and families by emphasizing in the need to be extra cautious while using online social network.In this regard following counter measures are recommended


(1) When you share contents ,chat,mail,or comments on other people's post or profiles never consider your communication to be personal or private.Even if you have made full use of the privacy settings available to you,you cannot be sure that your contents would not be copied or pasted,downloaded,or otherwise shared more widely without your knowledge by that friend.Assume that every thing you put on a social networking site is permanent.Even if you can delete your account ,any one on the internet can easily print photos or text or save images and videos to a computer.Be very selective about up loading images videos ,status updates and messages,even among trusted friends.Once circulated on line images/videos can be shared widely and can be extremely difficult to block or remove due to weak setting of one's friend.

(2)Most sites offer means to reset reset your pass word if you forget it .This is also one of the most common ways to break into account .If you are asked to provide answer to security question,consider whether the answer already secure.Secure means that you are the only person who can answer the question.If the possibility exist to create your own questions,use it,if you are obliged to answer more standard question such as first school,first pet ,remember the answer does not have to be the truth.It only has to be some thing you can remember.
(3) Do not single pass word for multiple different sites.With different passwords ,if password of one site is compromised then you are not to worry about the others.Create complex password using upper and lower case letters, numbers ans special characters such as $,% *&etc.Devise a way to differentiate your passwords for each site you use,for example putting the first and the last letters of the web site name at the beginning and end of your complex pass word.Simply create logic to remember your pass word.

(4) Try to minimize the  number of third party apps and services that you install  or allow to  access your system specially using smart phones and tablets.Learn how to remove or disallow them  and get rid of any that you no longer use .D o not forget even on twitter once you authorize  a service to access your account ;that permission remains active unless you manually remove it and and it also persists through password change.


(5) Do not click links in messages or wall posts ,even if those are sent to you by friends without checking from them whether they sent it.Few moments to check could save you from falling prey to phishing scam or or worms,infecting your computer.On confirmation.you could also be doing  a favor to your friend  by informing them that their account is compromised.


(6) Avoid using the geo-tagging features of Facebook or popular photo sharing site,because they may give away your current location to your adversaries or people you do not want to know your location.When not in use ,when must disable GPS functions on camera and smart phones and disable geo tagging when up loading photos on line.Serving personnel should check and ensure that GPS function of their smart phones etc is disabled ,as this may be used for tracking not only their own movement and location but also of their associates.

Conclusion:

On line social net works  have become part of our every day life and on the average ,most internet users spend more time on social networks than any other on line activity.These guidelines are formulated in order to educate personnel about various scenarios which threaten them and can jeopardize their identities,privacy,and well being both in the virtual as well as in the real world.More over certain threats that jeopardize the safety of children and teenagers on cyberspace are also emphasized.Some of the remedies and solutions to these threats ,which aim to protect the user's privacy and security,are also presented in this hand book.However the presented solutions are not magical anti dots which provide full protection to a user's privacy and security.In order to be well protected against various on line threat ,user need to employ multiple solutions and educate themselves with the latest threat and its counter measures.Before using social media networks ,one should get full knowledge of its security features for properly protecting his or her privacy.

It is strongly recommended that all people should not only adopt these recommendation but should also educate their families and wards about threats which can attract them and can potentially end up in a disaster.All personnel should very carefully consider and review what personal information is being revealed  about themselves,their friends and their work place by their family members,while using online social network.More over as parents we must educate our children to be aware of potential threats and teach them not to not to engage with strangers either in the real world or in the cyber world.If a users personal information falls into wrong hands ,it can cause massive damage  and in many cases there is no way to recapture what has been lost.

Comments

Popular posts from this blog

The World's Fastest & Most Powerful Muscle Car Ever-2018-

The World's Fastest & Most Powerful Muscle Car Ever-2018- Dodge Challenger SRT Demon  The new and the latest Dodge Demon is so fast and powerful muscle car that ultimately NHRA had to banned officially.This amazing 2018 Dodge challenger SRT Demon is 840 horse power having torque of 770 pound from 6.2 liter HEMI  along with V-8 super charger engine are its some prominent features and specifications.From aforesaid specification and features we come to conclusion that it is not only the most powerful car ever but it consists of the highest horse power due to provision of  V-8 engine.More over this stunning car is also included a Guinness world Record due to its first ever front wheel lift in a production with small gap of tires  off the ground just 2.92 ft of driving distance which really amazing and stunning feature of this car There is no doubt that Dodge brought a revolution in the world of auto vehicle technology by giving amaz...

THALASSEMIA AND COUSIN MARRIAGE

THALASSEMIA AND COUSIN MARRIAGE According to the latest medical research it is proved that Thalassamia is the inherited blood disorder due to abnormal condition of hemoglobin.Commonly this disease is inherited from parents and cousin marriage is also a vital cause behind this disease.More over i t’s due to either a genetic mutation or a deletion of certain key gene fragments.  .Basically this disease is divided into two main categories (a)  Alpha Thalassemia; In this category atleast one of the alpha globin genes has a mutation (b) Beta Thalassemia; In this category beta globin genes are affected As i already told you that Thalassemia is an inherited blood disorder in which Hemoglobin adopts the abnormal shape.In actual hemoglobin is found in red blood cell in the form of protein molecule and its function is to carry oxygen.Due to this disorder majority of the red blood cell are destroyed,consequently patient becomes victim of anemia.due to this anemi...

Tesla & BMW---Great Competition

Tesla & BMW---Great Competition It is very big news for fans of Tesla that company is going to release its mass market model 3 with in the forthcoming few month.More over the respective automaker is about to bring its related Giga factory online in Nevada in order to induct concern solar roof product so that Tesla energy business may be increased vastly.Model 3 is the hot and burning issue with price $35,000 prior to incentive .An other amazing news is that Tesla is launching a semi truck with an electric ,self driving in forthcoming September and according to the Elon Musk this pick up will follow within 18 to 24 months.But most exciting news for Tesla's lover is Tesla is about to launch a new roadster which will certainly be very sexy,thrilling.fast & furious connected with all necessary electric style roots.It can be converted into sports car which will have the quality to take the automaker back to its respective root.It is also known that this roadster was ...