Threat of Social Media and Counter Measures - (PART-2)
Today ,the on line social network users are facing prevalent and varied security and privacy threat,many software solutions and techniques exist today,which can assist users in better defending themselves against these threats.In addition to these solutions and techniques ,several easy to apply methods can be used by the people and their families to improve their security and privacy on Facebook and tweeter.all people and their families are obligated to safe guard their secrets and information.Additionally they are need to ensure the same for the their wards and families by emphasizing in the need to be extra cautious while using online social network.In this regard following counter measures are recommended
(1) When you share contents ,chat,mail,or comments on other people's post or profiles never consider your communication to be personal or private.Even if you have made full use of the privacy settings available to you,you cannot be sure that your contents would not be copied or pasted,downloaded,or otherwise shared more widely without your knowledge by that friend.Assume that every thing you put on a social networking site is permanent.Even if you can delete your account ,any one on the internet can easily print photos or text or save images and videos to a computer.Be very selective about up loading images videos ,status updates and messages,even among trusted friends.Once circulated on line images/videos can be shared widely and can be extremely difficult to block or remove due to weak setting of one's friend.
(2)Most sites offer means to reset reset your pass word if you forget it .This is also one of the most common ways to break into account .If you are asked to provide answer to security question,consider whether the answer already secure.Secure means that you are the only person who can answer the question.If the possibility exist to create your own questions,use it,if you are obliged to answer more standard question such as first school,first pet ,remember the answer does not have to be the truth.It only has to be some thing you can remember.
(3) Do not single pass word for multiple different sites.With different passwords ,if password of one site is compromised then you are not to worry about the others.Create complex password using upper and lower case letters, numbers ans special characters such as $,% *&etc.Devise a way to differentiate your passwords for each site you use,for example putting the first and the last letters of the web site name at the beginning and end of your complex pass word.Simply create logic to remember your pass word.
(4) Try to minimize the number of third party apps and services that you install or allow to access your system specially using smart phones and tablets.Learn how to remove or disallow them and get rid of any that you no longer use .D o not forget even on twitter once you authorize a service to access your account ;that permission remains active unless you manually remove it and and it also persists through password change.
(5) Do not click links in messages or wall posts ,even if those are sent to you by friends without checking from them whether they sent it.Few moments to check could save you from falling prey to phishing scam or or worms,infecting your computer.On confirmation.you could also be doing a favor to your friend by informing them that their account is compromised.
(6) Avoid using the geo-tagging features of Facebook or popular photo sharing site,because they may give away your current location to your adversaries or people you do not want to know your location.When not in use ,when must disable GPS functions on camera and smart phones and disable geo tagging when up loading photos on line.Serving personnel should check and ensure that GPS function of their smart phones etc is disabled ,as this may be used for tracking not only their own movement and location but also of their associates.
It is strongly recommended that all people should not only adopt these recommendation but should also educate their families and wards about threats which can attract them and can potentially end up in a disaster.All personnel should very carefully consider and review what personal information is being revealed about themselves,their friends and their work place by their family members,while using online social network.More over as parents we must educate our children to be aware of potential threats and teach them not to not to engage with strangers either in the real world or in the cyber world.If a users personal information falls into wrong hands ,it can cause massive damage and in many cases there is no way to recapture what has been lost.
(3) Do not single pass word for multiple different sites.With different passwords ,if password of one site is compromised then you are not to worry about the others.Create complex password using upper and lower case letters, numbers ans special characters such as $,% *&etc.Devise a way to differentiate your passwords for each site you use,for example putting the first and the last letters of the web site name at the beginning and end of your complex pass word.Simply create logic to remember your pass word.
(4) Try to minimize the number of third party apps and services that you install or allow to access your system specially using smart phones and tablets.Learn how to remove or disallow them and get rid of any that you no longer use .D o not forget even on twitter once you authorize a service to access your account ;that permission remains active unless you manually remove it and and it also persists through password change.
(5) Do not click links in messages or wall posts ,even if those are sent to you by friends without checking from them whether they sent it.Few moments to check could save you from falling prey to phishing scam or or worms,infecting your computer.On confirmation.you could also be doing a favor to your friend by informing them that their account is compromised.
(6) Avoid using the geo-tagging features of Facebook or popular photo sharing site,because they may give away your current location to your adversaries or people you do not want to know your location.When not in use ,when must disable GPS functions on camera and smart phones and disable geo tagging when up loading photos on line.Serving personnel should check and ensure that GPS function of their smart phones etc is disabled ,as this may be used for tracking not only their own movement and location but also of their associates.
Conclusion:
On line social net works have become part of our every day life and on the average ,most internet users spend more time on social networks than any other on line activity.These guidelines are formulated in order to educate personnel about various scenarios which threaten them and can jeopardize their identities,privacy,and well being both in the virtual as well as in the real world.More over certain threats that jeopardize the safety of children and teenagers on cyberspace are also emphasized.Some of the remedies and solutions to these threats ,which aim to protect the user's privacy and security,are also presented in this hand book.However the presented solutions are not magical anti dots which provide full protection to a user's privacy and security.In order to be well protected against various on line threat ,user need to employ multiple solutions and educate themselves with the latest threat and its counter measures.Before using social media networks ,one should get full knowledge of its security features for properly protecting his or her privacy.It is strongly recommended that all people should not only adopt these recommendation but should also educate their families and wards about threats which can attract them and can potentially end up in a disaster.All personnel should very carefully consider and review what personal information is being revealed about themselves,their friends and their work place by their family members,while using online social network.More over as parents we must educate our children to be aware of potential threats and teach them not to not to engage with strangers either in the real world or in the cyber world.If a users personal information falls into wrong hands ,it can cause massive damage and in many cases there is no way to recapture what has been lost.
Comments
Post a Comment