Social media security issues pdf

Apr 27, 2012 the purpose of this paper is to examine social media security risks and existing mitigation techniques in order to gather insights and develop best practices to help organizations address social media security risks more effectively. Because social media is our most public communication platform, we may be met with comments, direct messages dms, mentions, and fake accounts from customers, prospects, candidates, and malicious attackers. Our use of social media supports our mission to deliver social security services that meet the changing needs of the public, and our vision to provide the highest standard of considerate and thoughtful service for generations to come. This chapter discusses how the positive and negative aspects of social media campaigns and how information available through social networks may not necessarily be accurate or in good taste. Effective security and fraud prevention strategies cannot treat social media independently from other digital channels. Security issues with social networking sites lovetoknow. The report begins by looking at the global context in which social security schemes are now operating and the relevance of.

Social media center for development of security excellence. Security issues in the future of social networking enisa position paper for w3c workshop on the future of social networking author. Leveraging social networking while mitigating risk written by michael cross and published by syngress. Social networks, security, privacy, facebook and twitter. The following is an excerpt from the book social media security.

This, combined with the multitude of social media platforms, makes it essential that local governments effectively campaign for new projects and proposals using social media to effectively disseminate information to the public. A social platform needs to not only combat hackers, but also has to protect users whose personal security practices might be elementary. Mis security refers to measures put in place to protect information system resources from unauthorized access or being compromised. Following are some of the common social media security risks posed to both individuals and businesses in australia with a social media account. Cyber security becomes an important field in the information technology. A number of security issues related to getting information out to people and how these risks can be mitigated in a number of ways will also be discussed. Today, social networking is as routine as sending an email at home or work. Many of the security risks associated with using social media are presented. Secure your social media accounts with comprehensive and multilayered protection. Social media, webbased interactive technologies, and the paperwork reduction act omb memo. Since the uploading of this type of damaging media cannot be effectively prevented, awareness is the key issue in combating this emerging privacy problem. The issues include privacy issues, identity theft issues, spam issues, malware issues, and physical threats issues. Introduction with the growth of social media websites, such as facebook, our privacy has become increasingly more vulnerable to surveillance and commodification. Threat actors use the interconnectivity of todays digital world to increase their reach by using multiple channels to conduct fraud, distribute malware, and carry out other abusive activities.

Social media its impact with positive and negative aspects shabnoor siddiqui mats university raipur c. Awareness of damaging media in big datasets most popular social networks and media sharing sites allow. Our use of social media supports our mission to deliver social security services that meet the changing needs of the public, and our vision to provide the highest standard of considerate and thoughtful service for. Social media security risks and the tips to mitigate them. See security executive agent directive 5 on collection, use, and retention of publicly available social media information in personnel security background investigations and adjudications, may 12, 2016. Social media is possibly the most vital sector of the internet, but, being open and social creates legitimate concerns about privacy and safety. The impact of social media on information security.

Giles hogben, enisa introduction this paper is based on work done by enisa in compiling its position paper on security issues and recommendations for online social networks 1 and subsequent dissemination work e. With value from microlevel personal networking to macrolevel outreach, social networking has become pervasive in peoples lives and is now becoming a significant driving force in business. Social media security is the process of analyzing dynamic social media data in order to protect against security and business threats every industry faces a unique set of risks on social, many of which have put organizations in the press or at the center of controversy. Only 18 percent of americans report changing their social media password regularly. Adopting the most potent social media security policies can be useless if the employees are ignorant of best usage practices. A read is counted each time someone views a publication summary such as the title, abstract, and list of authors, clicks on a figure, or views or downloads the fulltext. Its easier than ever for a threat actor to impersonate a real person or company on every network that exists.

Claywell web designer social media is possibly the most vital sector of the internet, but, being open and social creates legitimate concerns about privacy and safety. Even if you have your account on the highest security settings, there are still ways for an identity thief to get your. Whereas such a policy needs to be simple and easy to understand, training staff provides them with an opportunity of actually learning how to enforce it. Effective and comprehensive security solutions can help you enjoy your digital life safely. Giles hogben, enisa introduction this paper is based on work done by enisa in compiling its position paper on security issues and. The motion picture research council funded the payne. Nowadays peoples all over the world are dependent on social media. Simon parker has over 70 years of shared experience with minerva security, dealing with commercial business security and fire alarm systems. Identity thieves gather personal information from social media sites. Fortunately, common sense works against most of these risks. This paper presents several possible defense solutions to secure social network service. Securing the individual and organization information become the biggest challenges in the present era.

Social networks, particularly public ones, have become part of the fabric of how we communicate and collaborate as a society. Pdf cyber security and ethics on social media mudassir. Where can i learn more about the specific threats social media poses. Social media website security centers for disease control. Abstractin this paper, the concept of security and privacy in social media, or social networking will be discussed. Once you post, that information has been seen by others and in some cases cannot be retracted. Dont input, store, or post personal or sensitive information on social media platforms. Social media refers to the use of webbased and mobile. A survey of privacy and security issues in social networks. Some of the first empirical studies of the effects of film, for instance, criticized the cinema for promoting immorality, juvenile delinquency, and violence. Security issues and challenges in social network service are studied. Various threats that arise due to the sharing of multimedia content within a social networking site.

Social media its impact with positive and negative aspects. Social media evolution facebook is one of the latest in a series of social media outlets six degrees by andrew weinrich, new york, early 1997 six degrees is the first social network black planet by omar wasow and benjamin sun, new york, 1999 black planet was launched to benefit africanamericans 4. The wide age range and technology experience level of social media users makes security management even more complex. Purpose the purpose of this paper is to examine social media security risks and existing mitigation techniques in order to gather insights and develop best practices to help organizations. This column will address specifically safety and security of patient information with respect to the use of social media. A study revealed that 42 percent of consumers who use social media for customer service issues expect a response from the business in an hour.

Therefore, this paper will present a survey on privacy and security issues that occur in online social networks. From a business perspective having a comprehensive social media policy and rigorous governance framework in place is fundamental. Social media is a platform for people to discuss their issues and opinions. What are some best practices for using social media. Research into media effects and linking the media with social problems emerged for the most part in the united states following the rise of broadcasting and mass media in the 1920s and 1930s czitrom, 1983, but now the debate and literature is international in scope mcquail, 1994.

The top 5 social media security risks you need to be aware of. Social media accounts are powerful tools in the wrong hands. First, a brief history and the concept of social networking will be introduced. The issues include privacy issues, identity theft issues, spam issues. Social networking sites and their security issues abhishek kumar, subham kumar gupta, animesh kumar rai, sapna sinha department of information technology, amity school of engineering and technology, amity university, noida, uttar pradesh abstract social networking sites offer a straightforward way for. Social media, webbased interactive technologies, and the paperwork reduction act omb memo dodd 5500. Discuss current stateof theart defense solutions that can protect social network users from these threats. There are many cyber security issues with social media, but for every new threat, there is a potential solution. Safety and security issues with the use of social media1.

Governments can do this by methodically implementing a public relations campaign that relies heavily on social media. Social media security is the process of analyzing dynamic social media data in order to protect against security and business threats every industry faces a unique set of risks on social, many of which have put organizations in. Security vulnerabilities are weaknesses in a computer system, software, or hardware that can be exploited by the attacker to gain unauthorized access or compromise a system. Leveraging social networking while mitigating risk written by michael cross and published by.

There are a multitude of issues when using social media including boundary issues, ethical issues, confidentiality issues, standard of care issues, and privacy issues. Iamnitchi online social networks and media 34 2017 121 such as privacy preserving social data publishing techniques 15, social graphbased techniques for mitigating sybil attacks 16, osn design issues for security and privacy requirements 17, or threats in osns 18, we address a larger spectrum of security and. Facts reveal that the majority of social media users post risky information online, unaware of the privacy and security concerns. Enisa position paper for w3c workshop on the future of social networking author. The report begins by looking at the global context in which social security schemes are now operating and the relevance of social security to the goal of decent work. A novel research direction for security of social network service is presented. Iamnitchi online social networks and media 34 2017 121 such as privacy preserving social data publishing techniques 15, social graphbased techniques for mitigating sybil attacks 16, osn design issues for security and privacy requirements 17, or threats in osns 18, we address a larger spectrum of security and privacy. Pdf social media as business tool and security issues. Security and social media what are the real threats of. The social security administration ssa is committed to engaging the public. Best practices for social media archiving and security osterman research believes that all organizations should have a set of detailed and thorough social media policies that includes a number of things, including. A comprehensive survey of different security and privacy threats that target every user of social networking sites. Even if you have your account on the highest security settings, there are still ways for an.

Specification about the tools that are and are not permitted for use on the corporate network. The purpose of this paper is to examine social media security risks and existing mitigation techniques in order to gather insights and develop best practices to help organizations address social media security risks more effectively. With these social network characteristics and the more aggressiveness of attackers methods, privacy and security issues in social networks has become a critical issue in the cyber world. Trend micro maximum security secures multiple devices, helps manage passwords, and guards against the most prevalent online threats. Monitoring is a critical part of social media security. Filter what is posted about you and by whom by requiring permission before posts become visible. Weve recently seen hackers take over the twitter accounts of media outlets and large corporations, using them for anything from basic spam to drawing attention to global issues. Headlines warning of online security breaches are just one reminder of the vulnerability of all websites, including social media outlets. Security issues with social networking sites by charlie r. How social media analysis could support information operations dod defines io as the integrated employment, during military opera tions, of ircs informationrelated capabilities in concert with other. We discuss different security and privacy threats in social network service. Best practices for social media archiving and security. Quite of enough literature is available in computer science libraries. But the practice has apparently been adopted unevenly and on a limited basis.

422 28 848 794 1268 1059 821 1296 462 488 1209 900 688 740 508 802 1123 714 80 875 1261 1071 1286 301 989 1146 719 237 349 1203 635 229 463 1024 733 157 255 886 255 920 743 1145 58 1262