SlideShare a Scribd company logo
Security and
Privacy in Social
Networks
Introduction of Social Network
 Social Networks are the most means of communication
used by a large number of people.
 Social Network refers to grouping of individuals and
organizations together via some medium, in order to
share thoughts, interests, and activities.
What is Social Network?
 Social networking is a web based
communication media, which allows
users to have conversations, share
information and many more.
 Social Networking is an online service
or website that focuses on building and
reflecting of social relations among
people.
Why to use Social Network?
 People may use social networking
services for different reasons like below
Reconnect with former friends.
Maintain current relationships.
Build or promote a business or
project.
Participate in discussions about a
certain topic.
Just have fun meeting.
Interacting with other users.
Matchmaking.
Entertainment Purpose
Social
Network
Sharing
information
Match
making
Business
Discussion
Social Networking Elements
 A Bounded set of users.
 Public or semipublic personal
profiles.
 Freedom to traverse lists of
connection(their own and
others).
 Definition of set of people
related to a person(friends,
relatives)
Some of the social Networking sites
How it all started?
 Many Social Networking websites were
launched in the 1990s.
 In India , ORKUT was the first social
networking website that actually attracted
users towards the idea of building up their
social networks.
 Orkut was launched in 2004, owned and
operated by Google Inc.It was one of the
most visited websites in India and Brazil.
 Orkut was followed by MySpace, Face
book, Twitter and now Google+
Types of social networks
 Social networks—Connect with people
Ex: Facebook, Twitter, LinkedIn
 Media sharing networks—Share photos, videos, and other
media
Ex: Instagram, Snapchat, YouTube
 Discussion forums—Share news and ideas
Ex: reddit, Quora, Digg
 Bookmarking and content creation networks—Discover,
save, and share new content
Ex: Pinterest, Flipboard
 Consumer review networks—Find and review businesses
Ex: Yelp, Zomato, TripAdvisor
Continue….
 Blogging and publishing networks—Publish content online
Ex: WordPress, Tumblr, Medium
 Interest-based networks—Share interests and hobbies
Ex: Goodreads, Houzz, Last.fm
 Social shopping networks—Shop online
Ex: Polyvore, Etsy, Fancy
 Sharing economy networks—Trade goods and services
Ex: Airbnb, Uber, Taskrabbit
 Anonymous social networks—Communicate anonymously
Ex: Whisper, Ask.fm, After School
Security of Social network
 Security is about the safeguarding of data
 Security refers to protection against the unauthorized access of
data.
 Security controls in place to limit who can access the information.
 Social Media Security is a process of eliminating security threats,
monitoring cyber security, protecting social assets.
Security Concerns
• Face book users access the system mostly using cell phones.
• This opens up free access to anyone getting hold of the cell
phone of a user without the need for user id and password.
• Face book gives an option to activate user id/ pwd but in reality
the users do not.
• By default the privacy settings are set to Public, meaning anyone
could see the profile and wall .
• Anyone in friends’ circle can post photos on your wall .
• ‘Check-in’ feature in Face book tells your friends your GPS
location.
• By changing Privacy Settings you can avoid getting tagged but it
does not happen.
Security Tips
 Update your security settings on all digital and social channel
regularly.
 Employ strong passwords.
 Don't just rely on default settings.
 Don't link personal and business accounts.
 Be mindful about what you share.
 Get rid of accounts that aren't in use.
 Beware of public wireless connections.
 Do not click any unknown or suspicious link.
Privacy
 Privacy is the ability of an individual or group to seclude(keep
someone away from others) themselves or information about
themselves and thereby reveal themselves selectively.
 Privacy is important thing in social network because, it gives us
the power to choose our thoughts and feelings and who we share
them with.
 Privacy protects our information we do not want shared publicly
(such as health or personal finances).
Privacy of Social Network
 Read and Understand the Privacy Terms & Site Features.
 Adjust your Privacy Settings & Account Information.
 Unknowingly he has compromised his privacy.
 Like Facebook, Twitter users are very less awareness in setting up
proper controls for friends or followers.
 Many feel proud that they have so many friends or followers.
 Following the tweets of others has become a major pastime for
many.
 Tweets reveal location information as well.
Privacy Protection tips
Use strong passwords, and don’t use the same password for
multiple accounts.
Don’t use social media on public devices, and if you must, make
sure to log out afterward.
Disable access to location data for your social media apps.
Be ware about clicking links from friends in social media; you
never know if they’ve been hacked.
Use two-factor authentication or password-reset checks for all your
accounts.
Even on your private social profiles, keep personal information to a
Minimum.
Read the privacy policy of social networking sites.
Do not add people that you don’t know or trust.
Growth of social network
Gender wise usage of Social Network
Growth of Social Media Users in India
Growth of Social Media Users in the world
Social Networks and its risks
General Tips
 Become familiar with the privacy settings available
on any social network you use.
 Don’t share your birthday, age or place of birth.
 Don’t post your address, phone number or email
address on a social network.
 Don’t publicize vacation plans.
 Use caution when using third-party applications.
 Be wary of request for money.
 Take additional precautions if you are the victim of
stalking, harassment or domestic violence.
Features of Social Network
Helps keeping in Touch with friends and family.
Reach easily to a large group of people for a shout out
on important topics.
Instant News and Information.
Great Marketing Channel for Business
Awareness and Activism.
Exchange of ideas and collaboration
Stay in touch
Conclusion
 We can see clearly that social networking sites are
advantageous only if they are used wisely. Using these
sites securely would be helpful, if user do not spend
time unnecessarily. Wise members never provide
personal information to strangers. Use of a tool
depends on users.
Ex – A doctor can operate with a knife and a murderer
can kill a person with the same knife.
References
1. https://www.slideshare.net/MarketingatBahrain/social-network-security-
14345886?next_slideshow=1
2. https://www.slideshare.net/shakiblimon/social-networking-security-
64803987
3. https://slideplayer.com/slide/16246911/
4. https://csrc.nist.gov/CSRC/media/Presentations/Social-Media-Security-
Protecting-Privacy/images-media/fissea-conference-2012_srinivasan.pdf
5. http://www.gfi.com/whitepapers/Social_Networking_and_Security_Risks
.pdf
6. http://pewresearch.org/pubs/2131/social-media-facebook-twitter-
myspace-linkedin
7. https://www.slideshare.net/krk1995/social-networking-ppt-33957099
8. https://www.slideshare.net/MohitKhurana4/social-networking-10073899
Security and Privacy in Social Networks.pptx

More Related Content

What's hot

grid computing
grid computinggrid computing
grid computing
rock om
 
Basics of IP Addressing
Basics of IP AddressingBasics of IP Addressing
Basics of IP Addressing
Kushal Sheth
 
Presentation on router
Presentation on routerPresentation on router
Presentation on router
Iqra university islamabad
 
Packet switching
Packet switchingPacket switching
Packet switching
asimnawaz54
 
Weather Display app
Weather Display appWeather Display app
Weather Display app
Taresh Khandekar
 
Share Files Using LAN.pptx
Share Files Using LAN.pptxShare Files Using LAN.pptx
Share Files Using LAN.pptx
Jaffer Haadi
 
Introduction to TCP/IP
Introduction to TCP/IPIntroduction to TCP/IP
Introduction to TCP/IP
Michael Lamont
 
Basics Of Networking (Overview)
Basics Of Networking (Overview)Basics Of Networking (Overview)
Basics Of Networking (Overview)
ashiesh0007
 
Introduction to iOS Apps Development
Introduction to iOS Apps DevelopmentIntroduction to iOS Apps Development
Introduction to iOS Apps Development
Prof. Erwin Globio
 
Apache web server
Apache web serverApache web server
Apache web server
Sabiha M
 
Osi Model Interview Questions & Answers
Osi Model Interview Questions & AnswersOsi Model Interview Questions & Answers
Osi Model Interview Questions & Answers
All About Testing
 
Ports and protocols
Ports and protocolsPorts and protocols
Ports and protocols
siva rama
 
Python for IoT
Python for IoTPython for IoT
Python for IoT
Selvaraj Seerangan
 
04 Client Server Technology
04 Client Server Technology04 Client Server Technology
04 Client Server Technology
Laguna State Polytechnic University
 
iso osi model
 iso osi model iso osi model
iso osi model
vishnu1204
 
The Uses Of Internet
The Uses Of InternetThe Uses Of Internet
The Uses Of Internet
Emil Ignetius Mankhin
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
Jagriti Rai
 
Advanced computer network lab manual (practicals in Cisco Packet tracer)
Advanced computer network lab manual (practicals in Cisco Packet tracer)Advanced computer network lab manual (practicals in Cisco Packet tracer)
Advanced computer network lab manual (practicals in Cisco Packet tracer)
VrundaBhavsar
 
[PPT] _ Unit 2 _ 9.0 _ Domain Specific IoT _Home Automation.pdf
[PPT] _ Unit 2 _ 9.0 _ Domain Specific IoT _Home Automation.pdf[PPT] _ Unit 2 _ 9.0 _ Domain Specific IoT _Home Automation.pdf
[PPT] _ Unit 2 _ 9.0 _ Domain Specific IoT _Home Automation.pdf
Selvaraj Seerangan
 
fog computing ppt
fog computing ppt fog computing ppt
fog computing ppt
sravya raju
 

What's hot (20)

grid computing
grid computinggrid computing
grid computing
 
Basics of IP Addressing
Basics of IP AddressingBasics of IP Addressing
Basics of IP Addressing
 
Presentation on router
Presentation on routerPresentation on router
Presentation on router
 
Packet switching
Packet switchingPacket switching
Packet switching
 
Weather Display app
Weather Display appWeather Display app
Weather Display app
 
Share Files Using LAN.pptx
Share Files Using LAN.pptxShare Files Using LAN.pptx
Share Files Using LAN.pptx
 
Introduction to TCP/IP
Introduction to TCP/IPIntroduction to TCP/IP
Introduction to TCP/IP
 
Basics Of Networking (Overview)
Basics Of Networking (Overview)Basics Of Networking (Overview)
Basics Of Networking (Overview)
 
Introduction to iOS Apps Development
Introduction to iOS Apps DevelopmentIntroduction to iOS Apps Development
Introduction to iOS Apps Development
 
Apache web server
Apache web serverApache web server
Apache web server
 
Osi Model Interview Questions & Answers
Osi Model Interview Questions & AnswersOsi Model Interview Questions & Answers
Osi Model Interview Questions & Answers
 
Ports and protocols
Ports and protocolsPorts and protocols
Ports and protocols
 
Python for IoT
Python for IoTPython for IoT
Python for IoT
 
04 Client Server Technology
04 Client Server Technology04 Client Server Technology
04 Client Server Technology
 
iso osi model
 iso osi model iso osi model
iso osi model
 
The Uses Of Internet
The Uses Of InternetThe Uses Of Internet
The Uses Of Internet
 
Cloud computing ppt
Cloud computing pptCloud computing ppt
Cloud computing ppt
 
Advanced computer network lab manual (practicals in Cisco Packet tracer)
Advanced computer network lab manual (practicals in Cisco Packet tracer)Advanced computer network lab manual (practicals in Cisco Packet tracer)
Advanced computer network lab manual (practicals in Cisco Packet tracer)
 
[PPT] _ Unit 2 _ 9.0 _ Domain Specific IoT _Home Automation.pdf
[PPT] _ Unit 2 _ 9.0 _ Domain Specific IoT _Home Automation.pdf[PPT] _ Unit 2 _ 9.0 _ Domain Specific IoT _Home Automation.pdf
[PPT] _ Unit 2 _ 9.0 _ Domain Specific IoT _Home Automation.pdf
 
fog computing ppt
fog computing ppt fog computing ppt
fog computing ppt
 

Similar to Security and Privacy in Social Networks.pptx

IS SOCIAL PRIVACY POSSIBLE?
IS SOCIAL PRIVACY POSSIBLE?IS SOCIAL PRIVACY POSSIBLE?
IS SOCIAL PRIVACY POSSIBLE?
StuartJDavidson.com
 
Social Networking
Social NetworkingSocial Networking
Social Networking
Marthamcameron
 
Social network privacy.
Social network privacy.Social network privacy.
Social network privacy.
STO STRATEGY
 
Social network privacy
Social network privacySocial network privacy
Social network privacy
STO STRATEGY
 
Social networking
Social networkingSocial networking
Social networking
akshay kumar
 
Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235
brendaylo
 
Week 8 assignment final project
Week 8 assignment final projectWeek 8 assignment final project
Week 8 assignment final project
Ezequiel Miranda
 
advantagesanddisadvantagesofsocialmedia-151211192046.pdf
advantagesanddisadvantagesofsocialmedia-151211192046.pdfadvantagesanddisadvantagesofsocialmedia-151211192046.pdf
advantagesanddisadvantagesofsocialmedia-151211192046.pdf
RinkiSharma51
 
advantagesanddisadvantagesofsocialmedia-151211192046.pptx
advantagesanddisadvantagesofsocialmedia-151211192046.pptxadvantagesanddisadvantagesofsocialmedia-151211192046.pptx
advantagesanddisadvantagesofsocialmedia-151211192046.pptx
Himabindu905359
 
Advantages and disadvantages of social media
Advantages and disadvantages of social mediaAdvantages and disadvantages of social media
Advantages and disadvantages of social media
Alan Raj
 
Advantages and disadvantages of social media
Advantages and disadvantages of social mediaAdvantages and disadvantages of social media
Advantages and disadvantages of social media
Alan Raj
 
SOCIAL NETWORKING.pptx
SOCIAL NETWORKING.pptxSOCIAL NETWORKING.pptx
SOCIAL NETWORKING.pptx
kanikavishwakarma1
 
Sociial media
Sociial media Sociial media
Sociial media
ANMOLKUMARSINGH5
 
Social media Challenges and Advantage
Social media Challenges and AdvantageSocial media Challenges and Advantage
Social media Challenges and Advantage
Techno World 4 U
 
Social Media.pptx
Social Media.pptxSocial Media.pptx
Social Media.pptx
AnushaMasood1
 
Social Media.pptx
Social Media.pptxSocial Media.pptx
Social Media.pptx
AnushaMasood1
 
socialmediapowerpointpresentation-190930121315_221119_171539.pptx
socialmediapowerpointpresentation-190930121315_221119_171539.pptxsocialmediapowerpointpresentation-190930121315_221119_171539.pptx
socialmediapowerpointpresentation-190930121315_221119_171539.pptx
ssuser196c47
 
social Media Power Point Presentation.pptx
social Media Power Point Presentation.pptxsocial Media Power Point Presentation.pptx
social Media Power Point Presentation.pptx
PrashanthReddyTirlap
 
socialmediapowerpointpresentation-190930121315 (1).pptx
socialmediapowerpointpresentation-190930121315 (1).pptxsocialmediapowerpointpresentation-190930121315 (1).pptx
socialmediapowerpointpresentation-190930121315 (1).pptx
DipeshYadav59
 
Social media powerpoint presentation
Social media powerpoint presentationSocial media powerpoint presentation
Social media powerpoint presentation
Slideegg
 

Similar to Security and Privacy in Social Networks.pptx (20)

IS SOCIAL PRIVACY POSSIBLE?
IS SOCIAL PRIVACY POSSIBLE?IS SOCIAL PRIVACY POSSIBLE?
IS SOCIAL PRIVACY POSSIBLE?
 
Social Networking
Social NetworkingSocial Networking
Social Networking
 
Social network privacy.
Social network privacy.Social network privacy.
Social network privacy.
 
Social network privacy
Social network privacySocial network privacy
Social network privacy
 
Social networking
Social networkingSocial networking
Social networking
 
Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235
 
Week 8 assignment final project
Week 8 assignment final projectWeek 8 assignment final project
Week 8 assignment final project
 
advantagesanddisadvantagesofsocialmedia-151211192046.pdf
advantagesanddisadvantagesofsocialmedia-151211192046.pdfadvantagesanddisadvantagesofsocialmedia-151211192046.pdf
advantagesanddisadvantagesofsocialmedia-151211192046.pdf
 
advantagesanddisadvantagesofsocialmedia-151211192046.pptx
advantagesanddisadvantagesofsocialmedia-151211192046.pptxadvantagesanddisadvantagesofsocialmedia-151211192046.pptx
advantagesanddisadvantagesofsocialmedia-151211192046.pptx
 
Advantages and disadvantages of social media
Advantages and disadvantages of social mediaAdvantages and disadvantages of social media
Advantages and disadvantages of social media
 
Advantages and disadvantages of social media
Advantages and disadvantages of social mediaAdvantages and disadvantages of social media
Advantages and disadvantages of social media
 
SOCIAL NETWORKING.pptx
SOCIAL NETWORKING.pptxSOCIAL NETWORKING.pptx
SOCIAL NETWORKING.pptx
 
Sociial media
Sociial media Sociial media
Sociial media
 
Social media Challenges and Advantage
Social media Challenges and AdvantageSocial media Challenges and Advantage
Social media Challenges and Advantage
 
Social Media.pptx
Social Media.pptxSocial Media.pptx
Social Media.pptx
 
Social Media.pptx
Social Media.pptxSocial Media.pptx
Social Media.pptx
 
socialmediapowerpointpresentation-190930121315_221119_171539.pptx
socialmediapowerpointpresentation-190930121315_221119_171539.pptxsocialmediapowerpointpresentation-190930121315_221119_171539.pptx
socialmediapowerpointpresentation-190930121315_221119_171539.pptx
 
social Media Power Point Presentation.pptx
social Media Power Point Presentation.pptxsocial Media Power Point Presentation.pptx
social Media Power Point Presentation.pptx
 
socialmediapowerpointpresentation-190930121315 (1).pptx
socialmediapowerpointpresentation-190930121315 (1).pptxsocialmediapowerpointpresentation-190930121315 (1).pptx
socialmediapowerpointpresentation-190930121315 (1).pptx
 
Social media powerpoint presentation
Social media powerpoint presentationSocial media powerpoint presentation
Social media powerpoint presentation
 

More from SIMNchannel

DBMS.pptx
DBMS.pptxDBMS.pptx
DBMS.pptx
SIMNchannel
 
Windows Operating system.pptx
Windows  Operating system.pptxWindows  Operating system.pptx
Windows Operating system.pptx
SIMNchannel
 
Operating System - DOS.pptx
Operating System - DOS.pptxOperating System - DOS.pptx
Operating System - DOS.pptx
SIMNchannel
 
Introduction to computer.pptx
Introduction to computer.pptxIntroduction to computer.pptx
Introduction to computer.pptx
SIMNchannel
 
Internet.pptx
Internet.pptxInternet.pptx
Internet.pptx
SIMNchannel
 
network.pptx
network.pptxnetwork.pptx
network.pptx
SIMNchannel
 
Microsoft Excel.pptx
Microsoft Excel.pptxMicrosoft Excel.pptx
Microsoft Excel.pptx
SIMNchannel
 
Multimedia.pptx
Multimedia.pptxMultimedia.pptx
Multimedia.pptx
SIMNchannel
 

More from SIMNchannel (8)

DBMS.pptx
DBMS.pptxDBMS.pptx
DBMS.pptx
 
Windows Operating system.pptx
Windows  Operating system.pptxWindows  Operating system.pptx
Windows Operating system.pptx
 
Operating System - DOS.pptx
Operating System - DOS.pptxOperating System - DOS.pptx
Operating System - DOS.pptx
 
Introduction to computer.pptx
Introduction to computer.pptxIntroduction to computer.pptx
Introduction to computer.pptx
 
Internet.pptx
Internet.pptxInternet.pptx
Internet.pptx
 
network.pptx
network.pptxnetwork.pptx
network.pptx
 
Microsoft Excel.pptx
Microsoft Excel.pptxMicrosoft Excel.pptx
Microsoft Excel.pptx
 
Multimedia.pptx
Multimedia.pptxMultimedia.pptx
Multimedia.pptx
 

Recently uploaded

youtube ideas- 50+, ty niche ideas- with and without face channels
youtube ideas- 50+, ty niche ideas- with and without face channelsyoutube ideas- 50+, ty niche ideas- with and without face channels
youtube ideas- 50+, ty niche ideas- with and without face channels
DevangParab2
 
LinkedIn Success Starts Here............
LinkedIn Success Starts Here............LinkedIn Success Starts Here............
LinkedIn Success Starts Here............
SocioCosmos
 
Digital Marketing Metrics and Analytics.
Digital Marketing Metrics and Analytics.Digital Marketing Metrics and Analytics.
Digital Marketing Metrics and Analytics.
coderegular349
 
Reflection on Human Intelligence vs Artificial Intelligence and the Digital S...
Reflection on Human Intelligence vs Artificial Intelligence and the Digital S...Reflection on Human Intelligence vs Artificial Intelligence and the Digital S...
Reflection on Human Intelligence vs Artificial Intelligence and the Digital S...
AJHSSR Journal
 
AI digital Marketing.pdf584537435404903950340vhot4
AI digital Marketing.pdf584537435404903950340vhot4AI digital Marketing.pdf584537435404903950340vhot4
AI digital Marketing.pdf584537435404903950340vhot4
rohitbaghel333622
 
The Ultimate Guide to Best IPTV Services.pdf
The Ultimate Guide to Best IPTV Services.pdfThe Ultimate Guide to Best IPTV Services.pdf
The Ultimate Guide to Best IPTV Services.pdf
vrushika
 
Boost Your Facebook Reach Effortlessly..
Boost Your Facebook Reach Effortlessly..Boost Your Facebook Reach Effortlessly..
Boost Your Facebook Reach Effortlessly..
SocioCosmos
 
The Influence of Work-Life Balance, Spirituality, And Work Environment on Emp...
The Influence of Work-Life Balance, Spirituality, And Work Environment on Emp...The Influence of Work-Life Balance, Spirituality, And Work Environment on Emp...
The Influence of Work-Life Balance, Spirituality, And Work Environment on Emp...
AJHSSR Journal
 
Implement Strategies Now!...............
Implement Strategies Now!...............Implement Strategies Now!...............
Implement Strategies Now!...............
biopower2024
 
Podcasting for Beginners Learn how to Launch and Profit from Your Show.pdf
Podcasting for Beginners Learn how to Launch and Profit from Your Show.pdfPodcasting for Beginners Learn how to Launch and Profit from Your Show.pdf
Podcasting for Beginners Learn how to Launch and Profit from Your Show.pdf
IkennaMichaelOdinkon
 
Social Media Growth Guide -- Juntire.com
Social Media Growth Guide -- Juntire.comSocial Media Growth Guide -- Juntire.com
Fresh Perspectives, Exceptional results!
Fresh Perspectives, Exceptional results!Fresh Perspectives, Exceptional results!
Fresh Perspectives, Exceptional results!
bt3288620
 
Dynamics of Competency-Based Bumn Leadership Selection Processin The Era of G...
Dynamics of Competency-Based Bumn Leadership Selection Processin The Era of G...Dynamics of Competency-Based Bumn Leadership Selection Processin The Era of G...
Dynamics of Competency-Based Bumn Leadership Selection Processin The Era of G...
AJHSSR Journal
 
Transform Waste into Energy.............
Transform Waste into Energy.............Transform Waste into Energy.............
Transform Waste into Energy.............
biopower2024
 
THE RELATIONSHIP BETWEEN OPTIMISM ANDPSYCHOLOGICAL WELL-BEING OF CLASS X STUD...
THE RELATIONSHIP BETWEEN OPTIMISM ANDPSYCHOLOGICAL WELL-BEING OF CLASS X STUD...THE RELATIONSHIP BETWEEN OPTIMISM ANDPSYCHOLOGICAL WELL-BEING OF CLASS X STUD...
THE RELATIONSHIP BETWEEN OPTIMISM ANDPSYCHOLOGICAL WELL-BEING OF CLASS X STUD...
AJHSSR Journal
 
Cal Girls Hotel Eurasia Jaipur | 08445551418 | Rajni High Profile Girls Call ...
Cal Girls Hotel Eurasia Jaipur | 08445551418 | Rajni High Profile Girls Call ...Cal Girls Hotel Eurasia Jaipur | 08445551418 | Rajni High Profile Girls Call ...
Cal Girls Hotel Eurasia Jaipur | 08445551418 | Rajni High Profile Girls Call ...
coroxab307
 
Social Media's Hidden Toll on Teens: A Guide for Concerned Parents
Social Media's Hidden Toll on Teens: A Guide for Concerned ParentsSocial Media's Hidden Toll on Teens: A Guide for Concerned Parents
Social Media's Hidden Toll on Teens: A Guide for Concerned Parents
Amanda Daniels
 
Joe Setley on Building and Engaging a Worldwide Boxing Fan Base for Top Rank ...
Joe Setley on Building and Engaging a Worldwide Boxing Fan Base for Top Rank ...Joe Setley on Building and Engaging a Worldwide Boxing Fan Base for Top Rank ...
Joe Setley on Building and Engaging a Worldwide Boxing Fan Base for Top Rank ...
Neil Horowitz
 
The Best Digital Marketing Agency In India - Ranksrush.pdf
The Best Digital Marketing Agency In India - Ranksrush.pdfThe Best Digital Marketing Agency In India - Ranksrush.pdf
The Best Digital Marketing Agency In India - Ranksrush.pdf
Ranksrush the best Digital Marketing Agency in India
 
Exploring the Impact of Leadership Style and Organizational Culture on Turnov...
Exploring the Impact of Leadership Style and Organizational Culture on Turnov...Exploring the Impact of Leadership Style and Organizational Culture on Turnov...
Exploring the Impact of Leadership Style and Organizational Culture on Turnov...
AJHSSR Journal
 

Recently uploaded (20)

youtube ideas- 50+, ty niche ideas- with and without face channels
youtube ideas- 50+, ty niche ideas- with and without face channelsyoutube ideas- 50+, ty niche ideas- with and without face channels
youtube ideas- 50+, ty niche ideas- with and without face channels
 
LinkedIn Success Starts Here............
LinkedIn Success Starts Here............LinkedIn Success Starts Here............
LinkedIn Success Starts Here............
 
Digital Marketing Metrics and Analytics.
Digital Marketing Metrics and Analytics.Digital Marketing Metrics and Analytics.
Digital Marketing Metrics and Analytics.
 
Reflection on Human Intelligence vs Artificial Intelligence and the Digital S...
Reflection on Human Intelligence vs Artificial Intelligence and the Digital S...Reflection on Human Intelligence vs Artificial Intelligence and the Digital S...
Reflection on Human Intelligence vs Artificial Intelligence and the Digital S...
 
AI digital Marketing.pdf584537435404903950340vhot4
AI digital Marketing.pdf584537435404903950340vhot4AI digital Marketing.pdf584537435404903950340vhot4
AI digital Marketing.pdf584537435404903950340vhot4
 
The Ultimate Guide to Best IPTV Services.pdf
The Ultimate Guide to Best IPTV Services.pdfThe Ultimate Guide to Best IPTV Services.pdf
The Ultimate Guide to Best IPTV Services.pdf
 
Boost Your Facebook Reach Effortlessly..
Boost Your Facebook Reach Effortlessly..Boost Your Facebook Reach Effortlessly..
Boost Your Facebook Reach Effortlessly..
 
The Influence of Work-Life Balance, Spirituality, And Work Environment on Emp...
The Influence of Work-Life Balance, Spirituality, And Work Environment on Emp...The Influence of Work-Life Balance, Spirituality, And Work Environment on Emp...
The Influence of Work-Life Balance, Spirituality, And Work Environment on Emp...
 
Implement Strategies Now!...............
Implement Strategies Now!...............Implement Strategies Now!...............
Implement Strategies Now!...............
 
Podcasting for Beginners Learn how to Launch and Profit from Your Show.pdf
Podcasting for Beginners Learn how to Launch and Profit from Your Show.pdfPodcasting for Beginners Learn how to Launch and Profit from Your Show.pdf
Podcasting for Beginners Learn how to Launch and Profit from Your Show.pdf
 
Social Media Growth Guide -- Juntire.com
Social Media Growth Guide -- Juntire.comSocial Media Growth Guide -- Juntire.com
Social Media Growth Guide -- Juntire.com
 
Fresh Perspectives, Exceptional results!
Fresh Perspectives, Exceptional results!Fresh Perspectives, Exceptional results!
Fresh Perspectives, Exceptional results!
 
Dynamics of Competency-Based Bumn Leadership Selection Processin The Era of G...
Dynamics of Competency-Based Bumn Leadership Selection Processin The Era of G...Dynamics of Competency-Based Bumn Leadership Selection Processin The Era of G...
Dynamics of Competency-Based Bumn Leadership Selection Processin The Era of G...
 
Transform Waste into Energy.............
Transform Waste into Energy.............Transform Waste into Energy.............
Transform Waste into Energy.............
 
THE RELATIONSHIP BETWEEN OPTIMISM ANDPSYCHOLOGICAL WELL-BEING OF CLASS X STUD...
THE RELATIONSHIP BETWEEN OPTIMISM ANDPSYCHOLOGICAL WELL-BEING OF CLASS X STUD...THE RELATIONSHIP BETWEEN OPTIMISM ANDPSYCHOLOGICAL WELL-BEING OF CLASS X STUD...
THE RELATIONSHIP BETWEEN OPTIMISM ANDPSYCHOLOGICAL WELL-BEING OF CLASS X STUD...
 
Cal Girls Hotel Eurasia Jaipur | 08445551418 | Rajni High Profile Girls Call ...
Cal Girls Hotel Eurasia Jaipur | 08445551418 | Rajni High Profile Girls Call ...Cal Girls Hotel Eurasia Jaipur | 08445551418 | Rajni High Profile Girls Call ...
Cal Girls Hotel Eurasia Jaipur | 08445551418 | Rajni High Profile Girls Call ...
 
Social Media's Hidden Toll on Teens: A Guide for Concerned Parents
Social Media's Hidden Toll on Teens: A Guide for Concerned ParentsSocial Media's Hidden Toll on Teens: A Guide for Concerned Parents
Social Media's Hidden Toll on Teens: A Guide for Concerned Parents
 
Joe Setley on Building and Engaging a Worldwide Boxing Fan Base for Top Rank ...
Joe Setley on Building and Engaging a Worldwide Boxing Fan Base for Top Rank ...Joe Setley on Building and Engaging a Worldwide Boxing Fan Base for Top Rank ...
Joe Setley on Building and Engaging a Worldwide Boxing Fan Base for Top Rank ...
 
The Best Digital Marketing Agency In India - Ranksrush.pdf
The Best Digital Marketing Agency In India - Ranksrush.pdfThe Best Digital Marketing Agency In India - Ranksrush.pdf
The Best Digital Marketing Agency In India - Ranksrush.pdf
 
Exploring the Impact of Leadership Style and Organizational Culture on Turnov...
Exploring the Impact of Leadership Style and Organizational Culture on Turnov...Exploring the Impact of Leadership Style and Organizational Culture on Turnov...
Exploring the Impact of Leadership Style and Organizational Culture on Turnov...
 

Security and Privacy in Social Networks.pptx

  • 1. Security and Privacy in Social Networks
  • 2. Introduction of Social Network  Social Networks are the most means of communication used by a large number of people.  Social Network refers to grouping of individuals and organizations together via some medium, in order to share thoughts, interests, and activities.
  • 3. What is Social Network?  Social networking is a web based communication media, which allows users to have conversations, share information and many more.  Social Networking is an online service or website that focuses on building and reflecting of social relations among people.
  • 4. Why to use Social Network?  People may use social networking services for different reasons like below Reconnect with former friends. Maintain current relationships. Build or promote a business or project. Participate in discussions about a certain topic. Just have fun meeting. Interacting with other users. Matchmaking. Entertainment Purpose Social Network Sharing information Match making Business Discussion
  • 5. Social Networking Elements  A Bounded set of users.  Public or semipublic personal profiles.  Freedom to traverse lists of connection(their own and others).  Definition of set of people related to a person(friends, relatives)
  • 6. Some of the social Networking sites
  • 7. How it all started?  Many Social Networking websites were launched in the 1990s.  In India , ORKUT was the first social networking website that actually attracted users towards the idea of building up their social networks.  Orkut was launched in 2004, owned and operated by Google Inc.It was one of the most visited websites in India and Brazil.  Orkut was followed by MySpace, Face book, Twitter and now Google+
  • 8. Types of social networks  Social networks—Connect with people Ex: Facebook, Twitter, LinkedIn  Media sharing networks—Share photos, videos, and other media Ex: Instagram, Snapchat, YouTube  Discussion forums—Share news and ideas Ex: reddit, Quora, Digg  Bookmarking and content creation networks—Discover, save, and share new content Ex: Pinterest, Flipboard  Consumer review networks—Find and review businesses Ex: Yelp, Zomato, TripAdvisor
  • 9. Continue….  Blogging and publishing networks—Publish content online Ex: WordPress, Tumblr, Medium  Interest-based networks—Share interests and hobbies Ex: Goodreads, Houzz, Last.fm  Social shopping networks—Shop online Ex: Polyvore, Etsy, Fancy  Sharing economy networks—Trade goods and services Ex: Airbnb, Uber, Taskrabbit  Anonymous social networks—Communicate anonymously Ex: Whisper, Ask.fm, After School
  • 10. Security of Social network  Security is about the safeguarding of data  Security refers to protection against the unauthorized access of data.  Security controls in place to limit who can access the information.  Social Media Security is a process of eliminating security threats, monitoring cyber security, protecting social assets.
  • 11. Security Concerns • Face book users access the system mostly using cell phones. • This opens up free access to anyone getting hold of the cell phone of a user without the need for user id and password. • Face book gives an option to activate user id/ pwd but in reality the users do not. • By default the privacy settings are set to Public, meaning anyone could see the profile and wall . • Anyone in friends’ circle can post photos on your wall . • ‘Check-in’ feature in Face book tells your friends your GPS location. • By changing Privacy Settings you can avoid getting tagged but it does not happen.
  • 12. Security Tips  Update your security settings on all digital and social channel regularly.  Employ strong passwords.  Don't just rely on default settings.  Don't link personal and business accounts.  Be mindful about what you share.  Get rid of accounts that aren't in use.  Beware of public wireless connections.  Do not click any unknown or suspicious link.
  • 13. Privacy  Privacy is the ability of an individual or group to seclude(keep someone away from others) themselves or information about themselves and thereby reveal themselves selectively.  Privacy is important thing in social network because, it gives us the power to choose our thoughts and feelings and who we share them with.  Privacy protects our information we do not want shared publicly (such as health or personal finances).
  • 14. Privacy of Social Network  Read and Understand the Privacy Terms & Site Features.  Adjust your Privacy Settings & Account Information.  Unknowingly he has compromised his privacy.  Like Facebook, Twitter users are very less awareness in setting up proper controls for friends or followers.  Many feel proud that they have so many friends or followers.  Following the tweets of others has become a major pastime for many.  Tweets reveal location information as well.
  • 15. Privacy Protection tips Use strong passwords, and don’t use the same password for multiple accounts. Don’t use social media on public devices, and if you must, make sure to log out afterward. Disable access to location data for your social media apps. Be ware about clicking links from friends in social media; you never know if they’ve been hacked. Use two-factor authentication or password-reset checks for all your accounts. Even on your private social profiles, keep personal information to a Minimum. Read the privacy policy of social networking sites. Do not add people that you don’t know or trust.
  • 16. Growth of social network
  • 17. Gender wise usage of Social Network
  • 18. Growth of Social Media Users in India
  • 19. Growth of Social Media Users in the world
  • 20. Social Networks and its risks
  • 21. General Tips  Become familiar with the privacy settings available on any social network you use.  Don’t share your birthday, age or place of birth.  Don’t post your address, phone number or email address on a social network.  Don’t publicize vacation plans.  Use caution when using third-party applications.  Be wary of request for money.  Take additional precautions if you are the victim of stalking, harassment or domestic violence.
  • 22. Features of Social Network Helps keeping in Touch with friends and family. Reach easily to a large group of people for a shout out on important topics. Instant News and Information. Great Marketing Channel for Business Awareness and Activism. Exchange of ideas and collaboration Stay in touch
  • 23. Conclusion  We can see clearly that social networking sites are advantageous only if they are used wisely. Using these sites securely would be helpful, if user do not spend time unnecessarily. Wise members never provide personal information to strangers. Use of a tool depends on users. Ex – A doctor can operate with a knife and a murderer can kill a person with the same knife.
  • 24. References 1. https://www.slideshare.net/MarketingatBahrain/social-network-security- 14345886?next_slideshow=1 2. https://www.slideshare.net/shakiblimon/social-networking-security- 64803987 3. https://slideplayer.com/slide/16246911/ 4. https://csrc.nist.gov/CSRC/media/Presentations/Social-Media-Security- Protecting-Privacy/images-media/fissea-conference-2012_srinivasan.pdf 5. http://www.gfi.com/whitepapers/Social_Networking_and_Security_Risks .pdf 6. http://pewresearch.org/pubs/2131/social-media-facebook-twitter- myspace-linkedin 7. https://www.slideshare.net/krk1995/social-networking-ppt-33957099 8. https://www.slideshare.net/MohitKhurana4/social-networking-10073899