100 likes | 243 Views
Social Networking. Student # 97106283. Over the past 15 to 20 social networking sites have increased due to popularity. Today over 350 sites exist which cover ever topical interest. New web technologies allow for user interaction. The History. Distributed. User Generated.
E N D
Social Networking Student # 97106283
Over the past 15 to 20 social networking sites have increased due to popularity. • Today over 350 sites exist which cover ever topical interest. • New web technologies allow for user interaction. The History
Distributed • User Generated • Many to many relationships • Digital Media Social Networking Sites RSS Blogs Games Combining element of web 2.0
Many of the methods discussed out line that users may be aware but are unwilling to break with peer pressure and often fall into specific user categories. Alpha Socialisers Attention Seekers Users who choose social networking sites to socialise and meet others Attention seekers are individuals who often seek the attentions of others and make comments towards other so that they will get noticed • Followers venture into SNS in order to keep up with what going on amongst their friends and associates but never really contribute to what is taking place but watch from a distance. • Faithfull‘s • Functional Reacquaint themselves with friends from their past that they have lost contact with Types of Users Not being particularly interested in the social networking sites themselves, but their membership is the result of peer pressure
Have you read the Terms of use with in the chosen social networking site MySpace Facebook Bebo Users should always read the terms and conditions before getting involved with social networking and other sites as this allows them to see what happens to their confidential information. User awareness
User’s personal information D.O.B, location, Name, Gender and Mobile number, etc • Survey Constructed Users personal information
2 versions of the Facebook Photography programs affected Buffer overflows Hacker Croll – May 2009 obtains the details from the wife's twitter account High profile Britney Spears, Barack Obama, Rick Sanchez, SocialEngineering JavaScript-based, Samy worm, Kamkar to attain more than one million "friends" in 24 hours on my space Cross site Scripting Phishing Attacks Injection Attacks Fake information sent to users to capture various user information SQL Injection, which accounted for 19% of the total incidents User Vulnerabilities
The user can safeguard them selves from the social networking vulnerabilities in many ways. Keeping virus protection updated Up dates of Operating System Patches Having updates assist with the protection of the users computer and protected them from common malware Having the system set to update its self with the latest critical and moderate patches will make sure the system stays clean from vulnerabilities that could otherwise be allowed to affect an unpatched system. Security of the Social Networking Account Making sure authorisation of passwords for the account is paramount to the security. breaches here will often allow the person to gain access into other areas or sites so a combination of different charters, numbers and symbols should be used User Information Only post information into these sites that you believe will not have an adverse affect to your personal life and safety as an individual Photographs The posting of photographic information should be kept to minimum and only shown to individuals that are friends, images that were not intended for the internet should never be placed onto these sites. Friendships Making sure that only friends who are true friends are allowed to view information within social networking site. Adding others friends with in social networking site without knowing them may lead to many types of social networking attacks. User Safeguards