Найдите свой следующий любимый книге

Станьте участником сегодня и читайте бесплатно в течение 30 дней
Cybersecurity: On Threats Surfing the Internet and Social Media (Extended Version): 2

Cybersecurity: On Threats Surfing the Internet and Social Media (Extended Version): 2

Автором Telly Frias Jr Cordero

Читать отрывок

Cybersecurity: On Threats Surfing the Internet and Social Media (Extended Version): 2

Автором Telly Frias Jr Cordero

Длина:
119 pages
1 hour
Издатель:
Издано:
Oct 7, 2019
ISBN:
9781393988342
Формат:
Книге

Описание

One of the biggest concerns in the 21st century for computer users is cybersecurity. There are many threats facing social media users due to scams, cyberbullying and hackers. The world we live in today is characterized by an age of digital dependence. In this essay, we will delve into some techniques and strategies used to better protect ourselves from many of the threats facing social media users.
 

Extended Version with three special

***Bonus Chapters*** included.

Издатель:
Издано:
Oct 7, 2019
ISBN:
9781393988342
Формат:
Книге

Об авторе

Telly Frias, Jr. @tellyfr. Distinguished author, Bachelor's in Political Science, MBA awaiting and possesses a wide array of experiences in sales, logistics, web design, social networking, political campaigning, call centering, press and public opinion and more.  Tremr.com staff pick member Please visit us @ www.telito.online for more information. Thank you for being a valued audience member! And thanks for your support.  

Связано с Cybersecurity

Похоже на «Книги»
Похожие статьи

Предварительный просмотр книги

Cybersecurity - Telly Frias Jr Cordero

Link

Introduction

While technological advancement in the twenty first century has led to rapid social development across the world there are still many inherent drawbacks from networking on social media that may jeopardize a user’s cybersecurity. Seemingly, we are living in an era characterized by extreme digital dependence; wherefore, people’s daily routines that consist of job and social functions center around easy to use hand held electronic devices.  Firstly, when the internet was created in the 1970s, it came as a shock and awe, truly a remarkable and innovative invention, so to speak, that began slowly changing civilization into the technocratic culture we have today. In addition, technological devices have evolved model after model with increased capabilities that allowed a user the ability to store more and more information each time using less physical space to keep memory saved as well as other aspects that attribute to resolution quality and speed.

In fact, this type of progress of being able to keep virtual memory has had exponential growth. The wide array of data kept on virtual memory can be easily distinguished through the short term of saving files and information on your computer or external hard drive, and through the long-term goal of storing information online or on the world wide web. The process of saving files and information on a device is considered short term because technology rapidly changes while storing data online or on a cloud, if you will, is perceived as a long-term goal because it is a virtual platform that does not have a finite lifespan like hardware. Each year we look forward for the emergence of new technology when the market releases new devices, such as laptops, tablets and smart phones; all of which are used today mainly as tools to communicate with others on expansive social networks.

However, as we may have it, a user on a personal computer or laptop has different motives each time he/she decides to go online. In any event, the average user does not only initiate a search engine request to obtain basic information such as news and facts. Alternatively, the internet also provides a medium to buy and sell online on any scale while maintaining time efficiency.  Without a doubt, there is an infinite amount of information available online in the form of news, journals, videos, pictures as well as social networks that allow us to keep in touch with family and friends over the course of our lives. The scope of this essay will be to discuss some of the increasing concerns that may put the average user at risk with regards to engaging with social media and networks.

At first, some of the settings on internet browsers, web pages and social networks may seem amicable and convenient, kind of like having our own buddy or personal assistant with us wherever we go there to give us notifications when we least expect it, but actually these settings have the adverse effect to some extent, when as a consequence, our digital footprints are recorded. To put this idea into perspective, just imagine our friends, employers, interests and preferences, pictures, videos, comments and other details of our lives exhibited to the public. Everything we communicate with the rest of our family, friends or colleagues that is published on our profiles and into cyberspace, whether it be our ongoing plans or pending events create risks for the average user. Social networks reveal our personal interests, opinions as well as the ergonomics and logistics of a city which can compromise our security platform when infiltrated by criminals, terrorists and those who could use this sensitive information to strategically plan calamities and execute cyberattacks.

The world we live in is far from a utopia. As such, there are many types of rivalry associated with human nature from people in your day to day life, as well as, the type of rivalries associated with large scale governments. This esteem for competition is not new. In fact, rivalry in human nature can be said to have originated in the Bible since the times of Kane and Abel. Regardless of how an individual may be physically, intellectually, or under which moral compass he/she may abide by, human beings, whether voluntary or involuntary, acquire enemies. However, the focus of human nature should not be on enemies and rivalry even though society is structured on a continuous cycle of competition among demographics in every industry. On the other hand, there is cooperation among people, but oftentimes many friends come forward with the interest of defeating a common enemy in the game. We all know this philosophy, that the enemy of my enemy is my friend, and the theory of Darwin which advocates the survival of the fittest.

Given our personalities, every human being will acquire friends and enemies at some point in his/her life; in the worst case, sometimes, that means acquiring enemies that want to do us harm. Unfortunately, this esteem is what disenfranchises people from using social networks and having public information on display, when we have people who want to do us harm whether we expect it or not. Alternatively, interdependence or the ability to form a team and collaborate effectively with others to achieve a common goal, as in business, for instance, is always desirable because it fosters an environment that is mutually acceptable and prosperous. Identifying clients and competitors in the market is essential when attempting to build a strategy in a company or organization. Evidently, social networks have been used as a tool for marketing in the last decade by providing a medium for identifying clients (based on the number of followers and/or likes on the fan page) and competitors (by weight of contrast when they advertise new products and offers.)

This essay will discuss some of the threats we may encounter while online and when engaging social networks. According to Murphy’s law, anything bad that can happen, will. Given Murphy’s law, I would like to incite the message that the responsibility of a user on social networks is on their hands, each of us are chosen as targets by hackers and mass marketers every time we log on. Nonetheless, we will be identifying the advantages of marketing for businesses, such as video game companies on social networks and learn how they acquire sales. On another note, we will also be delving into the dangers of when information obtained through social networks is used on the dark web by cybercriminals who sell their products and services on the black market. Furthermore, we will critique the disadvantages of social networks, also considering Facebook and how it has reshaped our cultural and social life. In addition, we will discuss how social networking has changed people’s habits on cyberspace and we will analyze post-humanism and how technology is related to our lives.

Moreover, this book will reflect the dangers that users may encounter on social networks. We will investigate real life cases of people who have been cyber bullied, kidnapped and scammed by cyber criminals. We will also be looking onto some red flag situations regarding dating websites and learn what to look out for. Taken together, this research will examine incidents where there have been security breaches, and the impact it has had. We will view cases where hackers have infiltrated corporate security systems and weigh in on the implications this wrongdoing has had on their databases and user accounts, as well as tally up the costs and damages for these incidents.

Lastly, we will examine methods that companies use to make decisions such as whether to hire a candidate as well as how they monitor existing employees. By the end of this book, we will come to understand how social networking and information published online can affect your job, your education and/or membership in a private organization. We will also be discussing the linkage between Apps as well as the technological linkage like the Marea Cable which was built across the Atlantic from the United States to Spain to increase the internet speed and productivity in Europe.  In any event, communication is a huge factor in public relations, and perhaps, this factor has become increasingly dispersed through social networking practices.

Buying and Selling online

All sales are aimed at prospective clients. Social networking sites have provided companies with an additional medium to connect and advertise any product or service that they may provide. At the same time, to obtain a sale it is best for the relationship between the seller and the buyer to project a win-win outcome where both sides can perceive benefits from the exchange. The client ought to be left feeling content with his purchase, and the seller content for having made a sale and thus receiving a commission. On the other hand, a win-lose outcome which is based on competition should not be applied in sales between the client and vendor because going this route may prevent future success and the ability to secure more sales in the future.

The competitive paradigm (win-lose) should only be enforced among rivals. According to Jack Welch retired CEO of General Electric, "You should only compete when you hold some type of

Вы достигли конца предварительного просмотра. Зарегистрируйтесь, чтобы узнать больше!
Страница 1 из 1

Обзоры

Что люди думают о Cybersecurity

0
0 оценки / 0 Обзоры
Ваше мнение?
Рейтинг: 0 из 5 звезд

Отзывы читателей