Skip to main content

Social Networks Security SNS (Initial Idea 2)

(Number of social media users 2025 | Statista, 2020)
According to a statistic published in 2020, the number of social network users has been reaching to 3.6 billion. (Statista, 2020)
This number will increase in 2025 to become 4.41 billion users globally. (Statista, 2020)
Social network security SNS is considered one of the essential elements in the social network applications to prevent the hacker Threats from access to victim devices which may give him more options to save or edit or destroy the data. 22% of social network users have exposed technical threats by different types such as malware threat which considered as the famous threats in social networks ( McAfee, 2020)

REFERENCES:.

Mcafee.com. 2020. How Cybercriminals Target Social Media Accounts | Mcafee. [online] Available at: <https://www.mcafee.com/enterprise/en-gb/security-awareness/cybersecurity/cybercriminal-social-media.html> [Accessed 4 November 2020].
Statista. 2020. Number Of Social Media Users 2025 | Statista. [online] Available at: <https://www.statista.com/statistics/278414/number-of-worldwide-social-network-users/> [Accessed 15 November 2020].


Comments

  1. How many of these internet users will you say use social media applications?

    What are some of the security challenges experienced by social media users? It will be good if you can discuss issues like Online Identity Theft, Fake News, Financial Fraud, Revenge crimes e.t.c.

    ReplyDelete

Post a Comment

Popular posts from this blog

WHAT IS THE CYBER SECURITY !!!!?

    Cyber security is the mode of defending computers, servers, mobile devices, electronic systems, networks, and data from hacker attacks. (What is Cyber Security?, 2020) we can be divided the cyber security into a few common categories: 1) Network security. 2)Application security. 3)Information security. 4)Operational security. 5)Disaster recovery and business continuity. 6)End-user education. (What is Cyber Security?, 2020)   An essential job in cyber security is protecting kinds of technology devices and Sensitive data from hacker attacks. (Taylor, H. 2020) These attacks impact on a different variety of users, whether if they are governments, individuals, institutions, banks, universities, Etc The methods of hacker attacks consist of many technical tools, these technical are developing rapidly to stay invisible and penetrate through the protective technical walls to harm or steal the personal data. (Taylor, H. 2020) The following types show the popular methods using b...

Questionnaire- the impact of jamming and fraud threats on GSM system.

 In accordance with the questionnaire,  57.1% of the participants have exposed to jamming operations while they were calling with other parties by the GSM system. Also, 81.8% of them have faced fraud calls from unknown individuals. This attack is called a phishing threat which asks the victim to share his personal information such as bank details, user names, passwords or other things that related to the victim with the hacker either by text message or phone call.

SOFTWARE EXAMPLE(CISCO PACKET TRACER)

I will illustrate how can we create a simultaneous GSM network by using Cisco Packet Tracer.  In the begging, I create a surveillance office, then connect them together as a network with different IP by switch device, which is also linked to the central office server. After that, I use 3 relay towers and link them to the central office server. The following picture shows the destination of the call from smart devices to the telecom provider and opposite. Source: CiscoNetAcad