Sunday 21 February 2016

Cyber Security tips for Social Network Sites

What are social network sites?
Social networking sites,sometimes referd to as "friend-of-friend" sites ,build upon the concept of traditional social networks where your conected to new people through people you already know. The purpose of some socual networking sites may focus on establishing business connections

Although the features of social networking sites differ,they all you provide information yourself and offer some type of communication mechanism like (forms,chat rooms,email,apps,registrations)that enable you to connect with other users.on some times you can brown on firfox,crome or some other browsers..and some other groups communicates peoples like some pertical connectiong people like business  man etc.

What security implications do these sites present?

Social network sites rely on connections and communication,so they encourage you provide a certain amount of personal information .When deciding how much information to reveal ,people may not excersise the same amount of cautions as they would when meeting someone in personal because

   .the Internet provides a sense of anonymity
  .the lack of physical intraction provides a false sense of security
   .the tailor the informatipon for their friend to read,for getting that other may     see it
   .they want to offer insights to impress potential friends or associates.

How can you protect yourself?

.Limit the amount of personal information you post -Do not post information that would make you vulnearble,such as your address or information about yours.
.Remember that the Internet is a Public resource -Only post information you are comfortatable with anyone seeing.Includind posts,videos ,photos etc

.Be wary of strangers -The internet makes it easy for people to misrepresent their identities and motives.Consider limiting the people who are allowed to contact you on these sites.

.Be wary of third-part application - Third-part application may provode entertainment or funtionality ,but use caution when deciding which application to enable.Aviod that seem suspicious ,and modifiy your setting to limit the amount of information the application can access
.Use strong password -Protect your account with password that cannot easily be gussed.If your password is compromised,someone elase may be able to access your account and pretend to be you.


No comments:

Post a Comment