Review of Cyber Threats in Social Networking Websites
Main Article Content
Abstract
with the advancement in technology, internet emerged as the crucial part of human life. While focussing on the internet, social networking is the major thing that gains attention. The use of social networking sites is very high compared to another usage of internet. The main reason is people’s desire to interact and communicate people all around the globe. It is not just the way to communicate, but also an open door for a business promotion. But increased use of social networking websites has also promoted the cyber criminals for cyber crimes. Facebook, Instagram, Twitter, LinkedIn, Myspace, etc. are the social networking websites used by the users. While sharing information on these websites, people are unaware of the security issues. Cyber criminals exploit personal information and other confidential information of users for hacking their other accounts. Thus, privacy and security became the major concern in social networking websites. Existing internet security system and antivirus system are not effective enough to protect the user accounts against these security threats. These papers aim to review and identify various cyber security threat in social networking websites. Also, it focuses on proposed some solutions to help people how to tackle the cyber security threats associated with the social networking websites.
Downloads
Download data is not yet available.
Article Details
Section
Articles
COPYRIGHT
Submission of a manuscript implies: that the work described has not been published before, that it is not under consideration for publication elsewhere; that if and when the manuscript is accepted for publication, the authors agree to automatic transfer of the copyright to the publisher.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
- The journal allows the author(s) to retain publishing rights without restrictions.
- The journal allows the author(s) to hold the copyright without restrictions.