ANALYZING DEVICES NETWORK SECURITY AND PRIVACY IN SOCIALNETWORKINGIn Partial Fulfillment of the Requirements in Grade 12 Senior Hishschoolfor Inquiries, Investigations and ImmersionLeader: Marc Allen A. San JuanMembers:Mark Peter MontereyMarvin Gio OlorCarl Razo
Chapter 1THE PROBLEM AND ITS BACKGROUNDIntroductionSocial media is changing the way that information is passed across societies and aroundthe world. The rapid spread of blogs, social networking sites, and media-sharing technology(such as YouTube), aided by the proliferation of mobile technology .The speed and transparencyof information have increased dramatically andthe impacts it has on the internet usersperformance and some possible management techniques the main objectives were to ascertain oridentify the effects in your security and privacy it can be used for both personal and businessreasons. It made it possible to share information in ways that were never possible before but apersonal aspect was still lacking in sharing information. Social networking is the practice ofexpanding one's contact with other individuals mostly through social media sites like Facebook,Instagram, twitter, LinkedIn and many More.There is social media everywhere. By bringing individuals from different places together,reconciling long-lost relatives, and providing other opportunities for connection, it has in someways made the world seem smaller. However, the risk of data breaches has increased over timeas social media has developed.As more data is posted online, there is a greater risk that hackers, businesses, and nefariousoutsiders will mine it for purposes that compromise privacy. Additionally, in certain instances,data is outright stolen.Network security is vital in protecting client data and information, keeping shared datasecure, and ensuring reliable access and network performance as well as protection from cyberthreats. A well-designed network security solution reduces overhead expenses and safeguards
organizations from costly losses that occur from a data breach or other security incident.Ensuring legitimate access to systems, applications, and data enables business operations and thedelivery of services and products to customers. It is a broad concept that encompasses a widerange of technologies, devices, and processes. In its most basic form, it is a set of rules andconfigurations that use both software and hardware technologies to protect the integrity,confidentiality, and accessibility of computer networks and data. Every organization, regardlessof size, industry, or infrastructure, requires network security solutions to protect it from the ever-changing landscape of cyber threats in the wild today.Since the introduction of early social networking sites in the early 2000s, online socialnetworking systems have risen dramatically, with Facebook, Instagram, Twitter, and Snapchatbecoming the biggest names in social media in the mid-2010s. The massive amounts of privatedata that has recently become accessible online and stored on the internet has brought userprivacy to the frontline of debate about the software's ability to safely store such personalinformation.
Upload your study docs or become a
Course Hero member to access this document
Upload your study docs or become a
Course Hero member to access this document
End of preview. Want to read all 17 pages?
Upload your study docs or become a
Course Hero member to access this document
Term
Spring
Professor
N/A
Tags
Social network service