Computer Network Security for Social Networking

Submitted by: Submitted by

Views: 10

Words: 2048

Pages: 9

Category: Other Topics

Date Submitted: 03/19/2016 10:52 AM

Report This Essay

Computer Network Security for Social Networking

McCray C. Devin

Undergraduate Business, Leadership, Information System Technology Security

Regent University

1000 Regent University dr.

Virginia Beach, VA 23464

e-mail: devimcc@mail.regent.edu

Abstract

In this paper, I will address the security issues, flaws, and problems that social networking sites are faced with in retrospect to information that the sites hold. The Information is not protected from the public in any way, why is this a normal operation about the popular social media sites. Lastly I want to address the simplicity of gaining someone vital information through a protected individual’s social network profile.

1. Introduction

In today’s society almost everyone has some type of social networking service that they hold an account with. These social networking sites are a great way to communicate, network, and interact with fellow colligates and friends. Facebook, Twitter, and Google plus are just a few social networking sites to mention. These sites all have a one factor authentication system for the user to log into their account (Beaver) .This simplistic authentication systems is very easy and efficient for the users accessing there accounts. The idea arose if it is this easy for me to log into my account how easy would it be for an outside party to gain access within my account. Companies are faced with the problem of convenience over security. (McCHale 12) In this paper I would like to address the social networks themselves and their authentication process. In addition, by what method all these sites can improve and advance their encryption methods in which outsiders don’t gain access to highly valuable information in regards to users.

Social media sites are negligent in the handling of personally identifiable information (PII). And, the repercussions are felt by the users who may be victimized using information in their public profiles. Let's explore the risks inherent in this...