Premium Essay

Computer Network Security for Social Networking

In: Computers and Technology

Submitted By thatsmccray
Words 2048
Pages 9
Computer Network Security for Social Networking

McCray C. Devin
Undergraduate Business, Leadership, Information System Technology Security
Regent University
1000 Regent University dr.
Virginia Beach, VA 23464 e-mail: devimcc@mail.regent.edu

Abstract
In this paper, I will address the security issues, flaws, and problems that social networking sites are faced with in retrospect to information that the sites hold. The Information is not protected from the public in any way, why is this a normal operation about the popular social media sites. Lastly I want to address the simplicity of gaining someone vital information through a protected individual’s social network profile.

1. Introduction
In today’s society almost everyone has some type of social networking service that they hold an account with. These social networking sites are a great way to communicate, network, and interact with fellow colligates and friends. Facebook, Twitter, and Google plus are just a few social networking sites to mention. These sites all have a one factor authentication system for the user to log into their account (Beaver) .This simplistic authentication systems is very easy and efficient for the users accessing there accounts. The idea arose if it is this easy for me to log into my account how easy would it be for an outside party to gain access within my account. Companies are faced with the problem of convenience over security. (McCHale 12) In this paper I would like to address the social networks themselves and their authentication process. In addition, by what method all these sites can improve and advance their encryption methods in which outsiders don’t gain access to highly valuable information in regards to users.
Social media sites are negligent in the handling of personally identifiable information (PII). And, the repercussions are felt by the users who…...

Similar Documents

Premium Essay

Computer and Network Security

...Computer and Network security Problem statement Unauthorized Access “As the threat of unauthorized access grows companies and people continue to look for security to upgrade.” (Howard, 2009)``Unauthorized access'' is a very high-level term that can refer to a number of different sorts of attacks. The goal of these attacks is to access some resource that your machine should not provide the attacker. For example, a host might be a web server, and should provide anyone with requested web pages. However, that host should not provide command shell access without being sure that the person making such a request is someone who should get it, such as a local administrator. What network security is The history of network security “Sense the 1980’s networks have become more complex, so the need for security has become more complex.” (Mowers, 2006) The need for network security is a relatively new requirement. Prior to the 1980s most computers were not networked. It was not due to lack of desire to network them; it was more a result of the lack of technology. People or organizations could be interconnected over the shared network. It was no longer necessary to connect systems in a point-to-point configuration. Vulnerabilities were introduced with the deployment of this distributed environment utilizing shared, packet switched networks employing protocols such as TCP/IP and the concept of trusted systems. Systems on the network "trusted" each other. This situation was frequently...

Words: 1474 - Pages: 6

Premium Essay

Computer and Network Security

...Windows NT (CVE, 2013). In the first article it discusses the use of USB devices in the workplace. USB’s are used for transporting data from one computer to another. These allow for business requirements to be reached at a faster pace but they also pose a number of security challenges. Those challenges may be “disgruntled workers, careless users and malicious individuals” (Couture, 2009, p. 6). Ways to migrate this issue is by gluing shut the ports, disable USB ports in BIOS, prevent users from installing a USB device by denying permission on files called usbstor.pnf and usbstor.inf, making USB ports read only, disable USB ports in Group Policy, or disable Autorun (Couture, 2009, p. 11). In the second article it discusses the vulnerabilities of the BIOS. The BIOS performs power up test amongst the hardware components and memory and without this program the computer wouldn’t know what to do after it was turned on. The BIOS can be accessed by the use of backdoor passwords, cracking the BIOS password, deleting the contents of the CMOS RAM by software and/or hardware (Allgeuer, 2001, p. 4). Ways to mitigate the risk of users accessing the BIOS is to use BIOS passwords to protect the BIOA configuration utility, for the more critical systems different BIOS password should be used than less critical systems, boot only from hard drives, computer cases should be locked, and proper policies explaining to the organization about critical data should not being kept on hard drives......

Words: 1760 - Pages: 8

Premium Essay

Computer Networking

...Term paper of computer networking (Design wireless network) x.y.z. Abstract: this document tells us about wireless network and various techniques to design a computer wireless network Keywords—wireless networks, connecting devices, switches, hubs. [pic] Campus network A campus network is a computer network made up of an interconnection of local area networks (LANs) within a limited geographical area. The networking equipments (switches, routers) and transmission media (optical fiber, copper plant, Cat5 cabling etc) are almost entirely owned (by the campus tenant / owner: an enterprise, university, government etc). In the case of a university campus-based campus network, the network is likely to link a variety of campus buildings including; academic departments, the university library and student residence halls. [pic] | | | | Introduction A computer network allows sharing of resources and information among devices connected to the network. The Advanced Research Projects Agency (ARPA) funded the design of the Advanced Research Projects Agency Network (ARPANET) for the United States Department of Defence. It was the first operational computer network in the world. Development of the network began in 1969, based on designs developed during the 1960s. For a history see ARPANET, the first network . Purpose • Facilitating communications. Using a network, people can communicate efficiently and......

Words: 1521 - Pages: 7

Premium Essay

Computer Network & Information Security

...has focused on computer security of big businesses and how they have been breached, yet individuals do not stop and think about their own personal computer safety. Information can be stolen or damaged, access of personal computers can be gained without permission, viruses and worms can enter creating problems for a user, and our computers may be susceptible to cyber-attacks from hackers. Yet most computer users are new to the technology or do not realize the dangers at hand. This is why users need to learn how to keep their personal computer safe. To achieve a good level of security, there are many important elements that must be taken into account: authentication, access control, data integrity, content protection, etc. Information security can be obtained using methods such as cryptography and network protocols. Computer security is the process of detecting unauthorized use of your computer or PC. As the old saying goes “prevention is better than cure”, according to this we realize that if we learn about the possible loopholes in the security, then we can prevent it from occurring in the first place. But the big question is 'why should I care about my computer security?’. We use computers for everything from banking and investing to shopping and communicating with others through email or chat programs. Although we may not consider our communication a 'top secret', but you don’t want others to eavesdrop on you conversations, read your mails, use your computer to attack......

Words: 1454 - Pages: 6

Free Essay

Network Security

...Network security is the process of protecting the user from things that can potentially ruin a computer or leak information that other people should not have access to.Some things that can attack a network system include viruses,worms, as well as trojan horses, spyware along with adware,attacks called zero hour,attacks by hackers,denied service hacks,data interception and theft,and the last on being identity theft.In order for network security to work it needs to have both hardware as well as software to protect the network which is done with things such as anti virus and spyware software.It also needs a firewall which is responsible for blocking the unauthorized user from gaining access to the network.Intrusion prevention systems which are tasked with identifying attacks such as zero hour.The last thing to make network security work is a virtual local area network which provides secure remote access. By using these various methods of protecting the network it will benefit the businesses by receiving the customers trust in the company by making sure their privacy is protected in such ways as making sure things like credit card data or sensitive data is stolen and exploited.It also makes sure the network is secure even if it is being used by someone remotely as long as ......

Words: 4285 - Pages: 18

Premium Essay

Social Networking

...INTRODUCTION Social networking consists of wide and diverse issues which concern the lives of individuals resulting to the blast of online socializing. Due to the impacts it caused to the public, this research paper tackled about the effects of social networking and its influence to the society. It also includes the issues about the threats and security of the social networks as well as the changing behaviours of people caused by the growing popularity of social networking. Remember the early days before the online interaction all over the world knocks on the door of every being when everything is basic and simple. The ability to communicate and stay connected across the planet has fostered and altered the existence of every individual. This research aims to know and to stay focus on what is life in the world of social networking. Despite the thousands of miles being apart people still manage to keep in touch by just logging in to a social site. Online social networks are the reason behind the connections and interactions between people based on common interests. However, more people were complaining about the threats and security of social networking. Others were complementing about what it could offer. From own personal purposes to school activities, to business promoting to politics campaign, social networking is always involve. This research will also cover the impacts of social networking to our society. This is conducted to be able to know its harmful and......

Words: 7170 - Pages: 29

Premium Essay

Computer Networking

... COMPUTER NETWORKING SIXTH EDITION A Top-Down Approach James F. Kurose University of Massachusetts, Amherst Keith W. Ross Polytechnic Institute of NYU Boston Columbus Indianapolis New York San Francisco Upper Saddle River Amsterdam Cape Town Dubai London Madrid Milan Munich Paris Montréal Toronto Delhi Mexico City São Paulo Sydney Hong Kong Seoul Singapore Taipei Tokyo Vice President and Editorial Director, ECS: Marcia Horton Editor in Chief: Michael Hirsch Editorial Assistant: Emma Snider Vice President Marketing: Patrice Jones Marketing Manager: Yez Alayan Marketing Coordinator: Kathryn Ferranti Vice President and Director of Production: Vince O’Brien Managing Editor: Jeff Holcomb Senior Production Project Manager: Marilyn Lloyd Manufacturing Manager: Nick Sklitsis Operations Specialist: Lisa McDowell Art Director, Cover: Anthony Gemmellaro Art Coordinator: Janet Theurer/ Theurer Briggs Design Art Studio: Patrice Rossi Calkin/ Rossi Illustration and Design Cover Designer: Liz Harasymcuk Text Designer: Joyce Cosentino Wells Cover Image: ©Fancy/Alamy Media Editor: Dan Sandin Full-Service Vendor: PreMediaGlobal Senior Project Manager: Andrea Stefanowicz Printer/Binder: Edwards Brothers Cover Printer: Lehigh-Phoenix Color This book was composed in Quark. Basal font is Times. Display font is Berkeley. Copyright © 2013, 2010, 2008, 2005, 2003 by Pearson Education, Inc., publishing as Addison-Wesley. All rights reserved. Manufactured in the United States......

Words: 69922 - Pages: 280

Premium Essay

Computer Networking

...Introduction to Computer Networking Prof. Teodora Bakardjieva 1 1.0 Introduction The purpose of the networking guidelines are as follows:  to assist students in understanding the benefits of networking  to help students place in context their current stage of networking development in their school.  to assist students in planning the next stage of network development in their school.  to provide standard networking ‘models’ and best practice to students that will assist students in their network planning. This document includes information under the following main headings:  Introduction to Networking  Advantages of Networking  Types of Networks  Models of networking appropriate to students  NCTE recommendation to students  Some relevant terms. 1.1. Basic of Networking A computer network consists of a collection of computers, printers and other equipment that is connected together so that they can communicate with each other. Fig 1 gives an example of a network in a school comprising of a local area network or LAN connecting computers with each other, the internet, and various servers. 2 File and Print Server CD or Multimedia Servers Access to: Internet content & learning resources, Scoilnet etc Email communication Users computers Cache, Proxy, Filtering, Firewall Server Modem or Router School ‘Local Area Network’ (LAN) Other users, computers Fig 1: Representation of Network in a......

Words: 4611 - Pages: 19

Premium Essay

Computer Security

...appropriate behavior in order to avert the cybercrime. Many of these policies are just adopted, but till many companies find it necessary to be tailored so that it is tailored to an organization security needs and most till need to be updated to reflect ever changing impact of the cyberspace transactions in everyday activities. Like all company document, cyberspace follows good design and various format in order to make the document not be vague and follow government policies on security design. These policies also need to be reviewed regularly to ensure that they conform to the business needs that are ever changing gin the business environment. The following are the major items involved in the cybercrime plan actions. 1. Establish security roles and responsibilities Establishing security roles and responsibility in a company is one step towards combating cybercrime. The policies should clearly define the separation of roles with responsibility depending on the system in place. This means that a system will be designed on role based control which might not be well utilized when the procedures and policies are not well defined. The extend of employees can go with a system should show how much they can access in the system and the policies should be maintained at minimum. This means that: The security procedure clearly identifies data ownership in the company and employee roles are well defined. The employees should not inherit privileges from other users. This means that......

Words: 2072 - Pages: 9

Premium Essay

Computer Networking

...the needs of an organization. The program prepares graduates to address various users’ needs involving the selection, development, application, integration and management of computing technologies within an organization Course Title: Free Elective II (Information Assurance and Security) Course Description: This course provides a broad view of information assurance and security and its major subjects: protection of information assets; access to information system; hacking legislation and industrial standards. In addition this course will serve as a guideline for students to make their course selections. Course/Year and Section: BSIT 4A-4D Duration/Term: 2ndSemester, AY 2015-2016 Course Meeting: No. of Units: 3 units lecture No. of Hours: 3 hours Pre-requisite/s: none Student Learning Outcome (CMO No. 25 Series of 2015): The graduates must have the ability to: 1. Articulate and discuss the latest developments in the specific field of practice. 2. Effectively communicate orally and in writing using both English and Filipino 3. Work effectively and independently in multi-disciplinary and multi-cultural teams. 4. Act in recognition of professional, social, and ethical responsibility 5. Preserve and promote “Filipino historical and cultural heritage” 6. Analyze complex problems, and identify and define the computing requirements needed to design an appropriate solution 7. Apply computing and other knowledge domains to......

Words: 1777 - Pages: 8

Premium Essay

Network Security

...1) Construct networks using different types of network devices HUB Hub is one of the basic icons of networking devices which works at physical layer and hence connect networking devices physically together. Hubs are fundamentally used in networks that use twisted pair cabling to connect devices. They are designed to transmit the packets to the other appended devices without altering any of the transmitted packets received. They act as pathways to direct electrical signals to travel along. They transmit the information regardless of the fact if data packet is destined for the device connected or not.   Switches Switches are the linkage points of an Ethernet network. Just as in hub, devices in switches are connected to them through twisted pair cabling. But the difference shows up in the manner both the devices; hub and a switch treat the data they receive. Hub works by sending the data to all the ports on the device whereas a switch transfers it only to that port which is connected to the destination device.  A switch does so by having an in-built learning of the MAC address of the devices connected to it. Since the transmission of data signals are well defined in a switch hence the network performance is consequently enhanced. Switches operate in full-duplex mode where devices can send and receive data from the switch at the simultaneously unlike in half-duplex mode. The transmission speed in switches is double than in Ethernet hub transferring a 20Mbps connection into...

Words: 1799 - Pages: 8

Premium Essay

Facebook Computer and Network Security

...Computer and Network Security Abstract Facebook began in 2004 as a kind of online directory for undergraduates at Harvard University, created and launched by Harvard students Mark Zuckerberg et al. Two months later, the site expanded to include other Ivy League schools. After that, the college network slowly grew and by the end of 2010, Facebook has over 500 million active users. Facebook is social networking. People have been “facebooking” each other for about 6 years now, making Facebook the most used social network worldwide. The purpose of this paper is to briefly describe Facebook’s history as well as also discuss Facebook’s inner working, covering its architecture and front/backend infrastructure, pretty much the nuts and bolts holding Facebook together. In closing, if looked past all of the features and innovations the main idea behind Facebook is really very basic, keeping people connected. Facebook realizes the power of social networking and is constantly innovating to keep their service the best in the business. Overview and Structure of the Organization Facebook is a social network service and website launched in February 2004 that is operated and privately owned by Facebook, Inc. As of July 2010, Facebook has more than 500 million active users, which is about one person for every fourteen in the world. Users may create a personal profile, add other users as friends and exchange messages, including automatic notifications when they update their profile.......

Words: 2589 - Pages: 11

Premium Essay

Social Networking

...Chapter 1 Title: The Influence of Social Networking to College student and its effect to their study habits. Introduction Social networking is a conversation. The important thing in social media is the real people who use it. It's all about the C's. Creative, Competition, Community, Communication. It is a online conversation, which is organic and complex. Social media influences people. But those influences may cause either good or bad especially to the most popular group of people who are influenced by it, the college students. Background Social Networking is relatively young, but its history is incredibly long. From AOL Instant Messenger to Friendster to Google+, social networks has probably changed more in ten years than most people’s living room furniture changes in a lifetime. We define social network sites as web-based services that allow individuals to construct a public or semi-public profile within a bounded system, articulate a list of other users with whom they share a connection, and view and traverse their list of connections and those made by others within the system. The nature and nomenclature of these connections may vary from site to site. What makes social network sites unique is not that they allow individuals to meet strangers, but rather that they enable users to articulate and make visible their social networks. This can result in connections between individuals that would not otherwise be made, but that is often not the goal, and these meetings......

Words: 1012 - Pages: 5

Free Essay

Evaluating the Security of Computer Networks

...Evaluating the Security of Computer Networks Security in Systems Architecture and Applications SE579 2 Table of Contents Evaluating the Security of Computer Networks I. Vulnerabilities A. Design Flaws B. Poor Security Management C. Incorrect Implementation II. Firewalls A. Packet Filtering B. Circuit Level Gateway Proxy Server C. Application Gateway III. Antivirus A. Scans IV. Intrusion Detection Systems V. Disadvantages VI. Conclusion 3 One of the major computing challenges in today’s economy is the lack of adequate security over the information computer networks, and internet applications in which business, government, and economy depend on. Businesses have become more dependent on information. The gathering, organizing, managing, finding, and analyzing of information are crucial to businesses. Computer viruses created by hackers cost businesses $55 billion in 2003. In 2011, a single instance of hacking on the Play Station cost Sony more than $170 million, while Google lost $500,000 due to hacking in 2005.(Coyne) 2003 Single instances of hacking may cost as much as $600,000 to $7m a day......

Words: 2281 - Pages: 10

Premium Essay

Network Security

...Importance of Security The Internet has undoubtedly become the largest public data network, enabling and facilitating both personal and business communications worldwide. The volume of traffic moving over the Internet, as well as corporate networks, is expanding exponentially every day. More and more communication is taking place via e-mail; mobile workers, telecommuters, and branch offices are using the Internet to remotely connect to their corporate networks; and commercial transactions completed over the Internet, via the World Wide Web, now account for large portions of corporate revenue. While the Internet has transformed and greatly improved the way we do business, this vast network and its associated technologies have opened the door to an increasing number of security threats from which corporations must protect themselves. Although network attacks are presumably more serious when they are inflicted upon businesses that store sensitive data, such as personal medical or financial records, the consequences of attacks on any entity range from mildly inconvenient to completely debilitating—important data can be lost, privacy can be violated, and several hours, or even days, of network downtime can ensue. Despite the costly risks of potential security breaches, the Internet can be one of the safest means by which to conduct business. For example, giving credit card information to a telemarketer over the phone or a waiter in a restaurant can be more risky than submitting......

Words: 3895 - Pages: 16