Professional Documents
Culture Documents
ADVANTAGES:
1- Massive
Instagram is a social network that has grown widely in recent years. Between Facebook,
Twitter and Instagram, the latter is the one with the highest number of active users per month.
6- Sharing Options
Instagram lets you share photos and videos that can be created directly from the application, or
can be uploaded from the memory of the mobile device. The application also offers the option
of sharing these files on other social networks, such as Twitter and Facebook.
DISADVANTAGES:
3- Addictive
The Instagram social network can become an addiction for its users. For this reason, it must
be used with caution.
4- False advertising
Many stores rely on Instagram to promote their products and services. Sometimes these
accounts resort to false advertising to attract customers. This can generate mistrust on the part
of the users.
FACEBOOK
ADVANTAGES:
1. Business
The first “Advantages of Facebook” for the business persons. Create a group or create a page
and publish your product images, prices and details to get more engagement with customers.
Get maximum orders and earn more money.
2. Networking
Another benefit of having a Facebook account that you are always connected with your friends,
family and colleagues. Either you move from UK to USA, Japan or Canada, you can login to
your account and start connecting with family and friends.
3. Messages & Audio Calling
Send Unlimited Free messages to your family and friends on special events like, EID,
Christmas and New Year etc. Not even this you can also make audio calls with the help of
internet connection.
4. Video Chatting
Messages and audio calling is not last limits. We can also make video calls by using webcam,
internet and in the presence of computer, laptop or high quality mobile. These all features are
available on every account on Facebook. Now you have no need to create account on other
website for video or audio calling,
5. News
The biggest advantages in list when you like or join the news group and page. Keep always up
to date from latest news and headlines from your area. You can always read international news
by liking the pages of international news agencies.
7. Portfolio
Now another trends is growing up in developed countries. People create online portfolio on
Facebook, which helps to get easily job. You can also search jobs in groups and also can linked
you profile link in your Resume (CV).
DISADVANTAGES:
1. Privacy
The first “Disadvantages of Facebook” have not proper privacy or mostly people are not using
the options and features. Other persons can find information about you and about your other
friends and family by visiting the profiles of each person. They can stole your images and
videos or other data.
2. Fake Profiles
There are a lot of fake profiles on FB. These fake profiles are used for wrong purposes or for
cheating the people. We have found a lot of cases when a boy make friendship with girl and at
the end we found the girl profile is fake and I he is boy not a girl.
3. Time Wasting
I think this is one of the time wasting work. Everything in the world have advantages and
disadvantages but if we use it on right way it is beneficial but if we wrong it more it can be
disadvantage-able. So set the time for it usage and don’t use it more than 20 minutes or 30
minutes.
4. Scammers
There are high number of scammers are available on groups. A lot of buying and selling groups
are available where people buy and sell new and second hand things. But due to some scammers
the real buyers and sellers face the difficulties of trust.
5. Vulgarity
Many of Facebook profiles, pages and groups are published naked photos and videos. Which
is the biggest disadvantages of Facebook for under age children and peoples.
YOUTUBE
ADVANTAGES:
1. YouTube is video search engine:
This is a video sharing website, and we can share videos here, we have to pay nothing here
for views and uploading.
DISADVANTAGES:
1.Public:
YouTube is public , So , anyone can see the videos that you post , Anyone can post a video ,
There could be copyright infringement issues , And there could be issues of privacy invasion.
2.Inappropriate:
If the children can access YouTube , you probably need a parental block , Some videos can
sometimes be inappropriate without warning , There is violence on some of the videos , There
are explicit videos and the teens are recording violence to post on YouTube.
3.Disabled:
Your account will be disable or flagged , If you are copying anyone’s video or making video
that do not comply with YouTube terms and conditions , your YouTube profile might get
flagged or your Adsense account can also be banned , So , It is better to make video with own
idea instead of implementing other ideas.
4.Copyrights:
You must have the original content or have the explicit permission of the person who creates
the content to include it in your video , You must own the copyrights and distribution rights
for all audio and video content that you upload to YouTube.
CHROME
ADVANTAGES:
1. Chrome is an extremely fast web browser; it loads and displays pages very quickly.
2. You can drag tabs out into separate windows, without difficulty, and back in again with
your mouse.
3. Google Chrome has a very basic, simple design, making it easy to use.
4. The start-up page lists the most frequent pages you’ve visited and allows you to click
and access them with ease.
5. Chrome automatically translates pages into a language you understand for your
convenience.
6. You can search the internet through your address bar at any time.
7. If a site crashes on one of your tabs, other open tabs will not be affected.
You may browse the internet without being logged using Chrome’s new private feature:
Incognito.
8. Unlike Firefox and Safari, you can alter the colour and theme of the browser.
9. Chrome is faster than Explorer and FireFox.
10. Chrome takes only seconds to install.
DISADVANTAGES:
Security is a state of well being of information and infrastructure in which the possibility of
successful yet undetected theft, tempering and disruption of information and services are kept
to low tolerable.”
·Network security:
Protecting a network and data, computer program, other computer system assets from
unwanted intruders, and unauthorized user.
·Information Security:
protecting information and information systems from unauthorized access, use, disclosure,
disruption, modification or destruction.
There are following security services issues as given below:
Confidentiality
Authentication
Integrity
No repudiation
Access control
Availability
Authorization.
1. Hacking:
The word “Hacking” term refers to the hobby/profession of working with computers. It is
described as the rapid development of new program or reverse engineering of existing software
to make code better and efficient. Hacking divided into two terms:
· Ethical Hacking
· Unethical Hacking
1.1 Ethical Hacking:
The practice of breaking into computers without malicious intent, simply to find security
hazards and report them to the people responsible. Ethical hacker refers to security professional
who apply their hacking skills for defensive purpose and constructive purpose.
Should not click any hyperlink if you are not sure about the link.
Should not create unnecessarily many email account.
Should not use anonymous user id and password for net surfing.
· System should be password protected and should automatically lock when system is
idle for long time.
Destroy all the important material related to system, network, or id so that dumpster
diving cannot be done.
User id and password should be strong with special character and should be change
periodically.
We should not provide your personal information unnecessarily to unknown sites or we
are not sure about sites credibility.
Use encryption and digital signature etc. techniques to transfer the important data.
We should always avoid checking unknown greetings, downloading screen saver, free
software.
Avoid using of pirated software.
Vendor-supplied software should be free from bugs, missing operating system patches,
vulnerable services, and insecure choices for default configurations. 5. Some System
and Devices for Network Security 5.1 Intrusion Detection Systems (IDS): An IDS
monitors network traffic and monitors for suspicious activity and alerts the system or
network administrator. IDS may also respond to anomalous or malicious traffic by
taking action such as blocking the user or source IP address from accessing the network.
There are Network based (NIDS) and Host based (HIDS) Intrusion Detection
An IDS monitors network traffic and monitors for suspicious activity and alerts the system or
network administrator. IDS may also respond to anomalous or malicious traffic by taking
action such as blocking the user or source IP address from accessing the network. There are
Network based (NIDS) and Host based (HIDS) Intrusion Detection Systems. Host Intrusion
Detections Systems (HIDS) are run on individual hosts or devices on the network and Network
Intrusion Detection systems (NIDS) are placed at a strategic point within the network to
monitor traffic to and from all devices on the network.
5.2 Firewall:
A firewall is a system that is set up to control traffic flow between two networks. Firewall is
effective means of protecting network system from the threats and a single choke point that
keeps unauthorized user out of the protect network, prohibits potentially vulnerable services
from entering and leaving the services.
A packet filtering firewall applies a set of rules to each incoming packets and then forwarding
or discarding them. These rules are based on source IP, port no, UDP, TCP etc.
5.5 IPSec:
IPSec is a protocol suite which is used to secure communication at the network layer between
two peers. When end-to-end security is required, it is recommended that additional security
mechanisms such as IPSec or TLS, be used inside the tunnel, in addition to L2TP tunnel
security.
5.6 ISAKMP:
“Internet Security Association and Key Management Protocol” is a protocol for establishing
Security Associations (SA) and cryptographic keys in an Internet environment. ISAKMP
defines the procedures for authenticating a communicating peer, creation and management of
Security Associations, key generation techniques, and threat mitigation e.g. denial of service
and replay attacks.
802.11 wireless LAN protocols (i.e. Wi-Fi protocol) have become the most popular protocol
for wireless networking. So Wi-Fi network are most vulnerable if network administrator is
completely aware about the security issues. So hacker can penetrate in our network with hiding
their identity. WEP and WPA are used to protect the wi-fi network. WEP (Wireless Equivalent
Privacy) is an optional encryption standard for Wi-Fi network, implemented in the MAC layer.
WEP uses a secret 40 or 64-bit key to encrypt and decrypt datagram. Wi-Fi Protected Access
(WPA) is a certification(Authentication) program created by the Wi-Fi Alliance. WPA
improves on the authentication and encryption features of WEP. One of the key technologies
behind WPA is the Temporal Key Integrity Protocol (TKIP). TKIP addresses the encryption
weaknesses of WEP.
“ Internet is serving the modern society in several ways. But, It has several security breaches.
These security breaches can be misused by black hats for offensive purpose. So, it is mandatory
to determine the vulnerable points of the information system. There are various tools like
firewall, gateways, IPSec, DMZ, network auditing, etc. evaluating the breaches and mitigating
them by using tools and taking proactive action against them for averting from disaster. Our
some precaution and proactive action can eliminate the hazard and cyber terrorism”.