You are on page 1of 14

SOCIAL MEDIA

INSTAGRAM

ADVANTAGES:

1- Massive
Instagram is a social network that has grown widely in recent years. Between Facebook,
Twitter and Instagram, the latter is the one with the highest number of active users per month.

2-"A picture is worth a thousand words"


The main feature of Instagram is that it allows you to share photos. Sometimes the images are
able to convey more information than a written text. Images have the ability to evoke emotions
and feelings. They are also more attractive than other forms of interaction. This establishes a
much more effective communication system among users.

3- Ideal for virtual stores


Instagram has now become a marketing tool. Many virtual stores employ this platform to
promote their products.

4- Privacy and security


One of the most important advantages of Instagram is its privacy and security policy. Their use
is limited to persons over 13 years old, in order to protect children from certain contents that
may not be suitable for them. In addition, it can be established that the publications are private.
When choosing this option the other users who want to see the photos, videos or any other
element of the profile should send a follow-up request to the user with the private account. This
user has the authority to accept or reject such request. Finally, if a user is violating the
conditions of Instagram or if it violates the security of other members of the network, it can be
blocked and will not be able to see the publications of those who have blocked it.
5- Free
Like other social networks, the Instagram service is free. Neither the subscription nor the
download of the application generate additional costs to the derivatives for the payment of
Internet service.

6- Sharing Options
Instagram lets you share photos and videos that can be created directly from the application, or
can be uploaded from the memory of the mobile device. The application also offers the option
of sharing these files on other social networks, such as Twitter and Facebook.

DISADVANTAGES:

1- Possibility of image theft


By posting quality or professional images on a social network, it is possible for someone to
access them and use them for professional issues of which they benefit economically.
Therefore, there is a possibility of "stealing" images to a user without their consent.

2- The privacy of the images is collective, not individual


You can not configure the privacy of each photo individually. This means that there are only
two options: that all publications are public or that all are private.

3- Addictive
The Instagram social network can become an addiction for its users. For this reason, it must
be used with caution.

4- False advertising
Many stores rely on Instagram to promote their products and services. Sometimes these
accounts resort to false advertising to attract customers. This can generate mistrust on the part
of the users.

FACEBOOK
ADVANTAGES:
1. Business
The first “Advantages of Facebook” for the business persons. Create a group or create a page
and publish your product images, prices and details to get more engagement with customers.
Get maximum orders and earn more money.
2. Networking
Another benefit of having a Facebook account that you are always connected with your friends,
family and colleagues. Either you move from UK to USA, Japan or Canada, you can login to
your account and start connecting with family and friends.
3. Messages & Audio Calling
Send Unlimited Free messages to your family and friends on special events like, EID,
Christmas and New Year etc. Not even this you can also make audio calls with the help of
internet connection.
4. Video Chatting
Messages and audio calling is not last limits. We can also make video calls by using webcam,
internet and in the presence of computer, laptop or high quality mobile. These all features are
available on every account on Facebook. Now you have no need to create account on other
website for video or audio calling,
5. News
The biggest advantages in list when you like or join the news group and page. Keep always up
to date from latest news and headlines from your area. You can always read international news
by liking the pages of international news agencies.
7. Portfolio
Now another trends is growing up in developed countries. People create online portfolio on
Facebook, which helps to get easily job. You can also search jobs in groups and also can linked
you profile link in your Resume (CV).

DISADVANTAGES:

1. Privacy
The first “Disadvantages of Facebook” have not proper privacy or mostly people are not using
the options and features. Other persons can find information about you and about your other
friends and family by visiting the profiles of each person. They can stole your images and
videos or other data.
2. Fake Profiles
There are a lot of fake profiles on FB. These fake profiles are used for wrong purposes or for
cheating the people. We have found a lot of cases when a boy make friendship with girl and at
the end we found the girl profile is fake and I he is boy not a girl.
3. Time Wasting
I think this is one of the time wasting work. Everything in the world have advantages and
disadvantages but if we use it on right way it is beneficial but if we wrong it more it can be
disadvantage-able. So set the time for it usage and don’t use it more than 20 minutes or 30
minutes.
4. Scammers
There are high number of scammers are available on groups. A lot of buying and selling groups
are available where people buy and sell new and second hand things. But due to some scammers
the real buyers and sellers face the difficulties of trust.
5. Vulgarity
Many of Facebook profiles, pages and groups are published naked photos and videos. Which
is the biggest disadvantages of Facebook for under age children and peoples.

YOUTUBE

ADVANTAGES:
1. YouTube is video search engine:
This is a video sharing website, and we can share videos here, we have to pay nothing here
for views and uploading.

2. You can watch and download videos and audio of videos:


There are different types of videos here on YouTube and you can download these all videos in
any quality like mp4, 3gp, HD 480, and HD 720. If you want to download audio from video,
you can search on Google for YouTube video to the audio converter.

3. You can like, dislike, subscribe and comment on videos:


These options are up to the trend in which you can like any video with like button. But if you
do not like the content in the videos, it provides you the option to dislike. It is because of dislike
button in YouTube and it will improve views on other qualify videos. If you want to give some
suggestion, want to ask the question, want to learn more about a video, so you can also post a
comment below the videos.You see a Red Color button which is used to Subscribe. This is for
viewers. Almost all YouTuber use this word in there all videos because they need more and
more subscriber for their YouTube channel.

4. You can learn any kind of skills that you want:


You can use YouTube for knowledge. For many YouTube is a platform for learners. Anything
from anyone and specific from an expert, everything is available here. You can learn almost
everything such as English, Coding, Business management and everything else that you think
will be possible.

5. You can watch business and career movies:


YouTube has many channels of business training and carrier movies so you can watch these
videos. And you can start your own business by learning tips and tricks.

6.You can earn money from your videos on YouTube:


To earn money you can monetize your videos with Google AdSense. You can use Google
AdSense services if you want to earn money through monetization, and you can sign up for
AdSense account with your Gmail ID. But to earn money, first, you need to provide great tips
or entertaining materials for viewers.

DISADVANTAGES:

1.Public:
YouTube is public , So , anyone can see the videos that you post , Anyone can post a video ,
There could be copyright infringement issues , And there could be issues of privacy invasion.

2.Inappropriate:
If the children can access YouTube , you probably need a parental block , Some videos can
sometimes be inappropriate without warning , There is violence on some of the videos , There
are explicit videos and the teens are recording violence to post on YouTube.
3.Disabled:
Your account will be disable or flagged , If you are copying anyone’s video or making video
that do not comply with YouTube terms and conditions , your YouTube profile might get
flagged or your Adsense account can also be banned , So , It is better to make video with own
idea instead of implementing other ideas.

4.Copyrights:
You must have the original content or have the explicit permission of the person who creates
the content to include it in your video , You must own the copyrights and distribution rights
for all audio and video content that you upload to YouTube.
CHROME

ADVANTAGES:

1. Chrome is an extremely fast web browser; it loads and displays pages very quickly.
2. You can drag tabs out into separate windows, without difficulty, and back in again with
your mouse.
3. Google Chrome has a very basic, simple design, making it easy to use.
4. The start-up page lists the most frequent pages you’ve visited and allows you to click
and access them with ease.
5. Chrome automatically translates pages into a language you understand for your
convenience.
6. You can search the internet through your address bar at any time.
7. If a site crashes on one of your tabs, other open tabs will not be affected.
You may browse the internet without being logged using Chrome’s new private feature:
Incognito.
8. Unlike Firefox and Safari, you can alter the colour and theme of the browser.
9. Chrome is faster than Explorer and FireFox.
10. Chrome takes only seconds to install.

DISADVANTAGES:

1. Chrome uses up a lot of memory (RAM) when running it.


2. If you accidently close the browser, Chrome will close all the tabs opened without
warning.
ETHICAL HACKING AND SECURITY AGAINST CYBER CRIME

Security is a state of well being of information and infrastructure in which the possibility of
successful yet undetected theft, tempering and disruption of information and services are kept
to low tolerable.”
·Network security:
Protecting a network and data, computer program, other computer system assets from
unwanted intruders, and unauthorized user.
·Information Security:
protecting information and information systems from unauthorized access, use, disclosure,
disruption, modification or destruction.
There are following security services issues as given below:
 Confidentiality
 Authentication
 Integrity
 No repudiation
 Access control
 Availability
 Authorization.

1. Hacking:
The word “Hacking” term refers to the hobby/profession of working with computers. It is
described as the rapid development of new program or reverse engineering of existing software
to make code better and efficient. Hacking divided into two terms:
· Ethical Hacking
· Unethical Hacking
1.1 Ethical Hacking:
The practice of breaking into computers without malicious intent, simply to find security
hazards and report them to the people responsible. Ethical hacker refers to security professional
who apply their hacking skills for defensive purpose and constructive purpose.

1.2 Unethical Hacking:


Unethical Hacking is “cracking”. Cracking activities is breaking the computer security without
authorization or uses technology, or tools (usually weak links of a computer, phone system or
network) for vandalism, credit card fraud, identity theft, piracy, or other types of illegal activity.
So, cracker is refers to person who uses hacking skills or computer system knowledge in
offensive purpose.
Cyber Crime:
Cyber crime is the leveraging of a target's computers and information, particularly via the
Internet, to cause physical, real-world harm or severe disruption of infrastructure. According
to Kevin G. Coleman at al. Cyber crime is defined as “The premeditated use of disruptive
activities, or the threat thereof, against computers and/or networks, with the intention to cause
harm or further social, ideological, religious, political or similar objectives or to intimidate any
person in furtherance of such objectives.”

2. Importance of Ethical Hacking and How Minimize The Security Threats:


Ethical Hacker is network and computer security professional who apply their knowledge and
skills in defensive purpose. Roles of ethical are following:
· Evaluate the Weak links of network and computer system.
· Find out the malicious contents from the network traffic. ·Trace out the cyber culprits by
using some tools and tracing tools etc. Shut down all the doors of network and operating system
and information system for security pirates.
· Ethical hacker work as security advisor of network and computer system.
· Diagnose the security threat of the system. Restricts the unauthorized access of network or
system by installing advanced security or IDS system.
· Protect the information system or network from Penetrating Testing.

3. Major Disaster of Unethical Hacking:


Unethical hacking is cyber crime and being use as prominent arm to make crime and cause
millions harm every day. Most cruel face of this unethical hacking, are hack the account,
identity, penetrating in unauthorized network or system and sniffing the data etc not only for
money but also spread terrorism. 9/11 demolition is example of such kind of hacking which
shocked the whole world and challenged the USA network security. In this terrorist attack, all
information are transfer over network using new technique stenography through which all the
encoded textual information was hidden into funny image by advanced program .
Virus attack:
The damage was not done to a person but to the masses is the case of the Melissa virus. The
Melissa virus first appeared on the internet in March of 1999. It spread rapidly throughout
computer systems in the United States and Europe. It is estimated that the virus caused 80
million dollars in damages to computers worldwide.

4. Social Awareness and Precaution During Net Surfing:

 Should not click any hyperlink if you are not sure about the link.
 Should not create unnecessarily many email account.
 Should not use anonymous user id and password for net surfing.
 · System should be password protected and should automatically lock when system is
idle for long time.
 Destroy all the important material related to system, network, or id so that dumpster
diving cannot be done.
 User id and password should be strong with special character and should be change
periodically.
 We should not provide your personal information unnecessarily to unknown sites or we
are not sure about sites credibility.
 Use encryption and digital signature etc. techniques to transfer the important data.
 We should always avoid checking unknown greetings, downloading screen saver, free
software.
 Avoid using of pirated software.
 Vendor-supplied software should be free from bugs, missing operating system patches,
vulnerable services, and insecure choices for default configurations. 5. Some System
and Devices for Network Security 5.1 Intrusion Detection Systems (IDS): An IDS
monitors network traffic and monitors for suspicious activity and alerts the system or
network administrator. IDS may also respond to anomalous or malicious traffic by
taking action such as blocking the user or source IP address from accessing the network.
There are Network based (NIDS) and Host based (HIDS) Intrusion Detection

5. Some System and Devices for Network Security:


5.1 Intrusion Detection Systems (IDS):

An IDS monitors network traffic and monitors for suspicious activity and alerts the system or
network administrator. IDS may also respond to anomalous or malicious traffic by taking
action such as blocking the user or source IP address from accessing the network. There are
Network based (NIDS) and Host based (HIDS) Intrusion Detection Systems. Host Intrusion
Detections Systems (HIDS) are run on individual hosts or devices on the network and Network
Intrusion Detection systems (NIDS) are placed at a strategic point within the network to
monitor traffic to and from all devices on the network.

5.2 Firewall:
A firewall is a system that is set up to control traffic flow between two networks. Firewall is
effective means of protecting network system from the threats and a single choke point that
keeps unauthorized user out of the protect network, prohibits potentially vulnerable services
from entering and leaving the services.

5.3 Packet Filtering Firewall:

A packet filtering firewall applies a set of rules to each incoming packets and then forwarding
or discarding them. These rules are based on source IP, port no, UDP, TCP etc.

5.4 Port Scanning:


A port scanner is a program which attempts to determine a list of or range of open TCP, UDP,
etc. ports on a list or range of IP addresses. Port scanners are used for network mapping and
for network security assessments. So, we have knowledge to disable (close) all doors (port) to
prohibit the pirates to enter in network.

5.5 IPSec:

IPSec is a protocol suite which is used to secure communication at the network layer between
two peers. When end-to-end security is required, it is recommended that additional security
mechanisms such as IPSec or TLS, be used inside the tunnel, in addition to L2TP tunnel
security.

5.6 ISAKMP:
“Internet Security Association and Key Management Protocol” is a protocol for establishing
Security Associations (SA) and cryptographic keys in an Internet environment. ISAKMP
defines the procedures for authenticating a communicating peer, creation and management of
Security Associations, key generation techniques, and threat mitigation e.g. denial of service
and replay attacks.

6. Wi-Fi Network Security:

802.11 wireless LAN protocols (i.e. Wi-Fi protocol) have become the most popular protocol
for wireless networking. So Wi-Fi network are most vulnerable if network administrator is
completely aware about the security issues. So hacker can penetrate in our network with hiding
their identity. WEP and WPA are used to protect the wi-fi network. WEP (Wireless Equivalent
Privacy) is an optional encryption standard for Wi-Fi network, implemented in the MAC layer.
WEP uses a secret 40 or 64-bit key to encrypt and decrypt datagram. Wi-Fi Protected Access
(WPA) is a certification(Authentication) program created by the Wi-Fi Alliance. WPA
improves on the authentication and encryption features of WEP. One of the key technologies
behind WPA is the Temporal Key Integrity Protocol (TKIP). TKIP addresses the encryption
weaknesses of WEP.

“ Internet is serving the modern society in several ways. But, It has several security breaches.
These security breaches can be misused by black hats for offensive purpose. So, it is mandatory
to determine the vulnerable points of the information system. There are various tools like
firewall, gateways, IPSec, DMZ, network auditing, etc. evaluating the breaches and mitigating
them by using tools and taking proactive action against them for averting from disaster. Our
some precaution and proactive action can eliminate the hazard and cyber terrorism”.

You might also like