Cybersecurity: On Threats Surfing the Internet and Social Media
()
About this ebook
The world we live in today is characterized by an age of digital dependence. One of the biggest concerns in the 21st century for computer users is cybersecurity. Consequently, there are many threats facing social media users due to scams, cyberbullying and hackers. In this essay, we will learn about the existing issues revolving around social media as well as delve into some of the techniques and strategies used to better protect ourselves against many of the threats facing online users today.
Fiero Publishing Company
All rights reserved © 2022
Telly Frias Jr Cordero
Telly Frias, Jr. @tellyfr. Distinguished author, Bachelor's in Political Science, MBA awaiting and possesses a wide array of experiences in sales, logistics, web design, social networking, political campaigning, call centering, press and public opinion and more. Tremr.com staff pick member Please visit us @ www.telito.online for more information. Thank you for being a valued audience member! And thanks for your support.
Related to Cybersecurity
Related ebooks
Digital Footprints Rating: 0 out of 5 stars0 ratingsWho Is Winning The Social Media And Crowd Funding War(s)?: The Battle For Good Vs Evil Rating: 0 out of 5 stars0 ratingsUNHACKABLE : Your Online Security Playbook: Recreating Cyber Security in an Unsecure World Rating: 0 out of 5 stars0 ratingsPrivacy Online: The Practical Privacy Guide For Anyone Rating: 0 out of 5 stars0 ratingsCybersafe for Business: The Anti-Hack Handbook for SMEs Rating: 0 out of 5 stars0 ratingsBlockchain Exploit: She Cracked the Uncrackable Rating: 0 out of 5 stars0 ratingsCrypto Shrugged: Bitpats, #1 Rating: 0 out of 5 stars0 ratingsGINI: Capitalism, Cryptocurrencies & the Battle for Human Rights Rating: 0 out of 5 stars0 ratingsPersonal Information & Identification Security Made Easy Rating: 0 out of 5 stars0 ratingsIdentity Lockdown: Your Step By Step Guide to Identity Theft Protection Rating: 0 out of 5 stars0 ratingsYour Personal Information Is At Risk: A Guide For Protecting Yourself Rating: 0 out of 5 stars0 ratingsAI Mega Profits Unleashing Extreme Bestsellers Rating: 0 out of 5 stars0 ratingsI Was Scammed: Updated and Expanded Rating: 0 out of 5 stars0 ratingsThe Paranoid's Guide to Using the Internet Rating: 1 out of 5 stars1/5Cunningly Smart Phones: Deceit, Manipulation, and Private Thoughts Revealed Rating: 0 out of 5 stars0 ratingsDon’t Drop Ship! A Guide to Starting Your Own Drop Ship Business And Reasons Why You Probably Shouldn’t Parts II and III Rating: 0 out of 5 stars0 ratingsSecrets of the Cyber Underworld: Unveiling the Hidden World of Cyber Criminals & Strategies for Addressing Cyber Crime Rating: 0 out of 5 stars0 ratingsCrypto Crime Taming the Unforgiving Technology Rating: 0 out of 5 stars0 ratingsThe Online Identity Theft Prevention Kit: Stop Scammers, Hackers, and Identity Thieves from Ruining Your Life Rating: 0 out of 5 stars0 ratingsInternet Marketing Fast Money Rating: 4 out of 5 stars4/5Cryptocurrency: Beginner's Simplified Guide to Make Money with Cryptocurrency Rating: 0 out of 5 stars0 ratingsCyber Protect Your Business Rating: 0 out of 5 stars0 ratingsMobile Malware Infringement and Detection Rating: 0 out of 5 stars0 ratingsThe Algorithm Man: America's Cyber Sleuth Rating: 0 out of 5 stars0 ratingsHow to Survive Identity Theft: Regain Your Money, Credit, and Reputation Rating: 0 out of 5 stars0 ratingsShadow Markets: The Counter-Economy in the UK Rating: 0 out of 5 stars0 ratingsInsufficient Funds: The Culture of Money in Low-Wage Transnational Families Rating: 0 out of 5 stars0 ratingsIdentity Theft and Fraud: Evaluating and Managing Risk Rating: 0 out of 5 stars0 ratingsExport Credit Insurance and Guarantees: A Practitioner's Guide Rating: 0 out of 5 stars0 ratingsInvestigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence Rating: 5 out of 5 stars5/5
Internet & Web For You
The Gothic Novel Collection Rating: 5 out of 5 stars5/5Coding For Dummies Rating: 5 out of 5 stars5/5How to Be Invisible: Protect Your Home, Your Children, Your Assets, and Your Life Rating: 4 out of 5 stars4/5Six Figure Blogging Blueprint Rating: 5 out of 5 stars5/5JavaScript All-in-One For Dummies Rating: 5 out of 5 stars5/5How To Start A Profitable Authority Blog In Under One Hour Rating: 5 out of 5 stars5/5No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State Rating: 4 out of 5 stars4/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5Coding All-in-One For Dummies Rating: 4 out of 5 stars4/5Everybody Lies: Big Data, New Data, and What the Internet Can Tell Us About Who We Really Are Rating: 4 out of 5 stars4/5The $1,000,000 Web Designer Guide: A Practical Guide for Wealth and Freedom as an Online Freelancer Rating: 4 out of 5 stars4/5The Beginner's Affiliate Marketing Blueprint Rating: 4 out of 5 stars4/5Podcasting For Dummies Rating: 4 out of 5 stars4/5Grokking Algorithms: An illustrated guide for programmers and other curious people Rating: 4 out of 5 stars4/5Social Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5How to Disappear and Live Off the Grid: A CIA Insider's Guide Rating: 0 out of 5 stars0 ratingsCybersecurity For Dummies Rating: 5 out of 5 stars5/5The Digital Marketing Handbook: A Step-By-Step Guide to Creating Websites That Sell Rating: 5 out of 5 stars5/5Beginner's Guide To Starting An Etsy Print-On-Demand Shop Rating: 0 out of 5 stars0 ratingsUltimate guide for being anonymous: Avoiding prison time for fun and profit Rating: 5 out of 5 stars5/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5Cybersecurity All-in-One For Dummies Rating: 0 out of 5 stars0 ratingsCoding with AI For Dummies Rating: 0 out of 5 stars0 ratingsSurveillance and Surveillance Detection: A CIA Insider's Guide Rating: 3 out of 5 stars3/5Wireless Hacking 101 Rating: 5 out of 5 stars5/5HTML in 30 Pages Rating: 5 out of 5 stars5/5Python QuickStart Guide: The Simplified Beginner's Guide to Python Programming Using Hands-On Projects and Real-World Applications Rating: 0 out of 5 stars0 ratings500 Writing Prompts for Fiction, Journaling, Blogging, and Creative Writing: Writing Prompts, #1 Rating: 0 out of 5 stars0 ratings
Reviews for Cybersecurity
0 ratings0 reviews
Book preview
Cybersecurity - Telly Frias Jr Cordero
Cybersecurity: On Threats Surfing the Internet and Social Media
––––––––
Telly frias jr
––––––––
FIERO PUBLISHING COMPANY
New York- Madrid- London
Copyright © 2018 United States of America. All Rights Reserved.
English version.
First Publication in Madrid, Spain.
Copyright © 2021 United States of America. All Rights Reserved.
Library of Congress- Cataloging-in-Publication Data
ISBN-10: 195676819X
ISBN-13: 978-1956768190
Disclaimer:
No part of this publication may be reproduced, stored in a system, retrieved, or transmitted in any form or by any means, mechanical, electronic, photocopier, recorded or otherwise without the prior written consent of the publisher.
––––––––
Design by Fiero Publishing Company. Second Edition.
Fiero Publishing Company is a registered trademark.
A picture containing text Description automatically generatedPrinted in the United States. Printed in Europe.
Author’s Note
Thank you for purchasing this book. I wrote this book while studying abroad for my master’s degree in Spain. Social media became a cause for concern for me because I noticed how many people were exploiting these tools to the detriment of society. I decided to write this book to explain some of my grievances to the reader. I've learned of the hazards of social media, some of which are discussed here. I'm sure you've probably noticed some of these dangers as well. Times are changing and we are changing with the times.
Table of Contents
Introduction ............................................................................... 01
1. Buying and Selling online ......................................................07
2. Cyberbullying and Kidnapping .............................................15
3. Famous People on Social Media .......................................... 24
4. Linkage and Spies ..................................................................29
5. Companies look at your profile ............................................33
6. Videogames linked to your Social Media account...............38
7. On Social Media, the more friends the better .....................43
8. Internet Cookies and Information exchange.......................48
9. Victims of Hackers ................................................................52
10. Cyberthugs and Cybersecurity ..........................................56
11. Black Market .......................................................................60
12. Cybersecurity Breaches .....................................................68
13. The Greatest Threats to Cybersecurity..............................81
14. Transhumanism ..................................................................86
15. Dating website ....................................................................90
16. Marea Cable ........................................................................98
Conclusion .............................................................................. 102
Data and Graphics ...................................................................105
Glossary ...................................................................................112
INTRODUCTION
The technological direction humanity is headed in the twenty-first century presents great risks and few benefits for users. Today, sociocultural life in cities is characterized by extreme digital dependence, that is, a situation where the population works largely using electronic devices. Firstly, when the internet was created in the 1970s, it really was a great innovation. Well, little by little our civilization began to change. We now acquire more and more information using less physical space to store data.
In fact, the progress made in being able to store information in the short term on a computer, and in the long term on the cloud has increased exponentially. We look ahead with anticipation of new technologies almost every year, when the market emerges with new devices, such as: PCs (personal computers), laptops, tablets, and smartphones which function as communication tools on social networks. Between 1999-2003 roughly 254 million computers were made obsolete. Gordon Moore (co-founder of Intel) observed more than 40 years ago that computer processing power doubles every two years. As a result, every year Americans eliminate 130 million smartphones, printers, keyboards, digital cameras, and other electronic devices.
The technological progress I am referring to is classified by distinguishing between device capacity and virtual memory on the cloud. The first limited and the last being infinite. Twenty years ago, only sixteen percent of U.S households owned a PC while today more than half of U.S households own a PC. A user conducts a search on the Internet to obtain new information, but also can make purchases and sales through cyberspace and communicate with others about any given subject matter. Undoubtedly, today there is a great variety of information available on the internet in the form of news, articles, videos, photos, audio and of course what we find on social networks. For the moment, we will talk about some of the risks that exist when communicating on the networks.
The fingerprints we leave on the internet keep track of our profiles and all related information. To address this point, let's think about it this way: friends, jobs, interests, photos, videos, comments, and other details of our lives are recorded in the database. In short, everything we communicate with others and publish online, whether it is our plans or pending events, produces certain vulnerabilities for users. Social networks reveal our personal interests, opinions, comments and even to a great extent the dynamics or logistics of a city. Such information generally compromises a city's security platform as it can be penetrated by criminals, terrorists, and others who can use this information for strategic planning and the execution of attacks.
The real world is not as beautiful as the sun or a rainbow that appears after the rain. There are bad human beings and there is competition among people. This rivalry has existed according to the Bible since the time of Cain and Abel. Regardless of who we are, we inadvertently make enemies. However, the important thing is not the approach towards enmity, but rather competition. Although there is also cooperation between human beings, except many friends come forward with their own interest in mind. It may be that a person aligns with you because you are successful in some aspect of your life or that the two of you have a common feeling towards some cause.
Despite our way of being, we will always have enemies in our lives. We cannot satisfy everyone. One way or another we acquire enemies who will want to harm us. The problem is that this paradigm has been duplicated in social networks. Unfortunately, the annoyance of dealing with evil people online is what disenchants users from participating in social media. With an online presence, it is inevitable to find cyber trolls who want to scold us on social networks. Certainly, it is easier for a coward to humiliate you online rather than to tell you to your own face. Arguably, if you were born in the 1990s, you probably belong to the last generation to experience bullying more in person than online. There are powers among the masses and social networks have been a key instrument in exercising this power. For example, the interdependence of a cyber union can be even more dangerous for users as there is a collective effort targeting counterparts. Among the dangers of social media are hacking, phishing, malware, and pretentious digital marketing campaigns. Do not fall for that. Obviously, social networks have been a great tool for digital marketing over the last decade.
This book will talk about the threats of surfing the internet and participating on social networks. Everything that can happen on social media is really in the hands of the users. We are chosen as targets for business marketing, by hackers and cyber trolls every time we navigate social media. We identify the lies in the marketing strategies of companies. We answer the following questions What is the purpose of sharing data? Is data sharing done for the purpose of making our lives easier? and Does