Discover millions of ebooks, audiobooks, and so much more with a free trial

From $11.99/month after trial. Cancel anytime.

Cybersecurity: On Threats Surfing the Internet and Social Media
Cybersecurity: On Threats Surfing the Internet and Social Media
Cybersecurity: On Threats Surfing the Internet and Social Media
Ebook115 pages4 hours

Cybersecurity: On Threats Surfing the Internet and Social Media

Rating: 0 out of 5 stars

()

Read preview

About this ebook

The world we live in today is characterized by an age of digital dependence. One of the biggest concerns in the 21st century for computer users is cybersecurity. Consequently, there are many threats facing social media users due to scams, cyberbullying and hackers. In this essay, we will learn about the existing issues revolving around social media as well as delve into some of the techniques and strategies used to better protect ourselves against many of the threats facing online users today.

 

Fiero Publishing Company

All rights reserved © 2022

LanguageEnglish
Release dateMay 6, 2018
ISBN9781540184375
Cybersecurity: On Threats Surfing the Internet and Social Media
Author

Telly Frias Jr Cordero

Telly Frias, Jr. @tellyfr. Distinguished author, Bachelor's in Political Science, MBA awaiting and possesses a wide array of experiences in sales, logistics, web design, social networking, political campaigning, call centering, press and public opinion and more.  Tremr.com staff pick member Please visit us @ www.telito.online for more information. Thank you for being a valued audience member! And thanks for your support.  

Related to Cybersecurity

Related ebooks

Internet & Web For You

View More

Related articles

Reviews for Cybersecurity

Rating: 0 out of 5 stars
0 ratings

0 ratings0 reviews

What did you think?

Tap to rate

Review must be at least 10 words

    Book preview

    Cybersecurity - Telly Frias Jr Cordero

    Cybersecurity: On Threats Surfing the Internet and Social Media

    ––––––––

    Telly frias jr

    ––––––––

    FIERO PUBLISHING COMPANY

    New York- Madrid- London

    Copyright © 2018 United States of America. All Rights Reserved.

    English version.

    First Publication in Madrid, Spain.

    Copyright © 2021 United States of America. All Rights Reserved.

    Library of Congress- Cataloging-in-Publication Data

    ISBN-10: 195676819X

    ISBN-13: ‎ 978-1956768190

    Disclaimer:

    No part of this publication may be reproduced, stored in a system, retrieved, or transmitted in any form or by any means, mechanical, electronic, photocopier, recorded or otherwise without the prior written consent of the publisher.

    ––––––––

    Design by Fiero Publishing Company. Second Edition.

    Fiero Publishing Company is a registered trademark.

    A picture containing text Description automatically generated

    Printed in the United States. Printed in Europe.

    Author’s Note

    Thank you for purchasing this book. I wrote this book while studying abroad for my master’s degree in Spain. Social media became a cause for concern for me because I noticed how many people were exploiting these tools to the detriment of society. I decided to write this book to explain some of my grievances to the reader. I've learned of the hazards of social media, some of which are discussed here. I'm sure you've probably noticed some of these dangers as well. Times are changing and we are changing with the times.

    Table of Contents

    Introduction ............................................................................... 01

    1. Buying and Selling online ......................................................07

    2. Cyberbullying and Kidnapping .............................................15

    3. Famous People on Social Media .......................................... 24

    4. Linkage and Spies ..................................................................29

    5. Companies look at your profile ............................................33

    6. Videogames linked to your Social Media account...............38

    7. On Social Media, the more friends the better .....................43

    8. Internet Cookies and Information exchange.......................48

    9. Victims of Hackers ................................................................52

    10. Cyberthugs and Cybersecurity ..........................................56

    11. Black Market .......................................................................60

    12. Cybersecurity Breaches .....................................................68

    13. The Greatest Threats to Cybersecurity..............................81

    14. Transhumanism ..................................................................86

    15. Dating website ....................................................................90

    16. Marea Cable ........................................................................98

    Conclusion .............................................................................. 102

    Data and Graphics ...................................................................105

    Glossary ...................................................................................112

    INTRODUCTION

    The technological direction humanity is headed in the twenty-first century presents great risks and few benefits for users. Today, sociocultural life in cities is characterized by extreme digital dependence, that is, a situation where the population works largely using electronic devices. Firstly, when the internet was created in the 1970s, it really was a great innovation. Well, little by little our civilization began to change. We now acquire more and more information using less physical space to store data.

    In fact, the progress made in being able to store information in the short term on a computer, and in the long term on the cloud has increased exponentially. We look ahead with anticipation of new technologies almost every year, when the market emerges with new devices, such as: PCs (personal computers), laptops, tablets, and smartphones which function as communication tools on social networks. Between 1999-2003 roughly 254 million computers were made obsolete. Gordon Moore (co-founder of Intel) observed more than 40 years ago that computer processing power doubles every two years. As a result, every year Americans eliminate 130 million smartphones, printers, keyboards, digital cameras, and other electronic devices.

    The technological progress I am referring to is classified by distinguishing between device capacity and virtual memory on the cloud. The first limited and the last being infinite. Twenty years ago, only sixteen percent of U.S households owned a PC while today more than half of U.S households own a PC. A user conducts a search on the Internet to obtain new information, but also can make purchases and sales through cyberspace and communicate with others about any given subject matter. Undoubtedly, today there is a great variety of information available on the internet in the form of news, articles, videos, photos, audio and of course what we find on social networks. For the moment, we will talk about some of the risks that exist when communicating on the networks.

    The fingerprints we leave on the internet keep track of our profiles and all related information. To address this point, let's think about it this way: friends, jobs, interests, photos, videos, comments, and other details of our lives are recorded in the database. In short, everything we communicate with others and publish online, whether it is our plans or pending events, produces certain vulnerabilities for users. Social networks reveal our personal interests, opinions, comments and even to a great extent the dynamics or logistics of a city. Such information generally compromises a city's security platform as it can be penetrated by criminals, terrorists, and others who can use this information for strategic planning and the execution of attacks.

    The real world is not as beautiful as the sun or a rainbow that appears after the rain. There are bad human beings and there is competition among people. This rivalry has existed according to the Bible since the time of Cain and Abel. Regardless of who we are, we inadvertently make enemies. However, the important thing is not the approach towards enmity, but rather competition. Although there is also cooperation between human beings, except many friends come forward with their own interest in mind. It may be that a person aligns with you because you are successful in some aspect of your life or that the two of you have a common feeling towards some cause.

    Despite our way of being, we will always have enemies in our lives. We cannot satisfy everyone. One way or another we acquire enemies who will want to harm us. The problem is that this paradigm has been duplicated in social networks. Unfortunately, the annoyance of dealing with evil people online is what disenchants users from participating in social media. With an online presence, it is inevitable to find cyber trolls who want to scold us on social networks. Certainly, it is easier for a coward to humiliate you online rather than to tell you to your own face. Arguably, if you were born in the 1990s, you probably belong to the last generation to experience bullying more in person than online. There are powers among the masses and social networks have been a key instrument in exercising this power. For example, the interdependence of a cyber union can be even more dangerous for users as there is a collective effort targeting counterparts. Among the dangers of social media are hacking, phishing, malware, and pretentious digital marketing campaigns. Do not fall for that. Obviously, social networks have been a great tool for digital marketing over the last decade.

    This book will talk about the threats of surfing the internet and participating on social networks. Everything that can happen on social media is really in the hands of the users. We are chosen as targets for business marketing, by hackers and cyber trolls every time we navigate social media. We identify the lies in the marketing strategies of companies. We answer the following questions What is the purpose of sharing data? Is data sharing done for the purpose of making our lives easier? and Does

    Enjoying the preview?
    Page 1 of 1