Computer Science Project
Computer Science Project
1
Index
1 Acknowledgement 1
2 Introduction 3
ii.) Output 14
2
Introduction
Social media is a web-based technology which enables the sharing of information
with the help of building virtual networks and communities. By design, social media is internet-
based and generates quick communication of content electronically. The content includes
personal information, videos, and photos. The users engage with social media often via
personal computers or smartphone or they can be easily accessed by software or web
application. Social networking sites (SNS) are online services that emphasise the creation of a
connection between people to enable them to share their interests. These network sites allow
people to share their information in a particular group. Therefore, the main purpose of the
social networking sites is to allow people to share their real-life interests, activities and
experiences. Social networks refer mainly to the means used for interaction, which have
become phenomena of growth in the social and academic
field. Social media allows people and organisations to create, participate and share new or
existing content through multi-way communication. Commonly, the phrase "social network
sites" is
used as a general term for all social networks, including Facebook, Twitter and Myspace. Over
the past decade, every social networking application has worked collaboratively to provide a
completely new multimedia experience that can now be accessed via mobile devices.
Competitive social media applications such as Facebook, twitter and WhatsApp have
captured the attention of the world. This has led to an increase in the user population of over
300 million to 1.1 billion users. It is a question of the true strength of the three brands of social
media applications that remain to provide the best service and interest for the diverse
backgrounds of the community. One of the main reasons this media application is gaining
popularity worldwide is because it is easy to communicate in many different ways whether via
voice, email, picture message, or even sharing information links with just one click. But
unknowingly, there is also danger in cyber security.
In today's internet-accessing social media, we are unaware of the dangers that can be
encountered in cyber security issues. One of the accidental issues of the use of social media
networks is violation of the security of personal information, which has been reported
repeatedly in the media. There are several forms of cyber-crime, first, cyberbullying in which
someone who commits online bullying can embarrass or intimidate the victim and disturb the
victim's thoughts and emotions. The second is phishing emails. Phishing is an act of sending
an email to someone that looks like a legitimate email from an agency for the purpose of
obtaining the recipient's personal information.
Internet users need to focus on cyber security in their daily lives. The government
does not have the power to block all the social media from abusing the Internet. Thus,
3
consumers need to increase their awareness to fight cybercrime. However, the question here is
to what extent are the social media users aware of these cyber security issues? Therefore, this
study was conducted to explore and answer the above issues and questions.
Social media in the first instance was originated majorly for interaction between a
group of users. But later due to its popularity, it was also adopted by various organisations
for the purpose of making business and making their organisation much popular in the world.
These kinds of websites helped the business organisations to come close with its customers.
Through social networking sites, users can keep their interpersonal relationship with their
friends and users can send private messages, can use chat rooms and other methods of
communication. Nowadays, online social networks involve people from the entire world, of
any age and with any kind of education. They also helped to increase computer usage among
categories that previously showed little interest for it.
4
How do Social Media security issues arise?
Social media is possibly the most vital sector of the internet but being open and
social creates legitimate concerns about privacy and safety. Headlines warning of online
security breaches are just one reminder of the vulnerability of all websites, including social
media outlets. Despite these justifiable security concerns about the Web, some of the reasons
a person's social media account is compromised are self-induced.
1. Forgetting to log out: While using social media websites in a cybercafé or in friend’s
mobile/laptop, many users forget to logout their accounts. So, when the other person starts
using that mobile/laptop, he gets access to the account information. This means the person is
in command of your account and use it for any purpose. The person who gets access to your
computer can access your account, change the password or even post items and communicate
with your friends as if they are from your side.
2. Logging in on fake website: We usually search for a social media website using Google
search engine. Each and every social media website has its official website or mobile app.
Without using that official website address, we usually take the help of a search engine.
These search engines most of the times take us to the official website but some time we are
redirected to any fake website. We assume this as the official website but when we insert our
user credentials, we are redirected to some other website.
3. Lack of Privacy: Each and every social media website is inbuilt with some privacy
features which help users to secure their accounts. Many of the times, we don’t use these kind
of features which can lead us to a possible trouble. These features are like keeping the
login email id, date of birth to only me. Many a times, we fail to understand the privacy
features of a social media website and we are unaware of utilising it. The public access
to contact information becomes a key concern for arising any security breach in users
account.
4. Clicking on Enticing Ads: Viruses and malware often find their way onto your computer
through those annoying, but sometimes enticing ads. These kind of ads are some
common. A person uses these enticing ads to steal the information of any social media
website. When we see such kind of an ad, we are in keen interest to know the more
information behind the ad.
5. Using Third Party Apps: Third party apps are now part and parcel of social media
websites. Users are seen busy on social media websites while using these kinds of apps. Now
a days, the social media website like Facebook is showing the appearance of its user to his
friends that you friend is online and is playing this kind of game. The person who wants to
use these kind of apps needs to grant access to the third-party app and then can use these
kinds of apps. While some apps demand apps to personal information while as some demand
for contact information.
6. Common Passwords: Using a common password in online accounts is yet another major
concern. Many users use only one common password for different kind of accounts.
Sometimes if one account is hacked for one or the other reason, the person gets in trouble
as the hacker is now in command of all the social media accounts. Lack of
understanding to set a strong password is unavailable among the social media users.
5
7. Clicking malicious links: Hackers usually send a link to victims and the victim is asked
to click the link to claim a special offer. The victim clicks the link and is redirected to another
website immediately where he finds nothing like an offer. The user then is in trouble as the
information of his social media website is leaked and is automatically sent to the hacker. The
hacker gain access to his account and can perform any kind of activity on the victim’s
account.
8. Using Virtual Private Networks: We usually use Virtual Private Networks to access
those sites which are blocked by our network administrator. However to by-pass the ban, we
make use of Virtual Private Networks apps which keep tracking our data in the
background. These Private networks sometimes become helpful for us but may cause of
many security issues.
As per the privacy analytics viewpoint, determinants would oversee the advantages
and pertaining dangers that influence a user’s choice to unveil certain credentials. It
additionally proposes that individuals are infrequently eager to forego some privacy for an
adequate level of danger. By utilising Social Networking Sites, people open themselves to
different sorts of dangers that have the regular impact of breaking their privacy. It had
witnessed that privacy may be attacked in a few ways if personal information is not utilised
reasonably and dependably. The creators recommend that restricted in which protection can
be attacked is through unapproved access to social user information because of privacy break
or poor strategies disablement. In addition to that, they had estimated the privacy intrusion
can likewise happen as optional utilisation where information gathered for one design is
utilised to meet different closures, without the l earning or assent of the information
proprietor. Nonetheless, if the proper information strategies and practices furnish people with
control over the revelation and utilisation of their own data, protection concerns can be
intervened. In a comparable strand, the hypothesis stipulates that divulgence is certain to
solid instruments that permit users to control the amount they uncover in light of their
objectives, learning and mentalities toward protection. In the connection of online social
range interpersonal communication, such limit regulation can be accomplished through the
utilisation of privacy settings. These securities setting improve users’ capacity to reveal the
information and additionally paving way for giving information of settings to the need.
6
Types of possible Threats in Social Networking Sites
The security issues and privacy concerns are the major requirements of the social
networking sites. But there were many deadliest attacks persists in all these social networking
sites and safeguarding the potential users from this heinous attack have been the challenging
task of many social analyst and developers. The basic security attacks are classified into three
categories.
• Privacy Breach - Find link between nodes and edges and possibly identify the relation
between them.
• Passive Attacks - This is totally anonymous and undetectable.
• Active Attacks - Form the new nodes intrinsically and trying to connect to the linked nodes
and gain the access to the other nodes.
7
Predicting the behaviour of social media users
This study goes for discovering the privacy and privacy in social network sites locales
recognition among Social Media clients. A specimen of 250 understudies was chosen
haphazardly from distinctive piece of the world. A net of 185 polls were filled effectively and
returned. Almost 78% of the respondents were males, while about 22% of them were
females. On the other hand, roughly 72 of respondents were in the age bunch 20-35 years of
age. Be that as it may, the quantity of respondents in the age gatherings "between 28-41
practically got 19% where different gatherings 50 or more is right around zero. Instructive
level played a high effect subsequent to 58% are four years certification and graduate degrees
are 21%. The years of utilising Internet think about the commonality of interpersonal
organisation on the grounds that from those are utilising the web for over 10 years are 56%
and in the event that we connect the use with nature of SN it indicates 51 % for decently
recognisable and 49% for extremely well known. Then again 90% of this study populace is
utilising Facebook and 36 % utilising Islam Tag and 62% twitter so this is leeway for us to
think about Facebook protection model.
Social network sites destinations work to reinforce privacy settings. Facebook and
other long range social communication destinations limit protection as a major aspect of their
default settings. It's essential for clients to go into their client settings to alter their protection
choices. These locales like Facebook give clients the alternative to not show individual data,
for example, conception date, email, tele phone number, and business status. For the
individuals who decide to incorporate this material, Facebook permit clients to limit access to
their profile to just permit the individuals who they acknowledged as "companions" to see
their profile. Be that as it may, even this level of privacy can't keep one of those companions
from sparing a photograph to their own PC and posting it somewhere else. Be that as it may,
at present fewer social media site clients have constrained their profiles. For example, let us
take how the users to restrict the profile visibility to others in different social media sites:
• Facebook: Facebook's privacy setting for new users is set to Friends Only. To set this, visit
Settings > Privacy >
• Who can see your future posts?
• Twitter: Settings > Security and privacy > Privacy > Tweet Privacy > Protect my Tweets.
• LinkedIn: To change this: Settings > Account > Helpful Links > Edit your public profile.
• Google+: To change this setting, type the name of a Circle in the "To" field below your
post before you publish it.
Facebook could plainly express that they could give no assurances with respect to
the privacy of their information, and that if clients make their profiles open, all data contained
in that may be seen by occupation questioners and school chairmen. Keep in mind most long-
range informal communication destinations encourage to quit applications, conceal
companion rundown and shroud intrigues. However much of the data is still open as a matter
of course. It is crucial that all long-range interpersonal communication destinations clients
limit access to their profiles, not post data of unlawful or arrangement disregarding activities
to their profiles, and be wary of the data they make accessible.
8
Trust Management and Issues
Late research has investigated the relationship between the online revelation of
individual data and privacy concerns and the high hazard identified with online ruptures of
protection. It was also well suggested that privacy is a term that is hard to characterise;
legitimately, it alludes to one side to be not to mention, yet it can likewise incorporate the
privilege to choose the degree to which individual data is revealed, the privilege to focus on
the point when, how, and what data can be imparted to others. Finding that one's own
particular private data has been scattered internet, including humiliating photographs or
features that are recovered through phishing tricks or deficient protection limitations, speaks
to a genuine mental danger. On Facebook, the setting is liquid and flimsy, which has
imperative ramifications in regard to the administration of privacy on Facebook. Clients'
impression of their gathering of people are frequently thought little of as far as both size and
scope, and the protection administration settings are regularly entangled, futile, and demand
particular assessments. Privacy dangers are regularly thought little of, while the social
advantages emerging from the revelation of individual data are frequently overestimated.
Besides, online ruptures of privacy are as often as possible thought to be a working's piece of
Facebook, and solicitations for individual data don't stress clients. These attributes of privacy
administration impact web unveiling conduct and clients view they could call their own self-
revelation.
9
social security number on any networking site. If such information is shared it would be
very easy to fall victim to crimes ranging from stalking to identity theft.
10
7. What Goes Online Stays Online:
When sharing information online it is important for people to realise the permanence of
what they type or download. Once information goes on the Internet, through social
networking, microblogging, etc., it is difficult, if not impossible to remove. In some
instances, the information may even be captured via screen shot and used on blogs or
news sites. Depending on what was originally submitted, the information can prove
detrimental for future job prospects, relationships, and may even leave a person
vulnerable to crimes.
11
who own the social media account receives a text code on his registered mobile number
to grant access to a new login on his account.
12
Program to create security systems for age-appropriate access on social
media
Source code:
import java.util.*;
public class age
{
public static void main(String args[])
{
Scanner sc = new Scanner(System.in);
String name;
int age;
System.out.println("Hey, what's your name?");
name=sc.nextLine();
System.out.println(name+", How old are you?");
age=sc.nextInt();
if (age<16)
{
System.out.println("You can't login Instagram, "+name+".");
System.out.println("You can't login whatsapp," +name+".");}
if(age<18)
{
System.out.println("You can't login Facebook," +name+".");
System.out.println("You can't login Twitter," +name+".");
}
}
}
13
Output:
14