0% found this document useful (0 votes)
112 views15 pages

Computer Science Project

This document discusses a computer science project on creating security systems for age-appropriate access to social media. It acknowledges help from teachers and principals. It includes an index and sections on the introduction of social media, why people use it, how security issues arise, possible threats, predicting user behavior, privacy settings, steps to ensure safety, and code to create age-appropriate access systems.

Uploaded by

Aishwarya Mahesh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
112 views15 pages

Computer Science Project

This document discusses a computer science project on creating security systems for age-appropriate access to social media. It acknowledges help from teachers and principals. It includes an index and sections on the introduction of social media, why people use it, how security issues arise, possible threats, predicting user behavior, privacy settings, steps to ensure safety, and code to create age-appropriate access systems.

Uploaded by

Aishwarya Mahesh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

Bishop Cotton Girls’ School

St marks road, Bangalore - 56001

Computer science project 2022-2023:


security systems for age-appropriate access to social media

Name: Aishwarya Mahesh B


Class: XI Science
Roll no.: 6
Acknowledgement

I would like to express my special thanks of gratitude to my Computer Teacher


Mrs. Priscilla Joyce for her able guidance and support in completing this
project. I would also like to extend my gratitude to our Principal Mrs. Lavanya
Mithran for providing me with all the required facilities. Secondly, I would also
like to thank my parents and friends who helped me a lot in finishing this
project within the limited time. Just because of them I was able to create my
project and make it goof and enjoyable experience.

1
Index

Sl no. Title Page no.

1 Acknowledgement 1

2 Introduction 3

3 Use of social media apps 4

4 Why do people use social media? 4

5 How do social media security issues arise? 5

6 Possible Threats and Privacy risk in Social Network Sites 6

7 Types of possible Threats in Social Networking Sites 7

8 Predicting the behaviour of social media users 8

9 Privacy Setup on Social Networking Sites 9

10 Steps to take to ensure social media safety 10

Program to create security systems for age-appropriate access on


11
social media

i.) Source code 13

ii.) Output 14

2
Introduction
Social media is a web-based technology which enables the sharing of information
with the help of building virtual networks and communities. By design, social media is internet-
based and generates quick communication of content electronically. The content includes
personal information, videos, and photos. The users engage with social media often via
personal computers or smartphone or they can be easily accessed by software or web
application. Social networking sites (SNS) are online services that emphasise the creation of a
connection between people to enable them to share their interests. These network sites allow
people to share their information in a particular group. Therefore, the main purpose of the
social networking sites is to allow people to share their real-life interests, activities and
experiences. Social networks refer mainly to the means used for interaction, which have
become phenomena of growth in the social and academic
field. Social media allows people and organisations to create, participate and share new or
existing content through multi-way communication. Commonly, the phrase "social network
sites" is
used as a general term for all social networks, including Facebook, Twitter and Myspace. Over
the past decade, every social networking application has worked collaboratively to provide a
completely new multimedia experience that can now be accessed via mobile devices.

In the larger context of data mining, a considerable measure of productive analysing


to learn can be found advanced records of human conduct in interpersonal organisations
without breaching the users’ privacy. Thus, information ought to be made accessible in a
manner that privacy should be safeguarded, and protection is extremely scrutinised. On the
other hand, the suspicion that any outsider who is intrigued to break down information can be
viewed as reliable is truth be told unlikely, because of the key point of preference that the usage
of all information, including recognising and delicate ones, may provide for these gatherings.
Due to the specific instance of interpersonal organisations, the most grounded measure that can
be received is to make unflinching quality of individual’s privacy who expresses the affiliation.

Competitive social media applications such as Facebook, twitter and WhatsApp have
captured the attention of the world. This has led to an increase in the user population of over
300 million to 1.1 billion users. It is a question of the true strength of the three brands of social
media applications that remain to provide the best service and interest for the diverse
backgrounds of the community. One of the main reasons this media application is gaining
popularity worldwide is because it is easy to communicate in many different ways whether via
voice, email, picture message, or even sharing information links with just one click. But
unknowingly, there is also danger in cyber security.

In today's internet-accessing social media, we are unaware of the dangers that can be
encountered in cyber security issues. One of the accidental issues of the use of social media
networks is violation of the security of personal information, which has been reported
repeatedly in the media. There are several forms of cyber-crime, first, cyberbullying in which
someone who commits online bullying can embarrass or intimidate the victim and disturb the
victim's thoughts and emotions. The second is phishing emails. Phishing is an act of sending
an email to someone that looks like a legitimate email from an agency for the purpose of
obtaining the recipient's personal information.

Internet users need to focus on cyber security in their daily lives. The government
does not have the power to block all the social media from abusing the Internet. Thus,

3
consumers need to increase their awareness to fight cybercrime. However, the question here is
to what extent are the social media users aware of these cyber security issues? Therefore, this
study was conducted to explore and answer the above issues and questions.

Use of social media apps


Social media is part of the technology that Web 2.0 has been developing as the
demand for it has increased. The most popular media that are used worldwide include blogs,
social sites and Wikipedia. As the media was developing, new technologies have influenced
procedures in various fields. Social media is a tool for collaboration, connecting the various
electronic media between individuals and across geographies and social environments. Social
media is a tool of communication and social media applications are a medium based on social
interaction and were developed to facilitate access to shared information. Users have easy
access to other users' personal information through social networking applications such as
Twitter, Facebook and Foursquare. This information-sharing activity by youths is motivated
by their hobbies and interests in better relationships. Some of the most commonly shared
information is related to school, employer, and personal information. Some youth or young
users ignore the importance of safety and privacy when sharing sensitive personal information
with the public. For example, sharing personal information is often done through user profiles
with friends through social media applications. It can be explained that social media is a must
for everyone to give virtual exposure, work, make space and connect through lifetime through
online discussions, opinions and evolution by incorporating changes or exposing original
content. The use of web-based social media technology is a communication medium. Despite
the various definitions, there are basically three underlying elements (content, communications
and Web 2.0) that support social media capabilities. Social media depends entirely on
technology and Web 2.0 technology enables people to use a variety of platforms to share and
discuss.

Why do people use social media?

Social media in the first instance was originated majorly for interaction between a
group of users. But later due to its popularity, it was also adopted by various organisations
for the purpose of making business and making their organisation much popular in the world.
These kinds of websites helped the business organisations to come close with its customers.
Through social networking sites, users can keep their interpersonal relationship with their
friends and users can send private messages, can use chat rooms and other methods of
communication. Nowadays, online social networks involve people from the entire world, of
any age and with any kind of education. They also helped to increase computer usage among
categories that previously showed little interest for it.

4
How do Social Media security issues arise?

Social media is possibly the most vital sector of the internet but being open and
social creates legitimate concerns about privacy and safety. Headlines warning of online
security breaches are just one reminder of the vulnerability of all websites, including social
media outlets. Despite these justifiable security concerns about the Web, some of the reasons
a person's social media account is compromised are self-induced.

1. Forgetting to log out: While using social media websites in a cybercafé or in friend’s
mobile/laptop, many users forget to logout their accounts. So, when the other person starts
using that mobile/laptop, he gets access to the account information. This means the person is
in command of your account and use it for any purpose. The person who gets access to your
computer can access your account, change the password or even post items and communicate
with your friends as if they are from your side.

2. Logging in on fake website: We usually search for a social media website using Google
search engine. Each and every social media website has its official website or mobile app.
Without using that official website address, we usually take the help of a search engine.
These search engines most of the times take us to the official website but some time we are
redirected to any fake website. We assume this as the official website but when we insert our
user credentials, we are redirected to some other website.

3. Lack of Privacy: Each and every social media website is inbuilt with some privacy
features which help users to secure their accounts. Many of the times, we don’t use these kind
of features which can lead us to a possible trouble. These features are like keeping the
login email id, date of birth to only me. Many a times, we fail to understand the privacy
features of a social media website and we are unaware of utilising it. The public access
to contact information becomes a key concern for arising any security breach in users
account.

4. Clicking on Enticing Ads: Viruses and malware often find their way onto your computer
through those annoying, but sometimes enticing ads. These kind of ads are some
common. A person uses these enticing ads to steal the information of any social media
website. When we see such kind of an ad, we are in keen interest to know the more
information behind the ad.

5. Using Third Party Apps: Third party apps are now part and parcel of social media
websites. Users are seen busy on social media websites while using these kinds of apps. Now
a days, the social media website like Facebook is showing the appearance of its user to his
friends that you friend is online and is playing this kind of game. The person who wants to
use these kind of apps needs to grant access to the third-party app and then can use these
kinds of apps. While some apps demand apps to personal information while as some demand
for contact information.

6. Common Passwords: Using a common password in online accounts is yet another major
concern. Many users use only one common password for different kind of accounts.
Sometimes if one account is hacked for one or the other reason, the person gets in trouble
as the hacker is now in command of all the social media accounts. Lack of
understanding to set a strong password is unavailable among the social media users.

5
7. Clicking malicious links: Hackers usually send a link to victims and the victim is asked
to click the link to claim a special offer. The victim clicks the link and is redirected to another
website immediately where he finds nothing like an offer. The user then is in trouble as the
information of his social media website is leaked and is automatically sent to the hacker. The
hacker gain access to his account and can perform any kind of activity on the victim’s
account.

8. Using Virtual Private Networks: We usually use Virtual Private Networks to access
those sites which are blocked by our network administrator. However to by-pass the ban, we
make use of Virtual Private Networks apps which keep tracking our data in the
background. These Private networks sometimes become helpful for us but may cause of
many security issues.

Possible Threats and Privacy risk in Social Network Sites

As per the privacy analytics viewpoint, determinants would oversee the advantages
and pertaining dangers that influence a user’s choice to unveil certain credentials. It
additionally proposes that individuals are infrequently eager to forego some privacy for an
adequate level of danger. By utilising Social Networking Sites, people open themselves to
different sorts of dangers that have the regular impact of breaking their privacy. It had
witnessed that privacy may be attacked in a few ways if personal information is not utilised
reasonably and dependably. The creators recommend that restricted in which protection can
be attacked is through unapproved access to social user information because of privacy break
or poor strategies disablement. In addition to that, they had estimated the privacy intrusion
can likewise happen as optional utilisation where information gathered for one design is
utilised to meet different closures, without the l earning or assent of the information
proprietor. Nonetheless, if the proper information strategies and practices furnish people with
control over the revelation and utilisation of their own data, protection concerns can be
intervened. In a comparable strand, the hypothesis stipulates that divulgence is certain to
solid instruments that permit users to control the amount they uncover in light of their
objectives, learning and mentalities toward protection. In the connection of online social
range interpersonal communication, such limit regulation can be accomplished through the
utilisation of privacy settings. These securities setting improve users’ capacity to reveal the
information and additionally paving way for giving information of settings to the need.

1. Breach of Information Disclosure:


The major setback of the privacy concerns deals that the user credentials is similar to a social
contract where the users trade their own data against financial or non-monetary rewards. It is
very obvious that judicious users will keep taking an interest in such a social contract the
length of the advantages surpass the present and future dangers of exposure. The suggestion
is reliable with the hypothesis, which sets that people settle on decisions that permit them to
experience greatest advantages and minimise expenses. It has been set to utilise the desi res to
reveal the user’s information given on Social Networking Sites. Since the proposed goal goes
for observing the impacts of intrinsic advantages, divulgence aim is part into two constructs,
one measures users pre-reward readiness to uncover while alternate measures their prize
propelled ability to reveal. The non-appearance of intrinsic–extrinsic qualification in earlier
works implied that revelation goal could be measured specifically from important free
develops.

6
Types of possible Threats in Social Networking Sites

The security issues and privacy concerns are the major requirements of the social
networking sites. But there were many deadliest attacks persists in all these social networking
sites and safeguarding the potential users from this heinous attack have been the challenging
task of many social analyst and developers. The basic security attacks are classified into three
categories.
• Privacy Breach - Find link between nodes and edges and possibly identify the relation
between them.
• Passive Attacks - This is totally anonymous and undetectable.
• Active Attacks - Form the new nodes intrinsically and trying to connect to the linked nodes
and gain the access to the other nodes.

7
Predicting the behaviour of social media users

This study goes for discovering the privacy and privacy in social network sites locales
recognition among Social Media clients. A specimen of 250 understudies was chosen
haphazardly from distinctive piece of the world. A net of 185 polls were filled effectively and
returned. Almost 78% of the respondents were males, while about 22% of them were
females. On the other hand, roughly 72 of respondents were in the age bunch 20-35 years of
age. Be that as it may, the quantity of respondents in the age gatherings "between 28-41
practically got 19% where different gatherings 50 or more is right around zero. Instructive
level played a high effect subsequent to 58% are four years certification and graduate degrees
are 21%. The years of utilising Internet think about the commonality of interpersonal
organisation on the grounds that from those are utilising the web for over 10 years are 56%
and in the event that we connect the use with nature of SN it indicates 51 % for decently
recognisable and 49% for extremely well known. Then again 90% of this study populace is
utilising Facebook and 36 % utilising Islam Tag and 62% twitter so this is leeway for us to
think about Facebook protection model.

Privacy Setup on Social Networking Sites

Social network sites destinations work to reinforce privacy settings. Facebook and
other long range social communication destinations limit protection as a major aspect of their
default settings. It's essential for clients to go into their client settings to alter their protection
choices. These locales like Facebook give clients the alternative to not show individual data,
for example, conception date, email, tele phone number, and business status. For the
individuals who decide to incorporate this material, Facebook permit clients to limit access to
their profile to just permit the individuals who they acknowledged as "companions" to see
their profile. Be that as it may, even this level of privacy can't keep one of those companions
from sparing a photograph to their own PC and posting it somewhere else. Be that as it may,
at present fewer social media site clients have constrained their profiles. For example, let us
take how the users to restrict the profile visibility to others in different social media sites:
• Facebook: Facebook's privacy setting for new users is set to Friends Only. To set this, visit
Settings > Privacy >
• Who can see your future posts?
• Twitter: Settings > Security and privacy > Privacy > Tweet Privacy > Protect my Tweets.
• LinkedIn: To change this: Settings > Account > Helpful Links > Edit your public profile.
• Google+: To change this setting, type the name of a Circle in the "To" field below your
post before you publish it.
Facebook could plainly express that they could give no assurances with respect to
the privacy of their information, and that if clients make their profiles open, all data contained
in that may be seen by occupation questioners and school chairmen. Keep in mind most long-
range informal communication destinations encourage to quit applications, conceal
companion rundown and shroud intrigues. However much of the data is still open as a matter
of course. It is crucial that all long-range interpersonal communication destinations clients
limit access to their profiles, not post data of unlawful or arrangement disregarding activities
to their profiles, and be wary of the data they make accessible.

8
Trust Management and Issues

Protection is a precondition for online self-divulgence, yet self-revelation


additionally diminishes privacy by expanding the measure of online data accessible to
different clients; the connections between these builds appear to be affected by critical
variables, for example, trust and control. Trust is characterised as the conviction that people,
gatherings, or establishments can be trusted. It frequently has an opposing association with
protection, if in light of the fact that individuals need to know data about others keeping in
mind the end goal to trust them, which thusly has a beneficial outcome on online self-
exposure. Then again, the advancement of trust in an online domain is unpredictable on the
grounds that the online world is characterised as frail. This is the reason a few studies have
concentrated on the inclination of individuals to unveil data on the premise of both trust and
protection. An imperative build that can impact this mind-boggling relationship is the
apparent control over data. For instance, word check, things constructed particularly, and
prepared rates are regularly used to quantify online self-divulgence, and adjustments of
instruments assembled for up close and personal correspondence are utilised to assess online
trust.

Privacy Setup on Social Networking Sites

Late research has investigated the relationship between the online revelation of
individual data and privacy concerns and the high hazard identified with online ruptures of
protection. It was also well suggested that privacy is a term that is hard to characterise;
legitimately, it alludes to one side to be not to mention, yet it can likewise incorporate the
privilege to choose the degree to which individual data is revealed, the privilege to focus on
the point when, how, and what data can be imparted to others. Finding that one's own
particular private data has been scattered internet, including humiliating photographs or
features that are recovered through phishing tricks or deficient protection limitations, speaks
to a genuine mental danger. On Facebook, the setting is liquid and flimsy, which has
imperative ramifications in regard to the administration of privacy on Facebook. Clients'
impression of their gathering of people are frequently thought little of as far as both size and
scope, and the protection administration settings are regularly entangled, futile, and demand
particular assessments. Privacy dangers are regularly thought little of, while the social
advantages emerging from the revelation of individual data are frequently overestimated.
Besides, online ruptures of privacy are as often as possible thought to be a working's piece of
Facebook, and solicitations for individual data don't stress clients. These attributes of privacy
administration impact web unveiling conduct and clients view they could call their own self-
revelation.

Steps to take to ensure social media safety

1. Be Cautious of Sharing Too Much:


When utilising a social networking website, people have the option of sharing personal
details with friends and followers. While sharing some information is okay, other facts
can reveal too much about who a person is. For the sake of personal safety, one should
never reveal their date and place of birth, home address or phone number, as this could
put them at serious risk for identity theft and fraud. In addition, it is extremely important
that a person never reveal their credit card numbers, banking information, passwords, or

9
social security number on any networking site. If such information is shared it would be
very easy to fall victim to crimes ranging from stalking to identity theft.

2. Adjust Privacy Settings:


Nearly all social networking sites have pre-set or default privacy settings. People often
feel that these setting are sufficient enough and never put forth the effort to make
changes. Altering one's privacy settings can allow the account holder to block strangers
and people who are not friends with them from viewing his or her private information.
These settings also limit what information is available in search results; for example,
Facebook allows the account holder to modify their settings so only their friends, friends
and networks, specific groups, or no one can see their status, photos, videos, likes, etc.
Privacy settings can be adjusted at any time; however, the account holder must log in to
make adjustments.

3. Verify Who You're Connecting With:


There are a number of reasons why a person may put up a false account. If there is ever
uncertainty about the authenticity of an account that claims to belong to a friend, is
important to check with the individual for verification. These accounts may be setup in
efforts to misrepresent themselves as another person in order to make false statements.
This may be done to embarrass someone or to create problems that either of a legal or
personal nature. False accounts may also be set up to for the purpose of sending people to
malicious sites or with the intent of committing fraud.

4. Keep Control of Comments – Be Aware of Impersonators:


Impersonation can be a problem when it comes to comments on networking websites.
Typically, people who are misrepresented online only need to ask that the impersonator
be removed. This can be a hassle; however, networking sites are beginning to require
commenters to go through an authentication process in which they are identified as
registered users or not.

5. Don't Share Personal Details:


Microblogging websites encourage people to share in the moment activities and slices of
life. For people who enjoy this sort of social interaction, they may find that they are
revealing too much about what is happening and as a result making themselves the ideal
victim for thieves and other criminals. Because these networks are visible to practically
everyone, a person should not reveal information that alerts criminals to their
whereabouts or other actions. For example, a person should never reveal where they are
vacationing, shopping, or traveling. It should also never be revealed when they expect to
leave or return home.

6. Check Out Your Own Account:


In order to ensure the security of one's account, it is wise to search for their profile from
the prospective of someone who is conducting a search. This step will let the account
holder know what others are able to view. When using a search engine to look for one's
profile they will also be able to see if there are any false accounts set up in his or her
name.

10
7. What Goes Online Stays Online:
When sharing information online it is important for people to realise the permanence of
what they type or download. Once information goes on the Internet, through social
networking, microblogging, etc., it is difficult, if not impossible to remove. In some
instances, the information may even be captured via screen shot and used on blogs or
news sites. Depending on what was originally submitted, the information can prove
detrimental for future job prospects, relationships, and may even leave a person
vulnerable to crimes.

8. Know How to Block Unfriendly Followers:


Nearly every social networking platform gives users a way to protect themselves from
harassment or unwanted contact. When joining a social network one should familiarise
them-self with how to block another member. Once a person has been blocked, he or she
will no longer have the ability to interact with the individual who has done the blocking.

9. Keep Passwords Strong:


Security is as important for one's social network account as it is for their computer or any
other account. Creating a strong password will prevent hackers from gaining access to
one's account and using it to post spam or malicious attacks. When creating a password,
it is important to choose one that consists of no less than eight characters. The characters
should consist of both letters and numbers and should be changed approximately every
three months. Using a password generator tool may help.

10. Single Sign-On: Open ID:


Using a single sign-on for multiple platforms is one way people can reduce the likelihood
of their passwords getting into the hands of identity thieves and hackers. OpenID is the
most common single sign-on to manage various accounts.

11. Be Careful of Over-Friending:


As a member of a social networking group, it can be exciting to gain new "friends" or
followers. Looking through the network it is easy to find members with high numbers of
friends, which can inspire a competitive streak in some. A high number of friends,
however, is not always positive. Some "friends" can be problematic by introducing spam
into one's timeline or some may even have criminal intentions. When accepting friends,
choose people who are actual friends.

12. Clearing browser history:


We usually make use of different kind of browsers where our username and passwords
are kept save by the browser. Those people who use our system may have access to
different websites where our login details are already saved. To avoid this security
concern, we should always clear the browser history.

13. Two factor verification:


Using two factor verification is considered by many social media websites. This
verification method helps to prevent unknown access to our account. Here the person

11
who own the social media account receives a text code on his registered mobile number
to grant access to a new login on his account.

14. Avoid clicking ads on social media:


social media is full of ads. The users always click different kinds of ads as these ads are
very much attractive. After clicking these ads, user is redirected to another website,
where is contact information become visible to attackers.

15. Avoid using third party apps:


Using third party apps is common today where a user downloads an app and when he
start to use it, he is asked to sign in with social media accounts. We sign in with
social media accounts and our information on our social media account gets shared with
the app. The app uses that information to access our account even the app become
capable of sharing contents on behalf of the person. So, to avoid such security issues, we
should never use our social media information to sign into any app.

12
Program to create security systems for age-appropriate access on social
media

Source code:

import java.util.*;
public class age
{
public static void main(String args[])
{
Scanner sc = new Scanner(System.in);
String name;
int age;
System.out.println("Hey, what's your name?");
name=sc.nextLine();
System.out.println(name+", How old are you?");
age=sc.nextInt();
if (age<16)
{
System.out.println("You can't login Instagram, "+name+".");
System.out.println("You can't login whatsapp," +name+".");}
if(age<18)
{
System.out.println("You can't login Facebook," +name+".");
System.out.println("You can't login Twitter," +name+".");
}
}
}

13
Output:

14

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy