Social media and cyber security are components of internet network security that many people are concerned about. Network security is one of the arching terms that describes the procedures and policies that are implemented by network administrators in order to keep track and avoid exploitation, unauthorized access, denial or modification of network resources. In relation to this definition, social media security is identified as the protection and prohibition of unauthorized use of social media platforms, such as Twitter and Facebook. Due to the intensified use of the internet globally, there has been increased concern on issues related to internet security. These issues range from social engineering to activism …show more content…
Some of the threats include software threats, spam, scams, frauds and identity theft. Software threats are among the most common form of cyber security threats that is affecting most users of mobile devices and the internet. Software threats are malicious pieces of computer application and codes that can either damage or steal one’s financial or personal information. Despite the threat posed to computer users, antivirus programs and applications have been made accessible in order to prevent the various software threats. In consideration to this, the implementation of a comprehensive security suite is expected to dedicate adware removal software and anti-spyware software that will provide a general protection from …show more content…
Mobile-phone viruses have the capability of infecting an individual 's cell phone and spreading to other related devices through the mobile-phone network. “Bluejacking” is a common trend in cyber security and involves sending of unsolicited or unwanted messages to users through the Bluetooth technology. The Bluetooth technology can be a major problem, especially if it is used to send threatening or obscene images and messages. “Bluesnarfing” is also one of the cyber crimes committed using Bluetooth devices. It entails stealing of data through Bluetooth-enabled devices. Though at times Bluetooth related cyber crimes might not be as rampant as those of computer hacking, it is advisable to always turn off one’s Bluetooth set after or when not in use (Hanson,