Premium Essay

Security from Social Media

In:

Submitted By meltons
Words 902
Pages 4
Security from Social Media

Shakion Melton

COMM/215 » Essentials of College Writing
March 23, 2015

Julie McCabe

Security from Social Media

Even though social media helps service members communicate with their families and stay in contact with current events, social media should be banned from all phases of the military because enemies of the military are using social media to target service members and service members themselves could unwittingly post sensitive information for everyone to see.
The Enemy is using Social Media against Us Just this past Saturday, “a previously unknown group calling itself the Islamic State Hacking Organization posted the names, photos and addresses of about 100 U.S. troops online, calling for attacks against them” (Castillo, 2015). According to the online article, “the file appeared to include information that is already available through public records and social media accounts” (Castillo, 2015). It also “claimed to have hacked military databases and said it was leaking 100 names so that our brothers residing in America can deal with you” (Castillo, 2015). While public records are not something that can be changed directly, the use of social media by military service members can be eliminated; therefore eliminating another possible threat to our Soldiers, Marines, Airmen and Coast Guard that serve in this country and abroad.
Service Members Make Mistakes As a service member myself, I have seen the errors from my comrades with regards to social media. Dates, times, the nature of mission, and other details could be posted on someone’s social media account like Facebook or Twitter, just to name a few, while communicating with family and friends. Although not a direct detailed listing of the event, the incident could easily be extrapolated from the simple post. Images can give potentially dangerous

Similar Documents

Premium Essay

Making Money

...Guidelines for Secure Use of Social Media by Federal Departments and Agencies Information Security and Identity Management Committee (ISIMC) Network and Infrastructure Security Subcommittee (NISSC) Web 2.0 Security Working Group (W20SWG) Version 1.0 September 2009 This document is publicly releasable Intended Audience This document is intended as guidance for any federal agency that uses social media services to collaborate and communicate among employees, partners, other federal agencies, and the public. Note: The Federal CIO Council does not endorse the use or imply preference for any vendor commercial products or services mentioned in this document. Guidelines for Secure Use of Social Media by Federal Departments and Agencies Page 2 TABLE OF CONTENTS INTENDED AUDIENCE............................................................................................................................................2 REVISION HISTORY ................................................................................................................................................4 ACKNOWLEDGEMENTS ........................................................................................................................................5 EXECUTIVE SUMMARY .........................................................................................................................................6 RISKS ......................................................

Words: 7347 - Pages: 30

Premium Essay

How Will the Advancement of Cyber Security Affect Communication on Social Media?

...selected a Cyber Security topic because it is a big concern for me how my information (the data) is stored online. This is a topic that everybody worries about because nobody knows where the cloud is or who has access to it. It seems to me that every week there are new headlines about hackers bringing an organization to its knees by doing things such as stolen funds, bad publicity, and embarrassing revelations that are on the front page news. Then I ask myself, how can we protect ourselves from these issues? I guess the best protection is for both ends to implement plans and procedures or maybe the best way to demonstrate the needs for those procedures is to perform a Cyber Security audit and implement the resulting recommendations. Moreover, work in conjunction with IT departments can ensure that implementing the resulting recommendations will make both sides of the social media communication more secure. Like most criminals, hackers look for easy targets. If your media has simple security issues that are easy to exploit, hackers will dive right in. If your infrastructure is strong on your end, hackers will become frustrated and move on to the next easy mark. Furthermore, in these days it is almost impossible to be in an online business with an organization that does not collect or hold personal identifying information like names, addresses, Social Security numbers, credit card numbers, or other account numbers. So, how comprehensive is Cyber Security if it cannot...

Words: 2159 - Pages: 9

Premium Essay

Social Media and Business

...Social Media and Business Social media has always been a threat to not only security but also reputation of a business. Employees today have access to all kinds of social network sites to include Facebook, Myspace, Twitter, Instagram, online blogs, and many more. These sites are easily accessible to the user from their computer, tablets, and cellphones through various types of applications. Through my research I was able to find a trend in users using these media outputs to accidently leak information unintentionally and even intentionally. I found that any business can be susceptible to having data leaked and reputations tarnished from employees not handling social media correctly. I will cover this area of expertise, technology involved, future trends, security issues, some businesses involved, regulatory issues that arise, what business can do to handle social media, and global implications. When you consider what technology is being used most users will think of physical equipment. While this is the case that is the access medium that is used when thinking of social networking. Social media can be accessed in various ways to include your home computer, office computer if they allow you to view such sites, tablets, and your phone that could not be regulated depending on if it is a company phone. These access mediums must be regulated and users educated on the proper use of these devices. There are different types of online technologies that can be used to access social...

Words: 3437 - Pages: 14

Premium Essay

Social Media

...Social Networks and their impact on Availability, Confidentiality and Integrity Musa Ramadhani Davenport University IAAS 667 - Legal and Ethical Security Topics Deanne Cranford-Wesley Table of Contents Abstract 3 Introduction 4 Problem Statement 7 Literature Review 8 Findings 11 Military Families 12 Identifying your social media users 16 Common myths about Social Media 17 Data leakage and non-disclosure 17 Social Media Squatting 18 A new generation of hackers 18 The high cost of inaction 19 Harm to brand reputation 19 Lost productivity 19 Strains on bandwidth 20 Implementing effective Practices 20 Recommendations 21 Creating an Account 21 General Recommendations 22 Conclusion 26 References 28 Abstract Social networking sites spread information faster than any other media. Over 50% of people learn about breaking news on social media. 65% of traditional media reporters and editors use sites like Facebook and LinkedIn for story research, and 52% use Twitter. Social networking sites are the top news source for 27.8% of Americans, ranking close to newspapers (28.8%) and above radio (18.8%) and other print publications (6%). Twitter and YouTube users reported the July 20, 2012 Aurora, CO theater shooting before news crews could arrive on the scene, and the Red Cross urged witnesses to tell family members they were safe via social media outlets. In the same breath one could argue that social media enables...

Words: 6827 - Pages: 28

Premium Essay

Privacy and Security at the Digital Age: the Innovation of Business in the Online World

...Privacy and security at the digital age: The innovation of Business in the online world Over the past decade the world has solely relied upon technology and its transformation throughout the years allowing for the revolution of social media to completely change how everyone communicates especially for businesses, allowing them to extend out and provide large opportunities for themselves. According to ISACA (2010), through the use of social media, it allows businesses to gain serious advantages through research and evaluation of their competition, their consumers, and the market. This enables them to not only help develop them to be on top of their issues, but using it as a tool for enhancing a better relational experience with employees and customers. For businesses to be successful with their organisations or products, social media is the key to their communication with their stakeholders through privacy and security, where it strongly impacts business to improve, but can be considered also to be a big risk where that barrier can be invaded, which can cause legal and ethical issues. Privacy and security are known to be the most important issues surrounding social media and the innovation of businesses today. Although it may be argued that users voluntarily sign away their privacy by using these social media when creating accounts and putting their personal data online, it is not clear how consent actually works in these situations (Custers et al. 2014). But overall privacy...

Words: 1757 - Pages: 8

Premium Essay

Employing Information Security Awareness to Minimize over-Exposure of Average Internet User on Social Networks

...International Journal of Scientific and Research Publications, Volume 4, Issue 1, January 2014 ISSN 2250-3153 1 Employing Information Security Awareness to Minimize Over-Exposure of Average Internet User on Social Networks WorawitBinden*, MaheedeenJormae**, ZakariaZain***, Jamaludin Ibrahim**** worawit.inter@gmail.com*, maheedeen@gmail.com**, zakariazain13@gmail.com***, jamal55@gmail.com**** Department of Information Systems, Kulliyyah of Information and Communication Technology, International Islamic University Malaysia ABSTRACT-Use of Online Social Networking Sites (OSNs) has become ubiquitous nowadays. In the era of a million user social networking sites throughout the world, it becomes increasingly difficult for people to control what they are exposing to whom. In this paper we analyze the influence of social media interactivity features on the exposure of personal data of average Internet user and present techniques to implement information security awareness to minimize overexposure on OSNs. Index Terms-Online Social Networking, Information Security Awareness, Social Network Interactivity Features I. INTRODUCTION nformation is vital to communication and a critical resource for performing work in organizations. It is also important to individuals, and therefore the need to proper manage it well, is growing rapidly. Protecting data is as important as protecting cash as it is asset – and requires just as much care and planning. Now more than ever, people need...

Words: 4473 - Pages: 18

Free Essay

Project Part 2 Identify Social Networking Apps for Planned Transformation

...Project Part 2 Identify Social Networking Apps for Planned Transformation Research and Analysis Online retailers, computer companies, and other more traditional brick & mortar type companies are leveraging social media to boost e-Commerce sales.  While other companies appear ready to consider a marketing option that includes at least some aspect of social media, Starbucks, Dell, and JetBlue are not waiting on the sidelines, they are leading the way and have enjoyed increased sales as a result.. Online businesses that use social media to build their brand, and to assist in customer service, will rise to the top much faster than those who don’t. By working on your brand recognition on the most popular social media sites such as Twitter, Myspace, Facebook and YouTube, you can reach a much, much broader audience than traditional marketing methods. Benefits of Social Media and Social Networking Sharing content with thousands of followers at once isn’t the only benefit of social media for business. Small businesses all over the world have been discovering the ways social media can contribute to success and growth in all areas of their companies. As a business owner you should learned what your audience need are and effectively expand that brand to new customers. Always pay attention to the feedback that comes from perspective customers. Be aware of your competitors that is in your brand of market. The website traffic to and from your website and make that website as user...

Words: 869 - Pages: 4

Premium Essay

Patient Privacy Violations

...Introduction Social media has promoted communication. It has gathered people from all over the world to interact electronically without any movement. Social media tools such as LinkedIn, Facebook, Blogs and Twitter have enabled people to exchange information irrespective of where the person is located. Despite its advantages, social media may negatively affect healthcare because the healthcare providers are supposed to maintain confidentiality on patient’s personal information and medical history. The healthcare providers are supposed to comply with HIPAA privacy and security rule while using social media in order to evade lawsuits as a result of disclosing patient’s information on social media platforms. Based on Rienton (2013) examples, it...

Words: 2367 - Pages: 10

Free Essay

Social Media

...Social Media ENG Sandy Davis Social Media According to a study by Pew Research Internet Project, “Some 73% of online adults now use a social networking site of some kind. Facebook is the dominant social networking platform in the number of users, but a striking number of users are now diversifying onto other platforms. Some 42% of online adults now use multiple social networking sites”.(Social Media Update 2013) Even though social media is believed to have a negative effect on our culture, it has many positive benefits as well. How social media is changing healthcare, Healthcare facilities and providers have started to move in the direction of social media, they are coordinating these tools with their marketing and patient commitment. Healthcare facilities and health care providers that include physicians, nurses, pharmacists, and physical therapists, have a plethora of options when it comes to developing a presence online. They have the option of starting a blog or joining networks such as Facebook, Twitter, and MySpace. There are also online communities that are solely for the use of healthcare providers. Social media allows patients to interact with physicians and healthcare workers; it makes it possible for patients to be more informed when it applies to their healthcare procedures. Healthcare companies can take advantage of social media by creating surveys and blogs where patients can share their opinions and experiences Patients are taking a more active role in...

Words: 1524 - Pages: 7

Premium Essay

Argumentative Essay On Terrorism

...savage acts, to interview their members or to use material taken from international agencies with similar content. Do not seek a "scoop" at the expense of your country and its security. It is absolutely forbidden to broadcast messages, information or breaking news that may lead to the targeting of security forces, the uncovering of their positions or the identification of their areas of deployment, thereby giving terrorists a "free service" while trying to attack them or instigating attacks on them. It is absolutely forbidden to conduct live or recorded interviews, personally or via satellites, with individuals who are...

Words: 957 - Pages: 4

Free Essay

Social Issues

...Social problems have been a part of society for thousands of years. Some have vanished over time while others have uprooted to accommodate with the changing times of the world. Different countries share similar social problems as well as different ones. All countries have tried to find solutions for these problems such as the United States, Britain, Uganda, and China. The United States has a lot of social problems. Since there is a lot of land, a vast majority of different cultures have settled here. As a result of all these different cultures colliding, social problems are common. Poverty is one of these problems. In order to deal with this, the United States government has created Welfare Programs. These programs give poor families money to get food, shelter, etc. Food stamps are issued, insurance is provided to the unemployed, and Head Start schools are provided for children. On top of these, nonprofit organizations set up numerous funding drives for the poor. These all sound good on paper, but some of these people are taking advantage of these programs. Some people feel it's the government's job to provide for them instead of getting a job. As a result, the taxpayer is the one who pays for these people's needs. Since people get a free ride, the poverty rates remain high. In Britain, one of their major social problems is race related. Instead of having mixed communities, only a certain race lives in a neighborhood in northern Britain. As tension built up between these...

Words: 2712 - Pages: 11

Premium Essay

Cyber Threats

...TOP FIVE CYBER SECURITY THREATS FOR 2012 11 August 2012 ABSTRACT The ten cyber security threats in the IT world are boosts in mobile drives and in security tasks, increased C-suite targeting, growing use of social media that will contribute to personal cyber threats, being already infected, and everything physical can be digital. This paper discusses what these threats are, how to defeat and/or demonstrate proficiency in defeating the cyber threats, and the rising importance of cyber security at the work place. These security threats are becoming more common every day. Workplaces and personal lives are being attacked by using smaller more mobile devices. Therefore these cyber threats will be talked about in Therefore, these cyber threats will be assessed, to give you an idea of what they can do to your company or life, and the proper response on how to mitigate them.   TOP FIVE CYBER SECURITY THREATS FOR 2012 With cyber security becoming an issue in todays corporate society the corporate world is looking into all of the threats to mitigate the leaking of sensitive information to the public. This has come to light with hactivists conducting large-scale exploits to infiltrate law enforcement agencies and major companies and steal sensitive data that could embarrass or damage certain organizations (Wansley, 2012). In this paper the top five cyber security threats for 2012 will be assessed and talked about to help control, mitigate,...

Words: 931 - Pages: 4

Premium Essay

Communication Proposal

...the world. To do this we will explain how the use of social media, video and satellite conferencing, and Internet meetings will place Smith Systems at the top of their class in communications. Social media can contribute to success and growth in all areas of Kudler Fine Foods by providing networks and new channels for your brand's voice and content. Social media offers the opportunity to increase your visibility and grow brand awareness. Utilizing social media allows your customers to connect and interact with your business on a more intimate level. Interacting with your customers regularly is a show of accountability and good-faith for other customers. The Kudler Fine Foods brand will be mentioned on social media, i.e. Facebook, Yelp, where people can go to compliment a product or service received by the company. The more talk that is created by the people on social media, the more valuable and authentic your brand will seem to new customers. Almost all social media sites are free to use. This means that your company will be in direct contact with potential customers without having to pay a dime. Initially, you may need to send an email to current customers, asking them to follow, join, like, or friend you to get the process up and going. The cost associated with traditional marketing strategies are a lot higher than social media advertisement methods (10 Benefits of Social Media for Business, 2015). Social media is great for creating...

Words: 1225 - Pages: 5

Premium Essay

Music

...access to information and simplicity.” Baby boomers have needs. We want to change our positioning statement because in retrospect our initial positioning statement did not really all of the baby boomer needs we identified. We can co-create value by helping fulfill these needs. Table 1 shows a simple table defining the needs. In short they are: Relationship Building, Simplicity, Access to Information, and Privacy/Security. (Table 1: Needs) |Needs |Definition of the need |Gender |Justification that it is a need |Source/Citation | | | |Affected | | | |Relationship |Using technology to |Both |Baby boomers need to connect with friends and family. This |Mashable | |Building |sustain relationships. | |has driven a high growth rate. | | |Simplicity |Using technology must be|Both |Social Media must be easy to use. Must not make them feel |Mashable | | |easy, intuitive....

Words: 1080 - Pages: 5

Free Essay

Communication Barriers

...Communication Barriers and the Role of Social Media Communication as defined by Robbins, DeCenzo and Coulter (2013) is the “transfer of understanding and meaning from one person to another” (pg 328). Barrier, as defined by the Merriam Webster dictionary is “a natural formation or structure that prevents or hinders movement or action”. Thus, communication barriers are obstacles that prevent information from being communicated effectively. In our current workforce, communication is single handedly one of the most important aspects that contributes to the success of a business and its day to day operation. Robbins, DeCenzo and Coulter (2103) emphasize the importance of clear and astute communication and determine that “ineffective communication skills can lead to a continuous stream of problems for a manager” (pg 328). A thorough understanding of the communication process (pg 328) and its different stages is critical in identifying, preventing or resolving some of the main barriers that arise while communicating. Case Study- Twitter Crisis at Best Buy In an effort to keep up with the current technological advances, CEO of Best Buy Brian Dunn indulged in the world of social media and opened a “twitter” account where he used this a form of communication with his employees and customers as well (Robbins, DeCenzo and Coulter, 2013, pg 327). Shortly after this pursuit, Dunn’s account was hacked and relayed an inappropriate message to the world causing the company and its executive...

Words: 987 - Pages: 4