• الصفحة الرئيسية
  • إتصل بنا
  • سياسة الخصوصية
Logo
  • الرئيسية
  • أفكار
  • صحة
  • معلومات
  • عجائب وغرائب
  • تكنولوجيا
الصفحة الرئيسية IT Tips and Tricks Social Networking Sites What Are The Main Risks Of Using Social Networking Sites?

What Are The Main Risks Of Using Social Networking Sites?

الكاتب ahmed في 12:06 AM IT Tips and Tricks Social Networking Sites
Social Networking sites are those which are used to connect and share information with each other online. Millions of people worldwide are now regularly using these sites and their services. The major Social Networking sites which are mostly used are FaceBook, Twitter, Google Plus, Myspace and LinkedIn. People are using those sites and services for different purpose, ie. to connect with friends, to build or promote business, to meet and interact within the users etc. With increasing the uses of those sites for different purpose, increased the crimes and threats through those sites day by day. So before using social networking sites, you have to know about the risk of those. It may have the following risks while using them.

1. Possibility of virus attacks: With increasing the popularity of the social networking sites services makes ideal targets for attackers who want to have most impact by using least effort. So attackers can attack on millions of computers or personal information by using viruses or other third party applications. 

2. Possibility of accessing yours account: Web attackers may use those tools which allow them to unauthorized accessing and control of users account. They could access your private data and the data of your any contacts. 

3. Possibility of attacking through email: You are using personal email address for accessing on the Social Sites. The attacker may use your email address from social sites account to send e-mail with malicious URL or with requesting your personal information, which are appears to originate from a trusted social sites or services. For example you may get e-mails appearing as sending from FaceBook, Twitter etc. If you follow the instruction, you may disclose your personal information or compromise the security of your system. 

4. Possibility of Identity theft: Attackers can gather personal information from social networking sites accounts. They can gather enough Information from small information like e-mail, credit card or bank account etc. 

5. Possibility of attacking through Third-party applications: Some of the Social Networking Sites like FaceBook and Twitter allow you to add third party applications, including games, quizzes, or that provide additional functionality. They may have malicious contents which may harm your computer system. Even if they have not malicious contents, they might access information in your profile without knowing of you. Such gathered information may be used for advertisements, performing market research, sending spam email etc.

If you are using Social Networking Sites, you must be careful for the points which I have listed above to protect your personal information and your computer system. If you know about any other risks other than I have explained above or you have any comment you are welcomed to submit on comment session. 

You may also wanted to view the following related posts

  • What are the technical limitations of twitter accounts?
  • How to prevent your twitter account from being suspended?
  • The list of social bookmarking sites
  • List of Top Social Exchange sites
  • Top 12 things needs to know by the Facebook user
  • Most Important Tips for Search Engine Optimization (SEO)
  • List of top 7 Free bulk search engine submission tools
  • List of bad ways for building backlinks
  • List of good ways of building quality backlinks
  • List of top .edu forums or sites to create quality backlinks

You can view the following other posts

  • Solved MCQ of Database Management System (DBMS) Set - 3
  • Solved MCQ of System Analysis and Design Set-3
  • Solved MCQ of Data Structure Set - 2
  • Solved MCQ of Java for Java Proficiency test set-3
  • MCQ of C++ with answer Set-2
  • MCQ of Computer Networking with answer set-4
شارك المقال :
Tweet
✚

مقالات ذات صلة

التالي
المشاركةالتالية
السابق
المشاركة السابقة

تحويل كودإخفاء محول الأكواد الإبتساماتإخفاء

شكرا لمشاركتنا رأيك
Subscribe to: Post Comments (Atom)
  • Facebook
  • twitter
  • googleplus
  • youtube
  • linkedin

الأكثر زيارة

  • What is Information ?
    Information  can be defined as data that has been processed into a form that is meaningful to the recipient and is of real or perceived valu...
  • What is Information Technology?
    Definitions of  Information technology  ( IT ) It is a branch of engineering dealing with the use of computers and telecommunications equipm...
  • بالصور الفائزة بمسابقة ملكة جمال مصر 2017
    بالصور الفائزة بمسابقة ملكة جمال مصر 2017
    بالصور الفائزة بمسابقة ملكة جمال مصر 2017 لن تصدق من هي فرح صدقي ↓↓  لمشاهدة الصور والخبر كامل اضغط هنا  ↓↓ رابط المو...
  • Interview Questions on Stack and Queue in Data Structure set-2
    1) The queue in which the insertion takes place in the first position after of last element is a ...... A. priority B. dequeue C. circular D...
  • List of Top 65 Search Engine Submission Add URLs.
    List of Top 65 Search Engine Submission Add URLs.
    To get your site on the top ranking on the search engine results, Your site or URL must be indexed by Search Engines. For that you have to s...
  • List of Best Keyword Research Tools for Better SEO
    List of Best Keyword Research Tools for Better SEO
    Everyone needs to do keyword research work for the site before starting search engine optimization work as the first and most essential tas...
  • What are the different types of scheduling methods?
    Process scheduling is one way for a processor to handle n processes , by scheduling the execution process. Each process is executed one by ...
  • Solved MCQ on Database Backup and Recovery in DBMS set-1
    1) Which of the following is not a recovery technique? A. Deferred update B. Immediate update C. Two-phase commit D. Recovery management 2)C...
  • Solved MCQ on Distributed Database Transaction Management set-4
    1) Commit and rollback are related to .......... A. data integrity B. data consistency C. data sharing D. data security 2) The transaction w...
  • Solved MCQ on Fundamental of DBMS set-10
    1) Which of the following is not a characteristic of a relational database model? A. Table B. Tree like structure C. Complex logical relatio...

الأقسام

  • Artificial Intelligence(AI)
  • Backlinking
  • Basic IT
  • Best List
  • Blogging Tips
  • C
  • C#
  • C++
  • Computer Architecture
  • Computer Fundamental
  • Computer Security
  • Computer/IT Officer Exam
  • CSS
  • Data Mining and Warehousing
  • Data Recovery Tools
  • Data Structure
  • Database Management System
  • E-commerce
  • E-government
  • Internet & Web Designing
  • IT Law
  • IT Tips and Tricks
  • IT Tutorials
  • Java
  • JavaScript
  • Keyword Research Tools
  • MIS
  • Multiple Choice Question (MCQ)
  • Networking
  • Online Earning
  • Online IT Jobs
  • Operating System
  • Oracle Forms and Reports
  • Programming Guide
  • Programming Language
  • SEO
  • Social Networking Sites
  • Software Download
  • Software Engineering
  • System Analysis and Design
  • Top List
  • VB.Net
  • صحة
  • عجائب وغرائب

الأرشيف

  • ►  2017 (4)
    • ►  November (3)
    • ►  October (1)
  • ►  2016 (5)
    • ►  April (5)
  • ►  2015 (87)
    • ►  August (1)
    • ►  July (8)
    • ►  June (13)
    • ►  May (2)
    • ►  April (2)
    • ►  March (4)
    • ►  February (20)
    • ►  January (37)
  • ►  2014 (77)
    • ►  December (31)
    • ►  November (4)
    • ►  September (4)
    • ►  August (11)
    • ►  July (8)
    • ►  June (2)
    • ►  May (2)
    • ►  April (2)
    • ►  March (2)
    • ►  February (7)
    • ►  January (4)
  • ▼  2013 (132)
    • ►  December (11)
    • ►  November (6)
    • ►  October (4)
    • ►  September (6)
    • ►  August (16)
    • ►  July (9)
    • ►  June (9)
    • ►  May (12)
    • ▼  April (13)
      • Top 10 Secrets for Search Engine Optimization (SEO...
      • List of Best Keyword Research Tools for Better SEO
      • How To Claim Your Blog On Technorati?
      • Top 20+ Lists of Blog Search Sites and Directories
      • Top 7 List of High Paying File Sharing Sites
      • How to write a program in C using for Loop?
      • Top 10 List Of Stock Photography Sites To Earn Online
      • How to earn online through stock photography sites?
      • Top 10 Tips For Secure Use Of Social Networking Sites
      • What Are The Main Risks Of Using Social Networking...
      • How To Improve Your Blog Post Content For Better SEO?
      • Most Important Tips for Search Engine Optimization...
      • List of Top 65 Search Engine Submission Add URLs.
    • ►  March (23)
    • ►  February (6)
    • ►  January (17)
  • ►  2012 (59)
    • ►  December (15)
    • ►  November (20)
    • ►  October (21)
    • ►  September (3)

إنضم لنا

© 2017 أفكار جميع الحقوق محفوظة