Cybersecurity: On Threats Surfing the Internet and Social Media
()
About this ebook
The world we live in today is characterized by an age of digital dependence. One of the biggest concerns in the 21st century for computer users is cybersecurity. Consequently, there are many threats facing social media users due to scams, cyberbullying and hackers. In this essay, we will learn about the existing issues revolving around social media as well as delve into some of the techniques and strategies used to better protect ourselves against many of the threats facing online users today.
Fiero Publishing Company
All rights reserved © 2022
Telly Frias Jr Cordero
Telly Frias, Jr. @tellyfr. Distinguished author, Bachelor's in Political Science, MBA awaiting and possesses a wide array of experiences in sales, logistics, web design, social networking, political campaigning, call centering, press and public opinion and more. Tremr.com staff pick member Please visit us @ www.telito.online for more information. Thank you for being a valued audience member! And thanks for your support.
Related to Cybersecurity
Related ebooks
Hacking the Future: Privacy, Identity, and Anonymity on the Web Rating: 3 out of 5 stars3/5Digital Footprints Rating: 0 out of 5 stars0 ratingsYou: For Sale: Protecting Your Personal Data and Privacy Online Rating: 0 out of 5 stars0 ratingsUnderstanding the Two Worlds of Social Media and Internet Rating: 0 out of 5 stars0 ratingsSeven Deadliest Social Network Attacks Rating: 0 out of 5 stars0 ratingsYour Right To Privacy: Minimize Your Digital Footprint Rating: 0 out of 5 stars0 ratingsHack Proof Yourself!: The essential guide for securing your digital world Rating: 0 out of 5 stars0 ratingsCracking the Fortress: Bypassing Modern Authentication Mechanism Rating: 0 out of 5 stars0 ratingsFirmware: 01 Hijacked Rating: 0 out of 5 stars0 ratingsProtect Your Personal Information Rating: 0 out of 5 stars0 ratingsBitcoin Blockchain A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsCryptocurrency and the Incompatibility with the Current Banking System: CRYPTOCURRENCY Rating: 0 out of 5 stars0 ratingsPractical Cyber Forensics: An Incident-Based Approach to Forensic Investigations Rating: 0 out of 5 stars0 ratingsBlockchain Exploit: She Cracked the Uncrackable Rating: 0 out of 5 stars0 ratingsHack Attack Rating: 0 out of 5 stars0 ratingsELECTRONIC BUSINESS CARDS Rating: 0 out of 5 stars0 ratingsNessus, Snort, and Ethereal Power Tools: Customizing Open Source Security Applications Rating: 0 out of 5 stars0 ratingsI Was Scammed Rating: 5 out of 5 stars5/5Crypto Crime Taming the Unforgiving Technology Rating: 0 out of 5 stars0 ratingsCryptocurrency Trading Guide : Mastering the Cryptocurrency Market: Techniques and Tactics for Profitable Trading Rating: 0 out of 5 stars0 ratingsGINI: Capitalism, Cryptocurrencies & the Battle for Human Rights Rating: 0 out of 5 stars0 ratingsCybersecurity Implications of Election 2016 Rating: 0 out of 5 stars0 ratingsHow to get free cryptocurrency Rating: 0 out of 5 stars0 ratingsCryptocurrency: Understanding Bitcoin, Bitcoin Cash, Ethereum, Ripple & Altcoins Rating: 0 out of 5 stars0 ratingsInternet of Things Complete Self-Assessment Guide Rating: 1 out of 5 stars1/5Bitcoinpreneur Rating: 0 out of 5 stars0 ratingsBitcoin Bandits Rating: 0 out of 5 stars0 ratingsI Was Scammed: Updated and Expanded Rating: 0 out of 5 stars0 ratingsYour Personal Information Is At Risk: A Guide For Protecting Yourself Rating: 0 out of 5 stars0 ratingsOpen Source Fuzzing Tools Rating: 0 out of 5 stars0 ratings
Internet & Web For You
No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State Rating: 4 out of 5 stars4/5How to Disappear and Live Off the Grid: A CIA Insider's Guide Rating: 0 out of 5 stars0 ratingsSocial Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5Coding For Dummies Rating: 5 out of 5 stars5/5How to Be Invisible: Protect Your Home, Your Children, Your Assets, and Your Life Rating: 4 out of 5 stars4/5Everybody Lies: Big Data, New Data, and What the Internet Can Tell Us About Who We Really Are Rating: 4 out of 5 stars4/5Six Figure Blogging Blueprint Rating: 5 out of 5 stars5/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5The Beginner's Affiliate Marketing Blueprint Rating: 4 out of 5 stars4/5Grokking Algorithms: An illustrated guide for programmers and other curious people Rating: 4 out of 5 stars4/5The Gothic Novel Collection Rating: 5 out of 5 stars5/5Get Rich or Lie Trying: Ambition and Deceit in the New Influencer Economy Rating: 0 out of 5 stars0 ratingsCoding All-in-One For Dummies Rating: 4 out of 5 stars4/5200+ Ways to Protect Your Privacy: Simple Ways to Prevent Hacks and Protect Your Privacy--On and Offline Rating: 0 out of 5 stars0 ratingsPodcasting For Dummies Rating: 4 out of 5 stars4/5Hacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5Remote/WebCam Notarization : Basic Understanding Rating: 3 out of 5 stars3/5Beginner's Guide To Starting An Etsy Print-On-Demand Shop Rating: 0 out of 5 stars0 ratingsMore Porn - Faster!: 50 Tips & Tools for Faster and More Efficient Porn Browsing Rating: 3 out of 5 stars3/5The Cyber Attack Survival Manual: Tools for Surviving Everything from Identity Theft to the Digital Apocalypse Rating: 0 out of 5 stars0 ratingsThe Digital Marketing Handbook: A Step-By-Step Guide to Creating Websites That Sell Rating: 5 out of 5 stars5/5The Logo Brainstorm Book: A Comprehensive Guide for Exploring Design Directions Rating: 4 out of 5 stars4/5The Internet Is Not What You Think It Is: A History, a Philosophy, a Warning Rating: 4 out of 5 stars4/5How To Start A Podcast Rating: 4 out of 5 stars4/5How to Destroy Surveillance Capitalism Rating: 4 out of 5 stars4/5Introduction to Internet Scams and Fraud: Credit Card Theft, Work-At-Home Scams and Lottery Scams Rating: 4 out of 5 stars4/5
Reviews for Cybersecurity
0 ratings0 reviews
Book preview
Cybersecurity - Telly Frias Jr Cordero
Cybersecurity: On Threats Surfing the Internet and Social Media
––––––––
Telly frias jr
––––––––
FIERO PUBLISHING COMPANY
New York- Madrid- London
Copyright © 2018 United States of America. All Rights Reserved.
English version.
First Publication in Madrid, Spain.
Copyright © 2021 United States of America. All Rights Reserved.
Library of Congress- Cataloging-in-Publication Data
ISBN-10: 195676819X
ISBN-13: 978-1956768190
Disclaimer:
No part of this publication may be reproduced, stored in a system, retrieved, or transmitted in any form or by any means, mechanical, electronic, photocopier, recorded or otherwise without the prior written consent of the publisher.
––––––––
Design by Fiero Publishing Company. Second Edition.
Fiero Publishing Company is a registered trademark.
A picture containing text Description automatically generatedPrinted in the United States. Printed in Europe.
Author’s Note
Thank you for purchasing this book. I wrote this book while studying abroad for my master’s degree in Spain. Social media became a cause for concern for me because I noticed how many people were exploiting these tools to the detriment of society. I decided to write this book to explain some of my grievances to the reader. I've learned of the hazards of social media, some of which are discussed here. I'm sure you've probably noticed some of these dangers as well. Times are changing and we are changing with the times.
Table of Contents
Introduction ............................................................................... 01
1. Buying and Selling online ......................................................07
2. Cyberbullying and Kidnapping .............................................15
3. Famous People on Social Media .......................................... 24
4. Linkage and Spies ..................................................................29
5. Companies look at your profile ............................................33
6. Videogames linked to your Social Media account...............38
7. On Social Media, the more friends the better .....................43
8. Internet Cookies and Information exchange.......................48
9. Victims of Hackers ................................................................52
10. Cyberthugs and Cybersecurity ..........................................56
11. Black Market .......................................................................60
12. Cybersecurity Breaches .....................................................68
13. The Greatest Threats to Cybersecurity..............................81
14. Transhumanism ..................................................................86
15. Dating website ....................................................................90
16. Marea Cable ........................................................................98
Conclusion .............................................................................. 102
Data and Graphics ...................................................................105
Glossary ...................................................................................112
INTRODUCTION
The technological direction humanity is headed in the twenty-first century presents great risks and few benefits for users. Today, sociocultural life in cities is characterized by extreme digital dependence, that is, a situation where the population works largely using electronic devices. Firstly, when the internet was created in the 1970s, it really was a great innovation. Well, little by little our civilization began to change. We now acquire more and more information using less physical space to store data.
In fact, the progress made in being able to store information in the short term on a computer, and in the long term on the cloud has increased exponentially. We look ahead with anticipation of new technologies almost every year, when the market emerges with new devices, such as: PCs (personal computers), laptops, tablets, and smartphones which function as communication tools on social networks. Between 1999-2003 roughly 254 million computers were made obsolete. Gordon Moore (co-founder of Intel) observed more than 40 years ago that computer processing power doubles every two years. As a result, every year Americans eliminate 130 million smartphones, printers, keyboards, digital cameras, and other electronic devices.
The technological progress I am referring to is classified by distinguishing between device capacity and virtual memory on the cloud. The first limited and the last being infinite. Twenty years ago, only sixteen percent of U.S households owned a PC while today more than half of U.S households own a PC. A user conducts a search on the Internet to obtain new information, but also can make purchases and sales through cyberspace and communicate with others about any given subject matter. Undoubtedly, today there is a great variety of information available on the internet in the form of news, articles, videos, photos, audio and of course what we find on social networks. For the moment, we will talk about some of the risks that exist when communicating on the networks.
The fingerprints we leave on the internet keep track of our profiles and all related information. To address this point, let's think about it this way: friends, jobs, interests, photos, videos, comments, and other details of our lives are recorded in the database. In short, everything we communicate with others and publish online, whether it is our plans or pending events, produces certain vulnerabilities for users. Social networks reveal our personal interests, opinions, comments and even to a great extent the dynamics or logistics of a city. Such information generally compromises a city's security platform as it can be penetrated by criminals, terrorists, and others who can use this information for strategic planning and the execution of attacks.
The real world is not as beautiful as the sun or a rainbow that appears after the rain. There are bad human beings and there is competition among people. This rivalry has existed according to the Bible since the time of Cain and Abel. Regardless of who we are, we inadvertently make enemies. However, the important thing is not the approach towards enmity, but rather competition. Although there is also cooperation between human beings, except many friends come forward with their own interest in mind. It may be that a person aligns with you because you are successful in some aspect of your life or that the two of you have a common feeling towards some cause.
Despite our way of being, we will always have enemies in our lives. We cannot satisfy everyone. One way or another we acquire enemies who will want to harm us. The problem is that this paradigm has been duplicated in social networks. Unfortunately, the annoyance of dealing with evil people online is what disenchants users from participating in social media. With an online presence, it is inevitable to find cyber trolls who want to scold us on social networks. Certainly, it is easier for a coward to humiliate you online rather than to tell you to your own face. Arguably, if you were born in the 1990s, you probably belong to the last generation to experience bullying more in person than online. There are powers among the masses and social networks have been a key instrument in exercising this power. For example, the interdependence of a cyber union can be even more dangerous for users as there is a collective effort targeting counterparts. Among the dangers of social media are hacking, phishing, malware, and pretentious digital marketing campaigns. Do not fall for that. Obviously, social networks have been a great tool for digital marketing over the last decade.
This book will talk about the threats of surfing the internet and participating on social networks. Everything that can happen on social media is really in the hands of the users. We are chosen as targets for business marketing, by hackers and cyber trolls every time we navigate social media. We identify the lies in the marketing strategies of companies. We answer the following questions What is the purpose of sharing data? Is data sharing done for the purpose of making our lives easier? and Does