Home > Essay examples > Secure Social Media Privacy: Protect Yourself from Cyberattacks with Tips from UN Human Rights

Essay: Secure Social Media Privacy: Protect Yourself from Cyberattacks with Tips from UN Human Rights

Essay details and download:

  • Subject area(s): Essay examples
  • Reading time: 4 minutes
  • Price: Free download
  • Published: 25 February 2023*
  • Last Modified: 22 July 2024
  • File format: Text
  • Words: 1,077 (approx)
  • Number of pages: 5 (approx)
  • Tags: Social media essays

Text preview of this essay:

This page of the essay has 1,077 words.



According to the UN declaration of human rights, social media privacy is a fundamental human right. Social media privacy has been discussed in different other conventions and termed fundamental in protecting individual human rights. These conventions include international covenant on civil and political rights (Santani). Importance of social privacy is that it reinforces the dignity of a human being in terms of freedom of expression and freedom of association. The privacy issues that social media users need to think about is how risk their personal information is. Research conducted in the year 2005 has indicated that over 60 percent of Facebook users who were asked to give their personal details gave their real information about their names and pictures. Cyber-attacks have become inevitable and they occur everywhere. Viruses are manufactured and send to social media platforms trying to collect critical information from the social media users. This is very dangerous because once correct data is given which is likely to be given, it will enable the cyber-attacks accomplish their ill missions. I have realized that with the current awareness on social media use, there will be reduced cybercrimes in the near future because people are becoming sensitive to uncertified notices that click and impart themselves on the documents that one searches. Social media privacy can only be controlled if people are warned against cybercrimes and how cyber-attackers get critical information from social media users so that people be careful with sharing their critical information.

 

 Having conducted an awareness of the dangers of cybercrimes, social media users will definitely change their behaviors. It goes without saying that no one wants to lose his or her wealth he has worked for years to unknown people. The intention of cyber-attackers mostly like what happened in the Russian bank where $ 6 billion were stolen is to steal from people. This happens when they get critical information from people and getting into the systems of companies to steal from them. Awareness will make social media users to disclose their critical information to people and social media platforms that they are sure of. It is true that people have embraced social media as a platform where they tell the world about their present situations. They use Facebook, Instagram, What sup and Twitter to communicate their knowledge to others and encourage each other accordingly. There is need that this sharing should not create a loophole where cyber-attackers will capitalize to steal from them by accessing vital information. Virtual Panopticon is discussed in chapter 16 of internet and social media where the government takes it upon itself to monitor the users of social media so that incase of any cyber-attack, the criminals could be tracked and charged accordingly. The use of social media is not within the control of an individual. As technology advances, people come up with new tricks of getting critical information and impersonating other people. The government should work hand in hand with the internet providers to monitor the use of social media in what is called the virtual panopticon so that her citizens can be assured of security despite many cyber-attackers.

The world largest network has witnessed the latest glitches and concerns. According to Said Jeffrey, use of scary has become scary than fun. The glitch was that Facebook allowed people to access the private accounts of people who were their friends and hence can see the conversations that the friends have engaged in. not so long ago, about two years to be exact, Facebook worked on changes where one signing up to Facebook was forced to choose on whether to avail his private information to the public or make it private and viewed by selected people. The changes has been failing from time to time and its users are doubting its credibility to protect their private information (Kumar). The glitches in the social media use has exposed users to private breaches because they are passively and actively attacked by the cyber-attackers. Hacking of the company information, attacks from malware, cyber bullying and information hijacking has been the end results of privacy glitches in social media use. Once the user is online in one of the social media platforms, a link is normally sent to the user from the cyber-attackers, upon opening the link, critical information of the user like the e-mail and password are requested from the user who give ignorantly. This information is then used by the attackers to hack the system that the user might be working for and they sent a malware to eat all the important information in the system so that they are not able to be identified. The concern about use of social media is growing and awareness is the first step of solving the problem as we embrace virtual panopticon

Due to hacking and malware attack as a result of ignorant use of social media, a number of ways are given to help the social media users control their media privacy. First and foremost, the social media profile should not be filled with correct information from the user. This will not disclose your email, mobile number and year of birth to dangerous people. Secondly, one’s social security number should be shared only to credible institutions like banks. Apart from social security number, it is important to secure one’s personal computer so that if any unauthorized person access it, it should be with the owner’s permission so that no critical information is stolen (Seyler). The browsing cookies, browsing history and internet files should be deleted by turning on private browsing so that no one accesses your personal computer. In principle, the name of the user should be secured in relation to his or her personal details. The name of the user is configured to google in that when one uses that name with the information that is related to that name like the date of birth and the email address, a notification is send to the user via a text message alerting him or her of the activity. In this way, the user will determine the issue that is being undertaken with his private information and take action before things gets worse.

Social media as a virtual community needs control in its use. This means that users need to understand the need for privacy as their right and not a privilege. Since it is our right for our information to be protected, social media controllers need to ensure that none of our information is mishandled.

Discover more:

About this essay:

If you use part of this page in your own work, you need to provide a citation, as follows:

Essay Sauce, Secure Social Media Privacy: Protect Yourself from Cyberattacks with Tips from UN Human Rights. Available from:<https://www.essaysauce.com/essay-examples/2018-10-30-1540866064/> [Accessed 03-10-24].

These Essay examples have been submitted to us by students in order to help you with your studies.

* This essay may have been previously published on EssaySauce.com and/or Essay.uk.com at an earlier date than indicated.

NB: Our essay examples category includes User Generated Content which may not have yet been reviewed. If you find content which you believe we need to review in this section, please do email us: essaysauce77 AT gmail.com.