Security Implication of Social Networking in the Corporate Environment
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 5
Abstract
Abstract: Social media offers basic business inclinations to associations and affiliations, furthermore has most likely comprehended security perils. With a particular finished objective to reduce these security risks and still admire the benefits of social media affiliations must develop and maintain extraordinary social media use game plans. In any case, various affiliations are indeterminate of how to make fruitful social media techniques.Maybe, various affiliations either basically confine social media use all around, or have no methodology at all regarding social media usage. Both of these approaches are unacceptable. Affiliations that don't grasp social media disregard to acquire its gigantic points of interest and are inattentive to their opponents that do. Affiliations that essentially allow social media use with no methodologies or standards open themselves to security threats. This paper is proposed to display that the present information security game plans starting now set up at various affiliations can without a lot of a stretch be connected with spread social media. Along these lines, affiliations don't need to issue security methodologies and guidelines especially for social media. The paper tries to demonstrate that the essential security perils posed by social media would be had a tendency to by a better than average general security care program, nearby and specific and definitive shields
Authors and Affiliations
Sanjiv Kumar
Penetration Testing for Android Smartphones
One major challenge faced by Android users today is the security of the operating system especially during setup. The use of smartphones for communication, social networking, mobile banking and payment systems ha...
Automatic Detection of Social Engineering Attacks Using Dialog
Abstract: Cyber attacker target the weakest part of security system which is increasingly the people who use and interact with a computer-based system is the easiest way for cyber attacker to attack the user. A separate...
Secured Messaging Using Hybrid Compression Technique
In today’s era SMS message is very fast communication way. Communication done through SMS are more faster and simple. So many people are using SMS communication in their day to day life. Also confidential informa...
SGEDSS: Semantic Gene Expression Model for Communication Decision Supportsystem
Abstract: An effective decision support system needs to deal with several heterogeneous data sources. Sometimes, the knowledge was explored without integration data sources are wrong. Also, Decision support system is wea...
Intelligent Database Driven Reverse Dictionary
Abstract: The reverse dictionary identifies a concept/idea/definition to words and phrases used to describe that concept. You can enter a single word, phrase, or a few words to get the correct meanings for that sen...