Professional Documents
Culture Documents
BS-PART 3
2K21/MC/107
MEDIA AMD COMMUNICATION
STUDIES
SOCIAL MEDIA
SOCIAL MEDIA
CYBER BULLYING
Bullying means to intentionally hurt, threat, abuse or to intimidate
another person and the word cyber adds the digitals foot prints
which included stated as to bully someone through electronic
means. With such advancement in technology by the time, the
excess and use of social media become quick and easy. Nowadays
teen cyber bullying is more famous because of the young bodies
are more engaged on social media and have a great interest in
online activities.
Cyber bullying or cyber harassment is often connected in hurting
or discriminate someone. On social media, activities of posting
rumors, threats, sexual remarks, hate speech, and insulting repeated
behaviors are stated as cyber bulling.
Cyber bulling can be done in many ways:
Other after effects are low self esteem, lose the ability to deal with
problems, frightened, disappointed, discouraged and even
expanded self-destructive ideation.
CYBER SECURITY:
Cyber security is the application of technologies, process and
controls to protect systems, networks, programs, and data from
cyber attacks. Or to protect against the unauthorized exploitation of
systems, networks and technologies. User’s data is protected under
good cyber security applications.
A strong cyber security strategy can provide a good security
posture against malicious attacks designed to access, alter, delete
or destroy an organization’s or user’s sensitive data.
Some examples of cyber security are: connect device only with
authorized wifi, use privacy options provided by mobile operating
systems like blockage of third party cookies, strong passwords and
updated security settings, download application from authorized
app store.
Challenges of cyber security are hackers, data loss, privacy, risk
management and viruses.
DARK WEB
It’s a hidden collective of internet sites, only accessible by a specialized
web browser. It is used for keeping internet actively anonymous and
private, which can be helpful in both legal and illegal applications.
Mostly internet user’s wants to protect their online identity that’s why
they access to dark web called as anonymization. Many illegal activities
are also very common on dark web like, people dealing with anonymous
communications and transactions, identity theft, buy and sell stolen data,
fraud, malware and hacking tools.