You are on page 1of 6

UNZILA TAHIR

BS-PART 3
2K21/MC/107
MEDIA AMD COMMUNICATION
STUDIES
SOCIAL MEDIA
SOCIAL MEDIA
 CYBER BULLYING
 Bullying means to intentionally hurt, threat, abuse or to intimidate
another person and the word cyber adds the digitals foot prints
which included stated as to bully someone through electronic
means. With such advancement in technology by the time, the
excess and use of social media become quick and easy. Nowadays
teen cyber bullying is more famous because of the young bodies
are more engaged on social media and have a great interest in
online activities.
 Cyber bullying or cyber harassment is often connected in hurting
or discriminate someone. On social media, activities of posting
rumors, threats, sexual remarks, hate speech, and insulting repeated
behaviors are stated as cyber bulling.
Cyber bulling can be done in many ways:

 Cyber stalking: To monitor or observe the targeted identity in order


to harass or harm on the electronic medium. Or simply to stalk a
victim aims to threat the victim’s safety. Include, finding victim
location, harassing them with spam.
 Trolling: Trolling is another form of cyber bulling in which
offender try to provoke or discriminate intendedly to elicit a
reaction e.g. insults or false news.
 Spamming: Act of creating multiple accounts and sending
unwanted and suspicious messages to a victim with a disruptive
intention.
 Impersonating: To disguise in victim’s identity on social media
and do the mean comments, chatting and spreading rumors to hurt
the victim’s reputation. Offender does that on the behalf of victim
so that they may lose their credibility.
 Other cyber bulling examples are Doxing (act of disclosing the
victim’s personal data) and hate speech.
 Although cyber bulling can be done through smart phones which
not only affects mentally but also physically and emotionally.
Mentally: individual feel embarrassed, upset, or angry.
Emotionally: individual loses their interest in the things they like.
Physically: affects on physical fitness, health issues, suffering from
aches, and loss of sleep.

 Other after effects are low self esteem, lose the ability to deal with
problems, frightened, disappointed, discouraged and even
expanded self-destructive ideation.

 CYBER SECURITY:
 Cyber security is the application of technologies, process and
controls to protect systems, networks, programs, and data from
cyber attacks. Or to protect against the unauthorized exploitation of
systems, networks and technologies. User’s data is protected under
good cyber security applications.
 A strong cyber security strategy can provide a good security
posture against malicious attacks designed to access, alter, delete
or destroy an organization’s or user’s sensitive data.
 Some examples of cyber security are: connect device only with
authorized wifi, use privacy options provided by mobile operating
systems like blockage of third party cookies, strong passwords and
updated security settings, download application from authorized
app store.
 Challenges of cyber security are hackers, data loss, privacy, risk
management and viruses.

 HOW THE PRIVACY BREACH


 When someone access to victim’s information without permission
to get into the sensitive or confidential data. With the exposure of
data, it also theft or lost.
 Here cyber hackers and cyber criminals both work to access data
without authorization; not only access but they also stole the
sensitive information of victim.
 Personal information or confidential data may include the victim’s
identity, name, address, contact number, credit card details. Also
the data about thing can also breached, like the business plans and
the secrets of legal agents.
 Risk of data breach is more when you provide your information on
several places or sites for example: government agencies,
healthcare organizations, financial institutions, social network
platforms. That’s why cyber criminals often target organization
where they can harvest personal data of many.

 Privacy breach Vs. Data breach:


Privacy breach or data breach are both about the sensitive or confidential
information of a person. Privacy breach occurs when someone access
information without permission or we can say that privacy breach means
to break-in or exposes to information. Although privacy breach is simply
when someone viewed the personal data but data breach is also referred
as the sharing and exposing of data to unauthorized persons.
Where privacy breach means to go through the information or to just
view. While data breach mean to take or stolen confidential information
and share it.

 DARK WEB
It’s a hidden collective of internet sites, only accessible by a specialized
web browser. It is used for keeping internet actively anonymous and
private, which can be helpful in both legal and illegal applications.
Mostly internet user’s wants to protect their online identity that’s why
they access to dark web called as anonymization. Many illegal activities
are also very common on dark web like, people dealing with anonymous
communications and transactions, identity theft, buy and sell stolen data,
fraud, malware and hacking tools.

 Cyber criminals Vs. Cyber hackers:


 Cyber hackers: An individual with technical computer skills to
breach cyber security defenses. Cyber hacking is the practice of
intentionally exploiting weaknesses in an organization’s computer
systems. It aims to get into the data.
 Cyber criminals: They use technology to commit malicious
activities on digital systems. Identity thieves, internet stalkers,
cyber terrorist are called as cyber criminals. Instead of hacking,
cyber criminals use digital platforms to commit a crime such as
online harassment and drug trafficking.

You might also like