Sosyal Medya Kullanımında Güvenlik Riskleri ve Korunma Önlemleri

Sosyal medya kullanıcı tabanlı olmakla beraber büyük kitleleri bir araya getiren kullanıcıların kendi ürettiği içeriği paylaştığı online bir ağdır. Sosyal medya kişiler ve kurumlar arasındaki etkileşimi arttırması nedeniyle günümüzde aktif olarak kullanılmaktadır. Sosyal medya sahip olduğu büyük potansiyeli nedeniyle kötü niyetli kişilerinde dikkatini çekmektedir. Saldırganlarda kurbanlarına ulaşmak için sosyal medyayı aktif olarak kullanmaktadır. Kişi ve kurumları etkileyen geniş çaplı bu tehditlere karşı büyük ölçekli güvenlik yatırımları yapılsa da kesin olarak çözüm bulunamamıştır. Bu çalışmada, sosyal medyada ortaya çıkan güvenlik zafiyetleri, alınabilecek önlemler ve korunma yolları tanımlanarak son kullanıcı farkındalığı yaratılmak amaçlanmıştır.

Security Risks and Safeguard Measures in Social Media Usage

The social media is a user-based online network that brings large masses together, where users share their own content. Social media is actively used today since it expands the interaction between individuals and institutions. Due to its great potential, social media also attracts the attention of malicious individuals. The attackers also use social media actively to reach their victims. Although large-scale security investments are made against these widespread threats affecting individuals and institutions, no definite solution has been found yet. In this study, it was aimed to increase awareness of end-users by identifying the security weaknesses in social media, measures that can be taken and the ways of protection.

___

  • Ceron A. Internet, news, and political trust: The difference between social media and online media outlets. Journal of Computer-Mediated Communication, 2005;20(5):487-503.
  • Rice E. Barman-Adhikari, A. Internet and social media use as a resource among homeless youth. Journal of Computer-Mediated Communication, 2014;19(2):232-247.
  • Primack BA, Shensa A, Escobar-Viera CG, Barrett EL, Sidani JE, Colditz JB, James AE. Use of multiple social media platforms and symptoms of depression and anxiety: A nationally-representative study among US young adults. Computers in human behavior, 2017;69:1-9.
  • Humphreys L, Von Pape T, Karnowski V. Evolving mobile media: Uses and conceptualizations of the mobile Internet. Journal of Computer-Mediated Communication, 12013; 8(4):491-507.
  • Lee CS, Ma L. News sharing in social media: The effect of gratifications and prior experience. Computers in human behavior, 2012;28(2):331-339.
  • Sashi CM. Customer engagement, buyer-seller relationships, and social media. Management decision, 2012;50(2);253-272. Leavitt N. Mobile security: finally, a serious problem? Computer, 2011;(6):11-14.
  • Joshi P, Kuo CC J. (2011, July). Security and privacy in online social networks: A survey. In Multimedia and Expo (ICME), 2011 IEEE International Conference on (pp. 1-6). IEEE.
  • Grégoire Y, Salle A, Tripp TM. Managing social media crises with your customers: The good, the bad, and the ugly. Business Horizons, 2015;58(2):173-182.
  • Weinberg BD, Pehlivan E. Social spending: Managing the social media mix. Business horizons, 2011;54(3):275-282.
  • Goh DHL, Ang RP, Chua AY, Lee CS. (2009, October). Why we share: A study of motivations for mobile media sharing. In International Conference on Active Media Technology (pp. 195-206). Springer, Berlin, Heidelberg.
  • Kietzmann JH, Hermkens K, McCarthy IP, Silvestre BS. Social media? Get serious! Understanding the functional building blocks of social media. Business horizons, 2011;54(3):241-251.
  • Bakardjieva M, Smith R. The Internet in everyday life: Computer networking from the standpoint of the domestic user. New Media & Society, 2001;3(1):67-83.
  • Herring SC. Computer‐mediated communication on the Internet. Annual review of information science and technology, 2002;36(1):109-168.
  • Kotler P, Zaltman G. Social marketing: an approach to planned social change. The Journal of Marketing, 1971;3-12.
  • Kaplan AM, Haenlein M. Users of the world, unite! The challenges and opportunities of Social Media. Business horizons, 2010;53(1):59-68.
  • Forkosh BA, Hershkovitz A. A case study of Israeli higher-education institutes sharing scholarly information with the community via social networks. The Internet and Higher Education, 2012;15(1):58-68.
  • Kwon O, Wen Y. An empirical study of the factors affecting social network service use. Computers in human behavior, 2010;26(2):254-263.
  • Dawley L. Social network knowledge construction: Emerging virtual world pedagogy. On the Horizon, 2009;17(2):109-121.
  • Zhang Z, Gupta BB. Social media security and trustworthiness: overview and new direction. Future Generation Computer Systems, 2018;86:914-925.
  • Gupta R, Brooks H. Using social media for global security. John Wiley & Sons. 2013.
  • Makridakis A, Athanasopoulos E, Antonatos S, Antoniades D, Ioannidis S, Markatos EP. Understanding the behavior of malicious applications in social networks. IEEE network, 2010;24(5).
  • Liu BH, Hsu YP, Ke WC. Virus infection control in online social networks based on probabilistic communities. International Journal of Communication Systems, 2014;27(12):4481-4491.
  • Abraham S, Chengalur-Smith I. An overview of social engineering malware: Trends, tactics, and implications. Technology in Society, 2010;32(3):183-196.
  • Kunwar RS, Sharma P. (2016, March). Malware Analysis: Tools and Techniques. In Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies (p. 144). ACM.
  • Santos I, Brezo F, Sanz B, Laorden C, Bringas PG. Using opcode sequences in single-class learning to detect unknown malware. IET information security, 2011;5(4):220-227.
  • Rao UH, Nayak U. (2014). Malicious software and anti-virus software. In The InfoSec Handbook (pp. 141-161). Apress, Berkeley, CA.
  • Kara, İ., Aydos, M. (2019). The ghost in the system: technical analysis of remote access trojan. International Journal on Information Technologies & Security, 11(1).
  • Kara, I. (2019). A basic malware analysis method. Computer Fraud & Security, 2019(6), 11-19.
  • Kara, İ., Aydos, M. (2019, October). Detection and Analysis of Attacks Against Web Services by the SQL Injection Method. In 2019 3rd International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT) (pp. 1-4). IEEE.
  • J. Clerk Maxwell, A Treatise on Electricity and Magnetism, 3rd ed., vol. 2. Oxford: Clarendon, 1892, pp.68–73.
  • I. S. Jacobs and C. P. Bean, “Fine particles, thin films and exchange anisotropy,” in Magnetism, vol. III, G. T. Rado and H. Suhl, Eds. New York: Academic, 1963, pp. 271–350.
  • K. Elissa, “Title of paper if known,” unpublished.
  • R. Nicole, “Title of paper with only first word capitalized,” J. Name Stand. Abbrev., in press.
  • Y. Yorozu, M. Hirano, K. Oka, and Y. Tagawa, “Electron spectroscopy studies on magneto-optical media and plastic substrate interface,” IEEE Transl. J. Magn. Japan, vol. 2, pp. 740–741, August 1987 [Digests 9th Annual Conf. Magnetics Japan, p. 301, 1982].
  • M. Young, The Technical Writer’s Handbook. Mill Valley, CA: University Science, 1989.