day3

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 25

Introduction to Social

Media
Role, Benefits, Threats
A CYBERPEACE
PRESENTATION
INDEX
The advent and rise in popularity of social media (Using graphs)

Role of social media- across all ages and races

Advantages of social media -education, entertainment, connectivity

Disadvantages of social media- addiction, misinformation, risky activities

Favourite hunting grounds for cybercriminals


OVERVIEW
The social media landscape has evolved into a dynamic, fast-paced
environment where platforms shape trends, influence culture, and
connect billions of users.

It's a space where influencers, brands, and everyday people share


content in real-time, generating waves of viral moments and
instant communication.

AI-driven algorithms and short-form videos drive engagement


today.

However, this vast digital playground has its challenges and


concerns. It is necessary to know how NOT to abuse this privilege.
Courtesy: https://www.qqtube.com/blog/when-did-social-media-
ACTIVITY – Social Media
Platforms
Facebook Reddit
Messenger
TikTok
Telegram
Tumblr Insta
LinkedIn
YouTube
Pinterest WhatsApp

Snapchat X

Twitch
Social media has exploded from
humble beginnings to an
unstoppable global force—and it's
THE not done growing yet.
SOCIAL But have you ever wondered when
it all began? What sparked the rise
MEDIA of this digital phenomenon, and
TIMELINE what did those early days look
like?
Let’s dive into the fascinating
history of social media, trace its
rapid evolution, and explore the
endless possibilities offered
THE It started with the birth of
platforms like SixDegrees in
FORERUNNE 1997.
RS Followed by:
• Friendster – 2002
• Myspace -2003
• Orkut - 2004
POPULAR
SOCIAL MEDIA
APPS
SOCIAL MEDIA
ALGORITHM
• Algorithms are complex sets of rules
and calculations used by social
media platforms to determine what
content users see in their feeds,
search results, and
recommendations. Relevanc
Content-Type
e
Engageme
Recency nt
ROLE OF
SOCIAL MEDIA

 Communication and
Connectivity
 Breaks the age and race
barriers, transcending
language and cultural gaps
 Education
 Entertainment
 Community Building
 Promotes e-commerce and
knowledge sharing
IMPACT
Commun
J ication
o Democra
OF b
s
cy

SOCIAL Commerce
a
To
n
Consumer
Connected
Communit
MEDIA ds y

C
Voice of Influence
athe on
r
people popular
e Expression of culture
e individual
r and group
s sentiment
THE UPSIDES
Personal Growth:
Social Online,
Offers an
Movements: Gives Collaborative
opportunity for
a voice to the Learning and Self-Learning
people to share
downtrodden and Interactive
innovative and
marginalized learning
creative ideas

Campaigns,
Strengthens Commerce And Health and
Contests, Alerts
Relationships Careers Wellbeing
and more

Promotion and
Preservation Of
Socia Culture, Good
Habits, and
History
THE DOWNSIDES
Need for
constant
Anxiety and Cyberbullyin Excessive
positive
Depression g screentime
reinforcemen
t

Fake news
Privacy and
and Echo
Brainwashing Security
misinformati chambers
concerns
on

Social
Disruption in
disparity and
focus
unrest
The key to a safe,
productive, and positive
social media experience
is being mindful and
responsible user
ASSOCIATED
CYBER THREATS
As social media platforms
continue to grow in popularity,
they have become a prime
target for cybercriminals
looking to exploit unsuspecting
users. The very features that
make social media so engaging
—connectivity, information
sharing, and global reach—are
also what make it a goldmine
for malicious actors.
PHISHING AND SOCIAL
ENGINEERING
Fake Accounts
Manipulati and
on of Trust Impersonation
.
Credential Investment
Harvesting and Ponzi
Schemes

Infrastructure
breakdown
DATA THEFT AND
PRIVACY BREACH
Over-sharing of Personal Information:

Exploitation of Weak Privacy Settings:


.

Account Hijacking And Identity Theft:

Fake profiles to carry out defamation/fraud.


MALWARE AND
RANSOM ATTACKS
Malicious Links and Downloads:
Cybercriminals often spread malware through
infected links shared via direct messages,
posts, or comments.

Trojan Apps and Games:


Seemingly innocuous third-party apps and
games may be embedded with malware. When
users grant these apps permission to access
their accounts, hackers gain entry to personal
data or can control the account itself.
FAKE NEWS AND
MISINFORMATION
Disinformation Campaigns

Clickbait and Fraudulent


Content

Sextortion and Social


Unrest
Online bullying can take different forms:

Trolling

Outing

Stalking
CYBERBULLY
ING Abusing

Blank Calls

Inappropriate Photos and Videos

Memes and Doctored content


ENHANCE YOUR SOCIAL MEDIA
SAFETY
• Maximise Privacy
• Maximise Security
• Use Strong, Unique Passwords
• Verify the Authenticity of Links,
Attachments, and Calls
• Be Wary of Suspicious Links and Profiles
 Share with care
L 2 9 - 34, First Floor +91 823 5058
Connaught Place, New Delhi - 865
110001 + 1- 202- 922-
611 Gateway BLVD Suite 120 2121
San Francisco, United States
CA- 94080

You might also like