Social Media: The Fastest Growing Vulnerability to the Air Force Mission - Cyberspace Issues, Facebook, LinkedIn, Twitter, Cybersecurity, Bring Your Own Device (BYOD), Safeguarding Personal Data

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Social Media: The Fastest Growing Vulnerability to the Air Force Mission - Cyberspace Issues, Facebook, LinkedIn, Twitter, Cybersecurity, Bring Your Own Device (BYOD), Safeguarding Personal Data by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781370578993
Publisher: Progressive Management Publication: April 2, 2017
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781370578993
Publisher: Progressive Management
Publication: April 2, 2017
Imprint: Smashwords Edition
Language: English

This excellent report has been professionally converted for accurate flowing-text e-book format reproduction. Social media is the fastest growing vulnerability to the military mission and the personal security of all Airmen. On 30 November 2014, the FBI issued warning to members of the US military and requested that they review their social media presence for any information like names and addresses that might attract the attention of violent ISIS extremists. Over the past decade, the convergence of mobile broadband devices has enabled social media to become more and more integrated into our everyday lives. The inherent risks and vulnerabilities of the internet and social networking sites like Facebook, LinkedIn, and Twitter along with the Air Force's endorsement to actively use social media, has cultivated a rich and ripe environment for foreign adversaries and criminals to cherry-pick personal information about Airmen and their missions for nefarious activities. To help Americans understand the risks that come with being online, the Department of Homeland Security launched a new cybersecurity awareness campaign: Stop, Think, and Connect. To educate Airmen on social media, AF public affairs created the "Air Force Social Media Guide" in 2013 to encourage Airmen to share their AF experiences with family and friends in the social media environment. However, this is counter to the FBI's guidance that promotes the reduction of users' on-line footprint and online presence in cyberspace.

Public Affairs published the "Air Force Social Media Guide" in 2013 to encourage Airmen to share their Air Force experiences with family and friends in the social media environment with the following introduction: "This guide will help you share information effectively while following Air Force instructions and protecting operations security." The guide does an excellent job identifying the "shoulds" and "should nots" in social media; however, the guide does not address hardware vulnerabilities or the risks of using social media sites. This paper will respond to some of the most common threats and vulnerabilities of the social media environment, the risks of using social media, and the current Air Force social media guidance. It will also provide recommendations to educate better and inform Airmen and their families on using social media sites and cyberspace best practices.

Today's cyberspace environment provides an engaging interactive experience for social networking, picture and video sharing, and blogs that keep end users engaged and wanting to share or consume more information. In addition to social media sites, commercial web services, online commerce services, and the hardware used for networking can provide the means to compromise sensitive information. Threats to desktop computer hardware are important but fall outside the scope of this paper; an example is in the notes. Today's hackers have discovered exquisite ways to install malware on a user's computer hardware through seemingly innocuous means by exploiting security breaches in social media websites that use Java, Ajax, or other popular software technologies. Opening up files or hyperlinks attached to social media messages or email attachments may contain malware that can bypass firewalls or virus protection programs. In many cases, this happens without the user knowing they have become a victim or that their hardware is infected.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This excellent report has been professionally converted for accurate flowing-text e-book format reproduction. Social media is the fastest growing vulnerability to the military mission and the personal security of all Airmen. On 30 November 2014, the FBI issued warning to members of the US military and requested that they review their social media presence for any information like names and addresses that might attract the attention of violent ISIS extremists. Over the past decade, the convergence of mobile broadband devices has enabled social media to become more and more integrated into our everyday lives. The inherent risks and vulnerabilities of the internet and social networking sites like Facebook, LinkedIn, and Twitter along with the Air Force's endorsement to actively use social media, has cultivated a rich and ripe environment for foreign adversaries and criminals to cherry-pick personal information about Airmen and their missions for nefarious activities. To help Americans understand the risks that come with being online, the Department of Homeland Security launched a new cybersecurity awareness campaign: Stop, Think, and Connect. To educate Airmen on social media, AF public affairs created the "Air Force Social Media Guide" in 2013 to encourage Airmen to share their AF experiences with family and friends in the social media environment. However, this is counter to the FBI's guidance that promotes the reduction of users' on-line footprint and online presence in cyberspace.

Public Affairs published the "Air Force Social Media Guide" in 2013 to encourage Airmen to share their Air Force experiences with family and friends in the social media environment with the following introduction: "This guide will help you share information effectively while following Air Force instructions and protecting operations security." The guide does an excellent job identifying the "shoulds" and "should nots" in social media; however, the guide does not address hardware vulnerabilities or the risks of using social media sites. This paper will respond to some of the most common threats and vulnerabilities of the social media environment, the risks of using social media, and the current Air Force social media guidance. It will also provide recommendations to educate better and inform Airmen and their families on using social media sites and cyberspace best practices.

Today's cyberspace environment provides an engaging interactive experience for social networking, picture and video sharing, and blogs that keep end users engaged and wanting to share or consume more information. In addition to social media sites, commercial web services, online commerce services, and the hardware used for networking can provide the means to compromise sensitive information. Threats to desktop computer hardware are important but fall outside the scope of this paper; an example is in the notes. Today's hackers have discovered exquisite ways to install malware on a user's computer hardware through seemingly innocuous means by exploiting security breaches in social media websites that use Java, Ajax, or other popular software technologies. Opening up files or hyperlinks attached to social media messages or email attachments may contain malware that can bypass firewalls or virus protection programs. In many cases, this happens without the user knowing they have become a victim or that their hardware is infected.

More books from Progressive Management

Cover of the book Combating Daesh: A Socially Unconventional Strategy - Alternative Perspective on the Islamic State, ISIS, ISIL, Unconventional Warfare, Human Domain Mapping, Iraqi Baath Party and Republican Guard by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: Sniper Training - FM 23-10 - Marksmanship, Equipment, Ballistics, Weapon Capabilities, Sniping Techniques (Value-Added Professional Format Series) by Progressive Management
Cover of the book Army Research Laboratory (ARL) Science and Technology Campaign Plans 2015-2035 - Computational Sciences, Materials, Maneuver, Information Sciences, Lethality and Protection, Human Sciences, Analysis by Progressive Management
Cover of the book The Rise of China's Middle Class and the Prospects for Democratization: Lipset's Economic Modernization Theory, ASEAN, Taiwan, Transition, Confucius versus Realists, Industrialization, Urbanization by Progressive Management
Cover of the book Pursuit of Power: NASA's Propulsion Systems Laboratory (PSL) No. 1 and 2 - NACA, Aircraft Engine Research, Cold War Research, Nuclear Navaho, Rockets, Missiles, RL-10 Hydrogen Engine, Supersonic by Progressive Management
Cover of the book Air Force System Safety Handbook: Costs, Objectives, Policy and Process, Risk Assessment, Flight Mishaps, Analysis Techniques, Contractors, Nuclear and Explosive Hazards, Biomedical Safety by Progressive Management
Cover of the book America's Space Shuttle: EVA Contingency Operations NASA Astronaut Training Manual (CONT OPS 2102) by Progressive Management
Cover of the book Tracking Next-Generation Automatic Identification Technology (AIT) into 2035 - RFID Radio Frequency Tags, Efficient Logistics Operations, Supply Chains, In-Transit Visibility, Enhanced Situational Awareness by Progressive Management
Cover of the book 21st Century Understanding Cancer Toolkit: Life After Cancer Treatment, Valuable Advice and Support for Patients, Survivors, Families, Parents, Children, Caregivers, Young People, Advanced Cancer by Progressive Management
Cover of the book Unmanned Aircraft Systems (UAS): Comprehensive Planning and Training Strategy Needed to Support Growing Inventories, Greater Commonality and Efficiencies among Unmanned Aircraft Systems by Progressive Management
Cover of the book Complete Guide to the American Civil War Battle of Gettysburg: Troops, Biographical Sketches of Leaders, Weaponry, Small Arms, 150th Anniversary, Strategic Setting, Operational Art, Legacy by Progressive Management
Cover of the book 21st Century Understanding Cancer Toolkit: Sexuality and Reproductive Issues, Sexual Dysfunction, Fertility, Breast, Prostate, Pelvic Tumors, Surgery, Radiation, Psychological Factors by Progressive Management
Cover of the book 20th Century NASA Space History: Mir Mission Chronicle - Modules, Configuration Changes, Major Events of the Russian/Soviet Space Station by Progressive Management
Cover of the book Civil Military Engagements Program: A Special Operations Solution to Threats Derived from Undergoverned Areas - SOF and Civil Affairs in Pakistan, Sri Lanka, Horn of Africa, and Battle Against ISIS by Progressive Management
Cover of the book 20th Century Spy in the Sky Satellites: Secrets of the National Reconnaissance Office (NRO) Volume 2 - Hexagon Photoreconnaissance Satellite 1971-1986 by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy