SOCIAL NETWORKS
INDEX • SOCIAL NETWORKS………….3.4 •
TYPES OF NETWORKS ……5,6,7,8
• CLASSIFICATIONS……….9.10.11 •
DEFINITIONS……12,13,14,15
•
CONCLUSION….,,16
WHAT IS IT? • A SOCIAL NETWORK IS A SOCIAL ESTRUCTURE COMPOSED A SEF OF ACTORE (SUCH AS INDIVIDUALS OR ORGANIZATIONS) THAT ARE RELATED ACCORDING TO SOME CRITERIA (PROFFESIONAL RELATIONSHIPS, FRIENDSHIP. KINSHIP, ETC) THEY ARE USUALLY REPRESENTED BY SYMBOLIZING THE ACTORS AS NODES AND THE RELATIONSHIPS AS LINES THAT UNITE THEM. THE TYPE OF CONNECTION THAT CAN BE REPRESENTED IN A SOCIAL NETWORK IS A DYACTIC RELATIONSHIPS OR INTERPERSONAL RELATIONSHIPS.
ORIGIN
• The origin of social networks goes back at least to 1995, when the American Randy Conrads created the website classmates.com. With this social network I wanted people to be able to recover or maintain contact with old colleagues from the school, institute, university. In 2002, the first websites that promoted networks of online friends' circles or relationships in virtual communities began to appear. The popularity of these sites grew rapidly and they were refined to make up the space of social networks on the Internet.
WHAT ARE THE ADVANTAGES OF SOCIAL NETWORKS?
1. Instant Communication 2. Work opportunities 3. Information and entertainment 4. Social Complaint 5. Social Complaint
WHAT ARE THE DISADVANTAGES OF SOCIAL NETWORKS? 1. Scams in social networks 2. Setting our privacy 4. Identity thef 5. Cyberbullying and Grooming 6. Addiction to social networks
MOST USED SOCIAL NETWORKS
FACEBOOK It is a social network created by Mark Zuckerberg while studying at Harvard University. Its objective was to design a space in which the students of said university could exchange fluent communication and share content easily through the Internet. His project was so innovative that over time it was extended to be available to any user of the network.
WHATSAPP • Application that allows you to send and receive instant messages through a mobile phone. The service not only allows the exchange of texts, but also of audios, videos and photographs.
YOUTUBE It is an Internet portal that allows its users to upload and view videos. It was created in February 2005 by Chad Hurley, Steve Chen and Jawed Karim, who met while working on PayPal. A year later, YouTube was acquired by Google in 1,650 million dollars.
TWITTER • It is the name of a microblogging network that allows you to write and read messages on the Internet that do not exceed 140 characters. These entries are known as tweets. • The microblogging is a variant of blogs (blogs or digital notebooks that were born as personal diaries online). Its difference lies in the brevity of its messages and its ease of publication
INSTAGRAM • It is a social network and application to upload photos and videos. Its users can also apply photographic effects such as filters, frames, thermal similarities, underlying areas in the concave bases, retro colors, and then share the photographs in the same social network or in others such as Facebook, Tumblr, Flickr and Twitter. A distinctive feature of the application is that it gives a square shape to the photographs in honor of the Kodak Instamatic and Polaroid cameras, contrasting with the 16: 9 and 4: 3 aspect ratio currently used by most mobile phone cameras .
• Security solutions • Being the malicious codes the most important massive threat, the use of antivirus sofware with capabilities proactive detection and with a base of updated signatures, it is a fundamental component to prevent malware that spreads through social networks. Antispam and firewall tools also allow optimize the security of the system against these risks. As well It is essential not to use a user with permission to administrator when browsing these networks, and that Each person who uses the equipment has its own profiles. This is a way to minimize the impact in case it happens an incident.
PASSWORDS • Do not use your password from a social network in other sites of internet and never share it. • Avoid including your name or common words. The password It must be hard to guess. • Avoid using public computers to enter networks social. Remember to close session, especially when you use a computer that you share with other people. • Think twice before clicking or downloading any content, remember that it may be some engineering lure Social.
• Configurations •
By default, not always configurations in social networks they are the most optimal for your security. Therefore it is It is advisable to spend a reasonable amount of time at the time of register, in addition to checking which are the possible leaks of information about a bad configuration of the system in Regarding privacy.
• If possible, for greater security in your account is It is advisable to configure a second authentication factor; If you are not familiar with this methodology, you can Take a look at the double authentication guide.
CONCLUSION
• Social networks are a great tool nowadays as long as you have the necessary precautions and are informed of the advantages and disadvantages that they offer you
https://www.yoseomarketing.com/blog/que-son-las-redes-sociales-para-que-se-utilizan/ https://www.welivesecurity.com/wp-content/uploads/2013/11/guia-redes-sociales-eset.pdf https://ignaciosantiago.com/consejos-seguridad-redes-sociales/ https://www.nextu.com/blog/tipos-de-redes/