Implementing Centralized Cyber Security and Device Management System (CCSDMS)

3313 Words7 Pages

1. Introduction:
The Social Networking sites are web based services (Websites) which acts as a medium for youngsters to share their social activities or to share their interest in a particular topic with their friends, colleagues and family. These social networking sites have both positive and negative impacts on students. The majority of students use smartphones for accessing social media and all other online activities. This paves way for two types of security issues such as social media security issues and smartphone security issues. Thereby we have to eradicate the smartphone and social networking threats by implementing Centralized Cyber Security and Device Management System (CCSDMS). In this project we use Graph Model for Conflict Resolution (GMCR II) software tool, for the effective implementation of Centralized Cyber Security and Device Management System.
2. Social Network Sites (SNS):
There are thousands of Social Networking sites all around the globe with various technological advancements, supporting a wide range of activities. Some sites offer services to diverse audiences whereas others attract people under a common community like common language shared radical, sexual and religious or nationality based identities. Some of the sites work on different communication tools such as mobile connectivity, blogging and photo sharing [1].
The most popular sites are Facebook, Twitter, Instagram, Google+, LinkedIn, Instagram, YouTube and Myspace. The other less used sites are Friendster, Cyworld, Flickr, Tumblr, Pinterest, Myspace, etc. [1]
Members of the Social Networking sites create an online public or semi-public profile with personal data, photos and any other information they choose t...

... middle of paper ...

...bbc.com/news/world-europe-26151425
[6] J. Lewis. How Spies used facebook to steal nato chiefs’ details. The Telegraph. 2012. [Online; accessed 08-September-2013].
[7] http://chinhdangvu.blogspot.ca/2012/03/chinese-spies-used-fake-facebook.html
[8] Lenhart A. Teens and Sexting. Washington, DC: Pew Research Center; 2009.Available
[9] http://www.mobileshop.eu/blog/actual/top-10-smartphones-2013/
[10] http://www.droidmatters.com/news/infographic-the-growing-threat-of-mobile-malware/
[11] http://time.com/35932/ukraine-russia-putin-spies-kgb/
[12] D.M. Kilgour, K.W. Hipel, and L. Fang, The graph model for conflicts, Automatica 23 (1987), 41-55.
[13] http://www.sciencedirect.com/science/article/pii/S102630981100054X
[14] Lenhart, A., Ling, R., Campbell, S., & Purcell, K. (2010a). Teens and mobile phones. Washington, DC: Pew Internet & American Life Project.
[15] Google.com

Open Document