Public and Private Profile Audit Report 2022

Verified

Added on  2022/09/23

|8
|2261
|19
AI Summary

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Public and Private Profile Audit 1
Introduction
This report explain much about our security issues due to our exposure to the internet. From the
simple exercise analysis which I carried out individual indicates that being an on net individual means a
lot. The moment you just register your details over the internet has an effect on you. In this case, it was
found out that you will risk losing your own personal privacy. This is because the internet is increasingly
raising its features like very fast accessible internet and the optimization. More so the issue of machine
learning has led to an increase rate of security issues. This is because, when you search for a particular
word online, this machine learning algorithm will cycle looking for the most preferred word (Anderson-
Gough, Grey, and Robson, 2005). For example, I may be in need of getting more details of someone
whom I know the name and I will just type the name on the browser. The browser will be able to bring
out all the possible outputs. Of course if the intended person has ever register its details online I will get
to know. The privacy of this individual is no more.
Public and Private Profile
Public Profile
Personal information, such as full name, date of birth, country, current job, job history,
job status and resident country, are mainly available online as a Public View which is meant to
be seen by public entities.
Public Viewer – Facebook Account
My personal information shown by public users as following:
Full Name: …..
Date of Birth: …..
Timeline:

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Public and Private Profile Audit 2
o Updated his cover photo. July 21, 2019
o Updated his cover photo. July 31, 2014
o … Posted “Hello everyone”. August 20, 2019
About:
o Studied Computer science at ….
o Lives in ….
o From ….
o Joined February 2008
Public Images:
o Profile cover image
o Post images
o Images made to be public
Private Profile
The information which I have found in my Private Viewer as below:
o Private messages, chat history.
o Private images
o Private videos
o Mobile number – Contacts.
o Family Photos.
o Private posts
o Friends
o Notes
Document Page
Public and Private Profile Audit 3
Resource List
This report has utilized some resources as a reference as below:
o Google search engine
o Google Scholar
o Facebook Account Page – Personal Profile
o Research Papers published by academic authors
Profile Analysis
Comparing information available both in private and public profile
Public profile in comparison to private profile shows that public profile has exposed fewer details
concerning you. In addition to that, it exposes crucial information which may be used to hinder your
security (Juarez, and Brown, Alphacap Ventures, 2010).
Experimentally, I tried to use my accounts to retrieve some information about myself from
Facebook, Twitter, and Linkedin. I tried this by just typing my name on the browser and it was able to
display a list of persons. Unfortunately, I didn’t know that I will appear in the list. This shows that being
online is very vital to your security. Things like phone contact and email addresses should be considered
and put in private because this are some of the key elements which may lead you to being insecure.
In fact, on my own research for this report, I found that the amount of information which has
been exposed publicly over private details amounts up to 85 %( Papacharissi, 2009), (Juarez, and Brown,
Alphacap Ventures, 2010). This is a very good number for hackers to retrieve all your information.
Professional hackers doesn’t need more than 10% of your details so that they pool out your details
Document Page
Public and Private Profile Audit 4
How a hacker may exploit publicly available information
Hackers are people who are professionals. They are people who understand the algorithms how it
was designed. They understand how weak the algorithm is to be entered into without the notice of the
owner. Hackers uses quite a number of ways to pull out your data. Professional hackers spoofed out your
details via the internet. Hackers are prone to designing special algorithms which work perfectly at the
background of your personal accounts like twitter and Facebook or twitter.
As you can see from my public profile I have used for this matter, there are quite a number of
element a hacker may use to tease me including public profile images, name and the phone contacts.
These details are available within the public profile and it brings out a threat to security.
Our public profiles exposes a lot of data to people whom we don’t even know. A person may just decide
to search for you over the internet. Because he or she wants to steal from you, the go through your profile
and sniffed some data. This data is very helpful to him. We are currently experiencing the use of cloud
servers globally. This cloud servers sharers a common IP address for communication between millions of
internetworking computers.
High speed internet has been another factor which has contributed to high risk of insecurity to
your privacy details. All in all we conclude that having exposed yourself online lacks privacy at all.
Despite the fact that we can moderate the exposure of our information at the front end site, hackers are
always smart to pass through the backdoor to access all your information.
How a hacker may exploit the relationship between close connections
How a hacker may exploit the relationship between close connection and gain access to private
information. This will happen in the sense that the hacker may pool the details of one of your closest
friend who may be a friend from the other site. This is what we called linking information in association
to hacking. The hacker will use the person with the essence of accessing your details because you are not
directly connected to him. Online profiling is not safe at all. People needs sensitization of not to present

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Public and Private Profile Audit 5
sensitive information online. This information which are sensitive include; bank account details, ATM or
Master Cards, and any other sensitive information (Cooper, Leung, and Mathews, 2012).
How hacker may exploit private information
Private information is the most vital element in cyber security. We always talk of authentication
as a key security control measure. But it is not enough to protect hackers out of your site. If you have
exposed yourself online, that is how the hacked will get you. He will just have to type your name over
any social media platform and pull out your details. Otherwise, the hacker will pull your url and convert it
the actual IP and whenever you are online, he/she will be monitoring you.
Discussion on the possible motivations and implications of each of the above exploits
Jordan and Taylor (1992) distinguished various inspirational topics to hacking conduct
through meetings with people in the hacking network, for example, Compulsion to hack, interest,
control and fascination in power, peer acknowledgment and having a place with a gathering.
Programmers regularly guarantee to be dependent on PCs as well as to PC systems, where they
are constrained to hack. They are curious about what can be found on the overall system and this
turns into a regular point of discourse in their networks; the more secure or intriguing the
objective of the hack is, the more an unending quest for increasingly secure and progressively
colorful targets is strengthened.
Hackers regularly guarantee that the rush of illegal hunts in online conditions is more
energizing than their disconnected life. Programmers frequently remark on their feeble
disconnected life regularly rather than the control they may have online over the PC frameworks
of significant military or corporate organizations.
Document Page
Public and Private Profile Audit 6
Network peer acknowledgment from different programmers is increased through contribution in
the movement of hacking, and regularly they talk about their adventures to future PC clients or to
proprietors of PC arranges that they have distinguished security escape clauses in.
The initial three persuasive subjects to hacking as referenced above are like the precursors for the
flow of stream. Along these lines we would propose that the accomplishment of stream is
perhaps an arbitrator for the further advancement of a programmer from a Tool pack/Newbie to a
higher-level programmer. Subsequently we have to comprehend the determinants of stream to
pick up a comprehension of how we may smother such improvement and contain the movement
of hacking. However, hackers go involve to this behaviors just because of having interest in what
is going on all over the world, they want to steal from others, data espionage, control ,
vulnerability test and spamming. These are the major motivations why hackers are online
throughout.
The implications of hacking public and private profile vary from harming someone as a
victim to steal money or corrupt an entity. Hackers usually intend to sacrifice their lives for
money by phishing the victim and make some benefits of that behavior. Some of them afterwards
end up with stealing credit card information or with blackmailing the victim into gaining some
money. For example, a hacker can gain access to the victim Facebook account privately and leak
some images or conversations history to harm the victim. However, this might be because of
only having fun, not money targeting.
Some tools are available online for free which can be used for teasing or bullying victims.
For instance, picture mopping software which can be used by young teenagers to bully their
fellow students and cause physical and mental health issues to the victim. The private viewer of
the culprit’s account is the most painful part when a hacker successfully enters into it. While
Document Page
Public and Private Profile Audit 7
hacking individual’s account is very harmful, a hacking business account is disastrous. In reality,
some companies which have been attacked by hackers through public websites, have been
suffering from attack consequences until now. These consequences range from reputation to
monetary loss. Therefore, some employees are being affected too. That is because affected
companies could not tolerate the implications of financial losses and started to fire some
employees to overcome this tragedy by saving some money.
Recommendations
To reduce the risk of exposure to high security threats through online can be prevented by practicing quite
a number of control measures. (Anderson-Gough, Grey, and Robson, 2005). The control measures
include the following;
1. Do not expose sensitive private data in any social media or any online platform. You can
only do this with platforms who have complied with the computer crimes act. This is
because both of you will be protected since their platforms are not known by hackers like
social media
2. Limit yourself to social media platforms. This will prevent you from exposing your data to
unauthorized individuals.
3. Avoid saving passwords in your internet browsers. This attracts security threats in case of
access some of your details. Remember one incident will lead to another. So stay safe
always.
4. Authenticate your accounts. Using social media platforms you can restrict some of your
details so that it cannot be accessible to some of the people. Security has been improve so
that you can limit some of the access and allow only the people whom you know.

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Public and Private Profile Audit 8
Conclusion
This report has addressed some of the security issues exposed to public and private profiles
information by presenting personal details of those profiles. Therefore, the papers have discussed some
differences between public profile and private profile. Moreover, the analysis of the proposed profile has
been presented. Thus, some ways that endeavor to a hacker to exploit critical information available to
private profile by gaining access to public profile are highlighting. Finally, recommendations on how to
reduce the risk of exposure to public profile information are given.
References
Anderson-Gough, F., Grey, C. and Robson, K., 2005. “Helping them to forget..”: the organizational
embedding of gender relations in public audit firms. Accounting, Organizations and
Society, 30(5), pp.469-490.
Juarez, R.A. and Brown, Z.J., Alphacap Ventures LLC, 2010. Private entity profile network. U.S. Patent
7,848,976.
Cooper, B.J., Leung, P. and Mathews, C., 2012. Internal audit: an Australian profile. Managerial
Auditing Journal, 9(3), pp.13-19.
Papacharissi, Z., 2009. The virtual geographies of social networks: a comparative analysis of Facebook,
LinkedIn and ASmallWorld. New media & society, 11(1-2), pp.199-220.
1 out of 8
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]