TikTok Operation and Security Threat

Abstract ,the article analyzes the security threats attributing to the collection of clipboard data that could facilitate vulnerabilities in the operations of TikTok in the United States as the two superpowers engaged in economic battles. According to the article, the deal has hit a snag over the question of whether TikTok core algorithms that tend to abuse the clipboard and reliant on an error in code in the TikTok platform can be included as part of the deal. The app’s algorithms and relies on outdated Google advertising SDK is used to determine the kind of videos served to the App users while collecting clipboard data, are believed to be the TikTok’s top-secret sauce and was considered as part of the deal negotiations until the recent new restrictions issued by the Chinese government on the export of artificially intelligent technology. The applicants at Bytedance must provide consent for learning institutions to release their academic records as stipulated by the Family Right to Privacy Act.

 INTRODUCTION

Details about the breach indicate that the Chinese tech giant didn’t eliminate and discourage this invasive practice by TikTok while the parent algorithms completely change the outlook of what the buying companies are informing the public about personal privacy and level of industrial espionage. I believe a large portion of the app’s value is based on the suggestion algorithms that make the users glued to the app but devoid of facilitating noninvasive industrial tactics by the Chinese tech giant. Therefore, acquiring TikTok operations in the United States without eliminating the collection of clipboard data by its algorithms is like buying a fancy car with a cheap engine. However, I am skeptical of the deal’s outcome if it will proceed without the sale of the algorithms.

Additionally, the bidders can still acquire the app for its users and develop new app algorithms. The app has soared its popularity in the United States in the recent past, reaching over 100 million monthly users in 2020 compared to about 11 million users in early 2018. While most of the growth is attributed to its powerful algorithms built to quickly recommend a different type of content to its users according to their preferences, developing a new robust algorithm after acquisition can be a better deal.

II.Eliminating cloud computing security problem at TikTok

Installation of the Web Companion application by TikTok is the type of antivirus software that is designed for the protection of computers and personal accounts of users from the infections of malware and privacy breaches (Almorsy, Grundy, and Müller, 2016, n.p). Lavasoft Web Companion for TikTok is a software that was developed by the Lavasoft which is automatically installed on the computer and comes bundled with other applications. However, many controversies are surrounding both the company and its software. At the time of installation of the Apple’s iOS 14 eliminates the reliance on outdated Google advertising SDK, the installer gives the demand for permission for making the changes to the settings of the browser (Crossler, Johnston, Lowry, Hu, Warkentin, and Baskerville, 2013, pp.93). Most of the users have skipped the steps of software installation and have agreed with everything being not aware of the risks.

Apple’s modern release of iOS 14 offers security against vulnerabilities attributing to TikTok by improving application settings against unauthorized changes and acts as a buffer between your browser and malicious websites. It is in the categorization of the Potential Unwanted Application as per the way developers have distributed it (Öğütçü, Testik, and Chouseinoglou, 2016, pp.86). Web companion itself is a PUP, as it usually gets installed with shareware and freeware programs deceptively.

For a better, safer and lighter TikTok experience, Ad-Aware Web Companion completes the protection of your TikTok data and user information against current and recent malware and attacks by marking malware at the URL level before it is even downloaded to your PC [3]. The secure software development lifecycle (SDLC with security engineering activities) claims that this prevents the user from being affected by malware and spyware.

III. Analysis of personal data and security behavior tendencies

Once a breach in privacy by individual users of TikTok has been detected, it should be notified immediately. Depending on the breach’s nature and individual awareness to security breaches at TikTok, individuals may be notified by telephone—email, letter, or person. Information involving 500 people or more should be notified through email (Safa, Von Solms, and Furnell, 2016, pp.82). If most of the individuals’ contact information is out of date, the information should be posted on the hospital’s website’s page for 90 days, or the story should be posted on the local media.

A privacy investigation report is necessary to determine the extent of the breach and if complaints are reportable or not by individual users of TikTok. The report should include essential information regarding the circumstances of the violation. Exhaustive information concerning the nature of the breach, how it happened, and the affected individuals should be included in the report (Siponen, Mahmood, and Pahnila, 2014, pp.219). It is crucial to determine if some of the user profile information has been disclosed to other parties. Part of this report should include information on how the affected individuals can protect themselves from the breach and the organization’s role in ensuring that future breaches are prevented. This is essential to improve the user profile’s trust in the hospital. The final part of the report involves contact details of the hospital where affected individuals can send their inquiries regarding the privacy breach [6]. Each user profile has a right to privacy and confidentiality, and the healthcare centre should ensure that all user profiles under their care are assured of their rights. User profiles have a right to lodge complaints against hospitals when their private health information is disclosed.

IV Employees’ approach to data, privacy and security policies at TikTok

Most companies including Bytedance ought to carry out a pre-employment evaluation of every job applicant. That is essential in maintaining security and preventing future financial losses. The employers usually outsource their screening materials or content from third-party institutions specialized in background checks (Almorsy, Grundy, and Müller, 2016, n.p). In some instances, state agencies like the FBI and the US Department of Transportation also provide employers with driving records and other investigating resources. In essence, pre-employment evaluation verifies the information provided in the application letters and resumes by applicants. These investigations are essential in uncovering criminal tendencies and character flaws that could jeopardize the company, endanger other workers, tarnish its public image, and limit the candidate’s effectiveness (Safa, Von Solms, and Furnell, 2016, pp.82). In other words, it shows whether the company can entrust the employee with managing financial resources or protecting confidential and private information.

The Fair Credit Reporting Act (FCRA) guides every pre-employment screening (Siponen, Mahmood, and Pahnila, 2014, pp.218). While companies may have legitimate concerns for conducting pre-employment evaluations, they should use the screening outcomes to discriminate individuals based on colour, religion, sex, race, age, or disability. In essence, the pre-employment screenings should be valid and legal in addition to relating to the applied job opportunity. While a clearly-defined test sheds essential light on an applicant’s suitability and job fitness, a wrong evaluation could hurt their experience besides impeding the employer’s decision-making process.

Computers usage involves various risks, including technology abuse for terrorist activities, data protection, and misuse of technology and its influence on persons. One of the significant areas of concern in computer systems is the query on the system’s security and information in a specific system (Crossler, Johnston, Lowry, Hu, Warkentin, and Baskerville, 2013, pp.95). A question arises on the effect of people scanning through confidential information in TikTok; therefore, there is a great need to keep information secure from criminals’ reach. Through various means, hackers try to obtain classified information through the computer taking advantage of the user’s imperfections; for instance, there is a tremendous application of computer usage in TikTok. Unfortunately, they have become victims of hacker’s invasion [2]. Cybersecurity experts would not expose such information as their clients would lose confidence in them. The National Security Authority has included cybercrime in its plan covered by the cybersecurity Act.

  1. Information security policy compliance model in organizations

The main objective of cybersecurity in TikTok is to establish a secure, transparent and protected space in the national cyber, creating credibility, security, and reliability of confidential data and communication facilities as well as providing assurance that it will act to provide the requisite protection in case of an attack (Almorsy, Grundy, and Müller, 2016, n.p). In consideration of the current situation concerning cybersecurity in TikTok, the objective of the concept is to achieve the following state where:

-Security enlightening of all elements of the society is increasing systematically,

-The civil society, Academic and private sectors actively take Part in the implementation of TikTok policy in cybersecurity,

-There is an efficient collaboration between internal and international levels at TikTok in terms of anticipating and preventing cybersecurity threats.

-There are adequate measures that provide for privacy protection and fundamental freedoms and rights of human beings.

-There is efficient coordination of national cyberspace and on the accepted basis.

The TikTok should be ready to deal with the increasing emerging issues in cyber threats. It also has information on the rising cases involving cyber threats, which calls for collaboration with other organizations (Almorsy, Grundy, and Müller, 2016, n.p). Cybersecurity at TikTok should be viewed as a subsystem of the national security. The TikTok intends to cooperate with all relevant organizations which do not restrict the utilization of cyberspace. Hacking, information piracy, forgery, and stealing of identity can result in severe scenarios and complications in the lives of users. Worst of it, cybercrime can result in financial crisis and destruction of persons’ reputation and security.

  1. Conclusion

In conclusion, cybersecurity experts indicate that users of TikTok are increasingly spending most of their time on the internet hence highly exposed to the risks of cybercrime; thus, it is crucial for protection against cyber risks. First, there should be an installation of security patches and antivirus programs that are useful in all electronic gadgets with TikTok application and algorithms, including smartphones. This can be done to protect the largest population of the TikTok against cybercrime in the modern-day digital society. It is crucial to employ preventive measures in TikTok, especially for the older generation, which is very vulnerable in matters related to the internet. Preventive measures could be in the form of interactive lectures and educating the importance of cybersecurity awareness, which can be conducted in the form of posters, interviews, leaflets, and brochures to deal with prevention. It is significant to keep the TikTok informed of the perennial threats and educate them on utilizing the internet; therefore, security education in TikTok is vital.

Appendix

TikTok faces potential threats in cyber security involve three crucial aspects: server, protection, end-user protection, and exposed attack surface, the primary approach to solve this is having web security KPI and malware protection. Therefore, the best recommendation to give the TikTok is to heighten protection and effectiveness by agencies through the computer server and user sampling test. Further, regular penetration testing and vulnerability scanning are of fundamental essence in increasing surveillance for cyber threats and attacks. Cybersecurity plays a vital role in providing security for people who use the internet via various electronic devices in their everyday lives. At times TikTok face several challenges when their devices and individual users connected through the internet. Susceptible information, for example, the military assets and Biotechnology, is highly threatened by hackers. Cybersecurity serves a crucial role in providing security for such information. Abuse of social media application including TikTok has become an issue of great concern in a significant number of aspects of life, especially in public administration.

REFERENCE

[1] Almorsy, M., Grundy, J. and Müller, I., 2016. An analysis of the cloud computing security problem. arXiv preprint arXiv:1609.01107.

[2] Crossler, R.E., Johnston, A.C., Lowry, P.B., Hu, Q., Warkentin, M. and Baskerville, R., 2013. Future directions for behavioral information security research. computers & security32, pp.90-101.

[3] Öğütçü, G., Testik, Ö.M. and Chouseinoglou, O., 2016. Analysis of personal information security behavior and awareness. Computers & Security56, pp.83-93.

[4] Safa, N.S., Von Solms, R. and Furnell, S., 2016. Information security policy compliance model in organizations. computers & security56, pp.70-82.

[5] Siponen, M., Mahmood, M.A. and Pahnila, S., 2014. Employees’ adherence to information security policies: An exploratory field study. Information & management51(2), pp.217-224.

[6]  TikTok Secretly Spying On Millions Of iPhone Users | A major TikTok security issue detected by Apple

Calculate a fair price for your paper

Such a cheap price for your free time and healthy sleep

1650 words
-
-
Place an order within a couple of minutes.
Get guaranteed assistance and 100% confidentiality.
Total price: $78
WeCreativez WhatsApp Support
Our customer support team is here to answer your questions. Ask us anything!
👋 Hi, how can I help?