SlideShare ist ein Scribd-Unternehmen logo
1 von 13
Downloaden Sie, um offline zu lesen
Threaths and Risks
in Social Media
Basics
•

Social media and social networking is all about communicating and sharing
information with people

•

Once the information is registered to a page it is no longer private

•

The personal information can be used to conduct attacks against both the user
and the users associates

•

The more one post the more vulnerable one become

•

The information posted is NOT only used in the social media

•

Attacks that uses the shared information but does NOT come by way of the
social networking sites: baiting, click-jacking, cross-site scripting, doxing,
elicitaion, pharming, phreaking, scams, spoofing and phishing
Baiting
•

Through a USB drive (or other electronic media) preloaded with malware,
worms etc. attacking when using the device

•

Prevent by ensuring the origin of the device is safe
Click-jacking
•

Secret hyperlinks under legitimate links which causes when clicked
unknowningly performed actions eg. downloading malware or sharing ID:s

•

Disable scripting and iframes, maximize the security options
Cross-site scripting
•

Malicious codes injected to trusted websites

•

Turn off ”HTTP TRACE” support
Doxing
•

Public release of personal indentifying information (including pictures)

•

Be careful with what to share
Elicitation
•

Strategical use of conversation extracting information without giving the victim
the feeling of interrogation

•

Be aware of the tactics the social engineers use
Pharming
•

Redirecting users from safe sites to extract personal data (eg. mimicking bank
sites)

•

Type websites instead of clicking on links, look out for URL:s that use variations
in spelling or domain names
Phreaking
•

Gaining unauthorized access to telecommunication systems

•

Do not provide secure phone numbers providing access to a Private Branch
Exchange or through the Public Branch Exchange to the public phone network
Scams
•

Fake deals that trick people into providing eg. money in exchange for the deal

•

Sounds too good to be true? Popular events and news are often used as bait to
open infected emails, visit infected websites, or donate money to bogus
charities
Spoofing
•

Hiding or faking user identitys

•

Know the co-workers, clients etc. of a business or the family and friends on the
other hand
Phishing
•

Usually emails that looks like originated from a legitimate organization/person
and contains links or files with malware etc.

•

Do not open or click on attachments or links if not 100% sure of its safe
Sources
•

http://www.fbi.gov/about-us/investigate/counterintelligence/internet-socialnetworking-risks

Más contenido relacionado

Was ist angesagt?

Internet Safety Glossary of Terms
Internet Safety Glossary of TermsInternet Safety Glossary of Terms
Internet Safety Glossary of Termsmikel_l
 
UW School of Medicine Social Engineering and Phishing Awareness
UW School of Medicine   Social Engineering and Phishing AwarenessUW School of Medicine   Social Engineering and Phishing Awareness
UW School of Medicine Social Engineering and Phishing AwarenessNicholas Davis
 
Social media privacy issues
Social media privacy issuesSocial media privacy issues
Social media privacy issuesNousheen Arshad
 
Social media risk
Social media riskSocial media risk
Social media riskMosoco Ltd
 
Social Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social MediaSocial Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social MediaTyler Shields
 
Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009canadianlawyer
 
Introduction to Social engineering | Techniques of Social engineering
Introduction to Social engineering | Techniques of Social engineeringIntroduction to Social engineering | Techniques of Social engineering
Introduction to Social engineering | Techniques of Social engineeringPrem Lamsal
 
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesMark Jhon Oxillo
 
Online safety, security, and ethics
Online safety, security, and ethicsOnline safety, security, and ethics
Online safety, security, and ethicsJohnlery Guzman
 
Social Media and the Future of Privacy
Social Media and the Future of PrivacySocial Media and the Future of Privacy
Social Media and the Future of Privacyjulia594
 
Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235brendaylo
 
Social Networking Threats
Social Networking ThreatsSocial Networking Threats
Social Networking Threatsejhilbert
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteAngelito Quiambao
 

Was ist angesagt? (18)

Internet Safety Glossary of Terms
Internet Safety Glossary of TermsInternet Safety Glossary of Terms
Internet Safety Glossary of Terms
 
Chapter 8.legal. opportunities
Chapter 8.legal. opportunitiesChapter 8.legal. opportunities
Chapter 8.legal. opportunities
 
Day 2
Day 2Day 2
Day 2
 
Social media-threats
Social media-threatsSocial media-threats
Social media-threats
 
UW School of Medicine Social Engineering and Phishing Awareness
UW School of Medicine   Social Engineering and Phishing AwarenessUW School of Medicine   Social Engineering and Phishing Awareness
UW School of Medicine Social Engineering and Phishing Awareness
 
Social media privacy issues
Social media privacy issuesSocial media privacy issues
Social media privacy issues
 
Social media risk
Social media riskSocial media risk
Social media risk
 
Social media-threats
Social media-threatsSocial media-threats
Social media-threats
 
Social Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social MediaSocial Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social Media
 
Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009
 
Introduction to Social engineering | Techniques of Social engineering
Introduction to Social engineering | Techniques of Social engineeringIntroduction to Social engineering | Techniques of Social engineering
Introduction to Social engineering | Techniques of Social engineering
 
Cyber safety 101
Cyber safety 101Cyber safety 101
Cyber safety 101
 
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
 
Online safety, security, and ethics
Online safety, security, and ethicsOnline safety, security, and ethics
Online safety, security, and ethics
 
Social Media and the Future of Privacy
Social Media and the Future of PrivacySocial Media and the Future of Privacy
Social Media and the Future of Privacy
 
Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235
 
Social Networking Threats
Social Networking ThreatsSocial Networking Threats
Social Networking Threats
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquette
 

Andere mochten auch (20)

06 01-13 - jesus, the solution to a big problem
06 01-13 - jesus, the solution to a big problem06 01-13 - jesus, the solution to a big problem
06 01-13 - jesus, the solution to a big problem
 
Present perfect continuous
Present perfect continuousPresent perfect continuous
Present perfect continuous
 
How to lose a job?
How to lose a job?How to lose a job?
How to lose a job?
 
Cele mai importante inventii din istorie
Cele mai importante inventii din istorieCele mai importante inventii din istorie
Cele mai importante inventii din istorie
 
environment
environmentenvironment
environment
 
State of Rural Minnesota 2013-preview
State of Rural Minnesota 2013-previewState of Rural Minnesota 2013-preview
State of Rural Minnesota 2013-preview
 
Mathematical Sets
Mathematical Sets Mathematical Sets
Mathematical Sets
 
Sot 2008 revisi
Sot 2008 revisiSot 2008 revisi
Sot 2008 revisi
 
Programa propio de dearrollo personal
Programa propio de dearrollo personalPrograma propio de dearrollo personal
Programa propio de dearrollo personal
 
Awodele toxicidad moringa
Awodele toxicidad moringaAwodele toxicidad moringa
Awodele toxicidad moringa
 
Walter
WalterWalter
Walter
 
Global warming.jasper
Global warming.jasperGlobal warming.jasper
Global warming.jasper
 
Ntl sources slides 2011 gpo
Ntl sources slides 2011 gpoNtl sources slides 2011 gpo
Ntl sources slides 2011 gpo
 
crea tu pagina web
crea tu pagina webcrea tu pagina web
crea tu pagina web
 
TDD carlos vences
TDD   carlos vencesTDD   carlos vences
TDD carlos vences
 
Ecological succession & cycles of matter
Ecological succession & cycles of matterEcological succession & cycles of matter
Ecological succession & cycles of matter
 
Imc presentation
Imc presentationImc presentation
Imc presentation
 
Vocabulary yr
Vocabulary yrVocabulary yr
Vocabulary yr
 
vmware optimization
vmware optimizationvmware optimization
vmware optimization
 
Vocabulary yr
Vocabulary yrVocabulary yr
Vocabulary yr
 

Ähnlich wie Threaths and risks

Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxHarishParthasarathy4
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxKevinRiley83
 
INTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptxINTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptxBHUt6
 
Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?JamRivera1
 
Introduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptxIntroduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptxShubhamGupta833557
 
HACKING VS PHISHING.pptx
HACKING VS PHISHING.pptxHACKING VS PHISHING.pptx
HACKING VS PHISHING.pptxPrince Morte
 
HACKING VS PHISHING.pptx
HACKING VS PHISHING.pptxHACKING VS PHISHING.pptx
HACKING VS PHISHING.pptxPrince Morte
 
Phishing 101 General Course
Phishing 101 General CoursePhishing 101 General Course
Phishing 101 General CourseAaron Keating
 
Guideline about responsible use of social networks
Guideline about responsible use of social networksGuideline about responsible use of social networks
Guideline about responsible use of social networksprofesorjulioperez
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingSachin Saini
 
OWASP_Presentation_FINAl. Cybercrime and cyber security awareness
OWASP_Presentation_FINAl. Cybercrime and cyber security awarenessOWASP_Presentation_FINAl. Cybercrime and cyber security awareness
OWASP_Presentation_FINAl. Cybercrime and cyber security awarenessMaherHamza9
 
Securing and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupSecuring and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupBrian Pichman
 
Unit iii: Common Hacking Techniques
Unit iii: Common Hacking TechniquesUnit iii: Common Hacking Techniques
Unit iii: Common Hacking TechniquesArnav Chowdhury
 
Cyber crime ppt for class 9th and 12th
Cyber crime ppt for class 9th and 12thCyber crime ppt for class 9th and 12th
Cyber crime ppt for class 9th and 12thKartik Chhabra
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2NetLockSmith
 
NENA 2017 Doxing and Social Engineering
NENA 2017 Doxing and Social EngineeringNENA 2017 Doxing and Social Engineering
NENA 2017 Doxing and Social EngineeringJack Kessler
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptxCharithraaAR
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Nicholas Davis
 

Ähnlich wie Threaths and risks (20)

Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptx
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptx
 
INTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptxINTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptx
 
Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?
 
Introduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptxIntroduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptx
 
edu 3 ppt.pptx
edu 3 ppt.pptxedu 3 ppt.pptx
edu 3 ppt.pptx
 
HACKING VS PHISHING.pptx
HACKING VS PHISHING.pptxHACKING VS PHISHING.pptx
HACKING VS PHISHING.pptx
 
HACKING VS PHISHING.pptx
HACKING VS PHISHING.pptxHACKING VS PHISHING.pptx
HACKING VS PHISHING.pptx
 
Phishing 101 General Course
Phishing 101 General CoursePhishing 101 General Course
Phishing 101 General Course
 
Guideline about responsible use of social networks
Guideline about responsible use of social networksGuideline about responsible use of social networks
Guideline about responsible use of social networks
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
 
OWASP_Presentation_FINAl. Cybercrime and cyber security awareness
OWASP_Presentation_FINAl. Cybercrime and cyber security awarenessOWASP_Presentation_FINAl. Cybercrime and cyber security awareness
OWASP_Presentation_FINAl. Cybercrime and cyber security awareness
 
SOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITYSOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITY
 
Securing and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupSecuring and Safeguarding Your Library Setup
Securing and Safeguarding Your Library Setup
 
Unit iii: Common Hacking Techniques
Unit iii: Common Hacking TechniquesUnit iii: Common Hacking Techniques
Unit iii: Common Hacking Techniques
 
Cyber crime ppt for class 9th and 12th
Cyber crime ppt for class 9th and 12thCyber crime ppt for class 9th and 12th
Cyber crime ppt for class 9th and 12th
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2
 
NENA 2017 Doxing and Social Engineering
NENA 2017 Doxing and Social EngineeringNENA 2017 Doxing and Social Engineering
NENA 2017 Doxing and Social Engineering
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids
 

Mehr von HHSome

Assignment4
Assignment4Assignment4
Assignment4HHSome
 
Reputational risk on social media
Reputational risk on social mediaReputational risk on social media
Reputational risk on social mediaHHSome
 
Spy Programs
Spy ProgramsSpy Programs
Spy ProgramsHHSome
 
Social media threats and risks: corporate espionage
Social media threats and risks: corporate espionageSocial media threats and risks: corporate espionage
Social media threats and risks: corporate espionageHHSome
 
Assignment 4 Netiquette Kalle Andersson
Assignment 4 Netiquette Kalle AnderssonAssignment 4 Netiquette Kalle Andersson
Assignment 4 Netiquette Kalle AnderssonHHSome
 
Social engineering
Social engineeringSocial engineering
Social engineeringHHSome
 
Katharina Urlbauer- SMM A4 Facelessness
Katharina Urlbauer- SMM A4 FacelessnessKatharina Urlbauer- SMM A4 Facelessness
Katharina Urlbauer- SMM A4 FacelessnessHHSome
 
Over posting
Over postingOver posting
Over postingHHSome
 
Censorship
CensorshipCensorship
CensorshipHHSome
 
Piracy and infringement
Piracy and infringement Piracy and infringement
Piracy and infringement HHSome
 
Threaths and risks
Threaths and risksThreaths and risks
Threaths and risksHHSome
 
Assigment 4 link to prezi
Assigment 4 link to preziAssigment 4 link to prezi
Assigment 4 link to preziHHSome
 
Lisa Koivunen, Risks and Threats in over promoting
Lisa Koivunen, Risks and Threats in over promotingLisa Koivunen, Risks and Threats in over promoting
Lisa Koivunen, Risks and Threats in over promotingHHSome
 
Phishing
PhishingPhishing
PhishingHHSome
 
Identity thefts
Identity theftsIdentity thefts
Identity theftsHHSome
 
Personal information
Personal informationPersonal information
Personal informationHHSome
 
Risks and Threats in SoMe: Payments
Risks and Threats in SoMe: PaymentsRisks and Threats in SoMe: Payments
Risks and Threats in SoMe: PaymentsHHSome
 
Malware
MalwareMalware
MalwareHHSome
 
Assignment4 yannick kramm
Assignment4 yannick krammAssignment4 yannick kramm
Assignment4 yannick krammHHSome
 

Mehr von HHSome (19)

Assignment4
Assignment4Assignment4
Assignment4
 
Reputational risk on social media
Reputational risk on social mediaReputational risk on social media
Reputational risk on social media
 
Spy Programs
Spy ProgramsSpy Programs
Spy Programs
 
Social media threats and risks: corporate espionage
Social media threats and risks: corporate espionageSocial media threats and risks: corporate espionage
Social media threats and risks: corporate espionage
 
Assignment 4 Netiquette Kalle Andersson
Assignment 4 Netiquette Kalle AnderssonAssignment 4 Netiquette Kalle Andersson
Assignment 4 Netiquette Kalle Andersson
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Katharina Urlbauer- SMM A4 Facelessness
Katharina Urlbauer- SMM A4 FacelessnessKatharina Urlbauer- SMM A4 Facelessness
Katharina Urlbauer- SMM A4 Facelessness
 
Over posting
Over postingOver posting
Over posting
 
Censorship
CensorshipCensorship
Censorship
 
Piracy and infringement
Piracy and infringement Piracy and infringement
Piracy and infringement
 
Threaths and risks
Threaths and risksThreaths and risks
Threaths and risks
 
Assigment 4 link to prezi
Assigment 4 link to preziAssigment 4 link to prezi
Assigment 4 link to prezi
 
Lisa Koivunen, Risks and Threats in over promoting
Lisa Koivunen, Risks and Threats in over promotingLisa Koivunen, Risks and Threats in over promoting
Lisa Koivunen, Risks and Threats in over promoting
 
Phishing
PhishingPhishing
Phishing
 
Identity thefts
Identity theftsIdentity thefts
Identity thefts
 
Personal information
Personal informationPersonal information
Personal information
 
Risks and Threats in SoMe: Payments
Risks and Threats in SoMe: PaymentsRisks and Threats in SoMe: Payments
Risks and Threats in SoMe: Payments
 
Malware
MalwareMalware
Malware
 
Assignment4 yannick kramm
Assignment4 yannick krammAssignment4 yannick kramm
Assignment4 yannick kramm
 

Último

Top 10 Squarespace Development Companies
Top 10 Squarespace Development CompaniesTop 10 Squarespace Development Companies
Top 10 Squarespace Development CompaniesTopCSSGallery
 
Stobox 4: Revolutionizing Investment in Real-World Assets Through Tokenization
Stobox 4: Revolutionizing Investment in Real-World Assets Through TokenizationStobox 4: Revolutionizing Investment in Real-World Assets Through Tokenization
Stobox 4: Revolutionizing Investment in Real-World Assets Through TokenizationStobox
 
20140402 - Smart house demo kit
20140402 - Smart house demo kit20140402 - Smart house demo kit
20140402 - Smart house demo kitJamie (Taka) Wang
 
IT Service Management (ITSM) Best Practices for Advanced Computing
IT Service Management (ITSM) Best Practices for Advanced ComputingIT Service Management (ITSM) Best Practices for Advanced Computing
IT Service Management (ITSM) Best Practices for Advanced ComputingMAGNIntelligence
 
Where developers are challenged, what developers want and where DevEx is going
Where developers are challenged, what developers want and where DevEx is goingWhere developers are challenged, what developers want and where DevEx is going
Where developers are challenged, what developers want and where DevEx is goingFrancesco Corti
 
Outage Analysis: March 5th/6th 2024 Meta, Comcast, and LinkedIn
Outage Analysis: March 5th/6th 2024 Meta, Comcast, and LinkedInOutage Analysis: March 5th/6th 2024 Meta, Comcast, and LinkedIn
Outage Analysis: March 5th/6th 2024 Meta, Comcast, and LinkedInThousandEyes
 
Introduction - IPLOOK NETWORKS CO., LTD.
Introduction - IPLOOK NETWORKS CO., LTD.Introduction - IPLOOK NETWORKS CO., LTD.
Introduction - IPLOOK NETWORKS CO., LTD.IPLOOK Networks
 
How to become a GDSC Lead GDSC MI AOE.pptx
How to become a GDSC Lead GDSC MI AOE.pptxHow to become a GDSC Lead GDSC MI AOE.pptx
How to become a GDSC Lead GDSC MI AOE.pptxKaustubhBhavsar6
 
UiPath Studio Web workshop series - Day 1
UiPath Studio Web workshop series  - Day 1UiPath Studio Web workshop series  - Day 1
UiPath Studio Web workshop series - Day 1DianaGray10
 
Explore the UiPath Community and ways you can benefit on your journey to auto...
Explore the UiPath Community and ways you can benefit on your journey to auto...Explore the UiPath Community and ways you can benefit on your journey to auto...
Explore the UiPath Community and ways you can benefit on your journey to auto...DianaGray10
 
Graphene Quantum Dots-Based Composites for Biomedical Applications
Graphene Quantum Dots-Based Composites for  Biomedical ApplicationsGraphene Quantum Dots-Based Composites for  Biomedical Applications
Graphene Quantum Dots-Based Composites for Biomedical Applicationsnooralam814309
 
Design and Modeling for MySQL SCALE 21X Pasadena, CA Mar 2024
Design and Modeling for MySQL SCALE 21X Pasadena, CA Mar 2024Design and Modeling for MySQL SCALE 21X Pasadena, CA Mar 2024
Design and Modeling for MySQL SCALE 21X Pasadena, CA Mar 2024Alkin Tezuysal
 
How to release an Open Source Dataweave Library
How to release an Open Source Dataweave LibraryHow to release an Open Source Dataweave Library
How to release an Open Source Dataweave Libraryshyamraj55
 
UiPath Studio Web workshop Series - Day 3
UiPath Studio Web workshop Series - Day 3UiPath Studio Web workshop Series - Day 3
UiPath Studio Web workshop Series - Day 3DianaGray10
 
Keep Your Finger on the Pulse of Your Building's Performance with IES Live
Keep Your Finger on the Pulse of Your Building's Performance with IES LiveKeep Your Finger on the Pulse of Your Building's Performance with IES Live
Keep Your Finger on the Pulse of Your Building's Performance with IES LiveIES VE
 
Automation Ops Series: Session 2 - Governance for UiPath projects
Automation Ops Series: Session 2 - Governance for UiPath projectsAutomation Ops Series: Session 2 - Governance for UiPath projects
Automation Ops Series: Session 2 - Governance for UiPath projectsDianaGray10
 
AI Workshops at Computers In Libraries 2024
AI Workshops at Computers In Libraries 2024AI Workshops at Computers In Libraries 2024
AI Workshops at Computers In Libraries 2024Brian Pichman
 
Extra-120324-Visite-Entreprise-icare.pdf
Extra-120324-Visite-Entreprise-icare.pdfExtra-120324-Visite-Entreprise-icare.pdf
Extra-120324-Visite-Entreprise-icare.pdfInfopole1
 
Introduction to RAG (Retrieval Augmented Generation) and its application
Introduction to RAG (Retrieval Augmented Generation) and its applicationIntroduction to RAG (Retrieval Augmented Generation) and its application
Introduction to RAG (Retrieval Augmented Generation) and its applicationKnoldus Inc.
 

Último (20)

Top 10 Squarespace Development Companies
Top 10 Squarespace Development CompaniesTop 10 Squarespace Development Companies
Top 10 Squarespace Development Companies
 
Stobox 4: Revolutionizing Investment in Real-World Assets Through Tokenization
Stobox 4: Revolutionizing Investment in Real-World Assets Through TokenizationStobox 4: Revolutionizing Investment in Real-World Assets Through Tokenization
Stobox 4: Revolutionizing Investment in Real-World Assets Through Tokenization
 
20140402 - Smart house demo kit
20140402 - Smart house demo kit20140402 - Smart house demo kit
20140402 - Smart house demo kit
 
IT Service Management (ITSM) Best Practices for Advanced Computing
IT Service Management (ITSM) Best Practices for Advanced ComputingIT Service Management (ITSM) Best Practices for Advanced Computing
IT Service Management (ITSM) Best Practices for Advanced Computing
 
Where developers are challenged, what developers want and where DevEx is going
Where developers are challenged, what developers want and where DevEx is goingWhere developers are challenged, what developers want and where DevEx is going
Where developers are challenged, what developers want and where DevEx is going
 
Outage Analysis: March 5th/6th 2024 Meta, Comcast, and LinkedIn
Outage Analysis: March 5th/6th 2024 Meta, Comcast, and LinkedInOutage Analysis: March 5th/6th 2024 Meta, Comcast, and LinkedIn
Outage Analysis: March 5th/6th 2024 Meta, Comcast, and LinkedIn
 
Introduction - IPLOOK NETWORKS CO., LTD.
Introduction - IPLOOK NETWORKS CO., LTD.Introduction - IPLOOK NETWORKS CO., LTD.
Introduction - IPLOOK NETWORKS CO., LTD.
 
How to become a GDSC Lead GDSC MI AOE.pptx
How to become a GDSC Lead GDSC MI AOE.pptxHow to become a GDSC Lead GDSC MI AOE.pptx
How to become a GDSC Lead GDSC MI AOE.pptx
 
UiPath Studio Web workshop series - Day 1
UiPath Studio Web workshop series  - Day 1UiPath Studio Web workshop series  - Day 1
UiPath Studio Web workshop series - Day 1
 
Explore the UiPath Community and ways you can benefit on your journey to auto...
Explore the UiPath Community and ways you can benefit on your journey to auto...Explore the UiPath Community and ways you can benefit on your journey to auto...
Explore the UiPath Community and ways you can benefit on your journey to auto...
 
Graphene Quantum Dots-Based Composites for Biomedical Applications
Graphene Quantum Dots-Based Composites for  Biomedical ApplicationsGraphene Quantum Dots-Based Composites for  Biomedical Applications
Graphene Quantum Dots-Based Composites for Biomedical Applications
 
Design and Modeling for MySQL SCALE 21X Pasadena, CA Mar 2024
Design and Modeling for MySQL SCALE 21X Pasadena, CA Mar 2024Design and Modeling for MySQL SCALE 21X Pasadena, CA Mar 2024
Design and Modeling for MySQL SCALE 21X Pasadena, CA Mar 2024
 
SheDev 2024
SheDev 2024SheDev 2024
SheDev 2024
 
How to release an Open Source Dataweave Library
How to release an Open Source Dataweave LibraryHow to release an Open Source Dataweave Library
How to release an Open Source Dataweave Library
 
UiPath Studio Web workshop Series - Day 3
UiPath Studio Web workshop Series - Day 3UiPath Studio Web workshop Series - Day 3
UiPath Studio Web workshop Series - Day 3
 
Keep Your Finger on the Pulse of Your Building's Performance with IES Live
Keep Your Finger on the Pulse of Your Building's Performance with IES LiveKeep Your Finger on the Pulse of Your Building's Performance with IES Live
Keep Your Finger on the Pulse of Your Building's Performance with IES Live
 
Automation Ops Series: Session 2 - Governance for UiPath projects
Automation Ops Series: Session 2 - Governance for UiPath projectsAutomation Ops Series: Session 2 - Governance for UiPath projects
Automation Ops Series: Session 2 - Governance for UiPath projects
 
AI Workshops at Computers In Libraries 2024
AI Workshops at Computers In Libraries 2024AI Workshops at Computers In Libraries 2024
AI Workshops at Computers In Libraries 2024
 
Extra-120324-Visite-Entreprise-icare.pdf
Extra-120324-Visite-Entreprise-icare.pdfExtra-120324-Visite-Entreprise-icare.pdf
Extra-120324-Visite-Entreprise-icare.pdf
 
Introduction to RAG (Retrieval Augmented Generation) and its application
Introduction to RAG (Retrieval Augmented Generation) and its applicationIntroduction to RAG (Retrieval Augmented Generation) and its application
Introduction to RAG (Retrieval Augmented Generation) and its application
 

Threaths and risks

  • 1. Threaths and Risks in Social Media
  • 2. Basics • Social media and social networking is all about communicating and sharing information with people • Once the information is registered to a page it is no longer private • The personal information can be used to conduct attacks against both the user and the users associates • The more one post the more vulnerable one become • The information posted is NOT only used in the social media • Attacks that uses the shared information but does NOT come by way of the social networking sites: baiting, click-jacking, cross-site scripting, doxing, elicitaion, pharming, phreaking, scams, spoofing and phishing
  • 3. Baiting • Through a USB drive (or other electronic media) preloaded with malware, worms etc. attacking when using the device • Prevent by ensuring the origin of the device is safe
  • 4. Click-jacking • Secret hyperlinks under legitimate links which causes when clicked unknowningly performed actions eg. downloading malware or sharing ID:s • Disable scripting and iframes, maximize the security options
  • 5. Cross-site scripting • Malicious codes injected to trusted websites • Turn off ”HTTP TRACE” support
  • 6. Doxing • Public release of personal indentifying information (including pictures) • Be careful with what to share
  • 7. Elicitation • Strategical use of conversation extracting information without giving the victim the feeling of interrogation • Be aware of the tactics the social engineers use
  • 8. Pharming • Redirecting users from safe sites to extract personal data (eg. mimicking bank sites) • Type websites instead of clicking on links, look out for URL:s that use variations in spelling or domain names
  • 9. Phreaking • Gaining unauthorized access to telecommunication systems • Do not provide secure phone numbers providing access to a Private Branch Exchange or through the Public Branch Exchange to the public phone network
  • 10. Scams • Fake deals that trick people into providing eg. money in exchange for the deal • Sounds too good to be true? Popular events and news are often used as bait to open infected emails, visit infected websites, or donate money to bogus charities
  • 11. Spoofing • Hiding or faking user identitys • Know the co-workers, clients etc. of a business or the family and friends on the other hand
  • 12. Phishing • Usually emails that looks like originated from a legitimate organization/person and contains links or files with malware etc. • Do not open or click on attachments or links if not 100% sure of its safe