SlideShare a Scribd company logo
1 of 13
Threaths and Risks
in Social Media
Basics
•

Social media and social networking is all about communicating and sharing
information with people

•

Once the information is registered to a page it is no longer private

•

The personal information can be used to conduct attacks against both the user
and the users associates

•

The more one post the more vulnerable one become

•

The information posted is NOT only used in the social media

•

Attacks that uses the shared information but does NOT come by way of the
social networking sites: baiting, click-jacking, cross-site scripting, doxing,
elicitaion, pharming, phreaking, scams, spoofing and phishing
Baiting
•

Through a USB drive (or other electronic media) preloaded with malware,
worms etc. attacking when using the device

•

Prevent by ensuring the origin of the device is safe
Click-jacking
•

Secret hyperlinks under legitimate links which causes when clicked
unknowningly performed actions eg. downloading malware or sharing ID:s

•

Disable scripting and iframes, maximize the security options
Cross-site scripting
•

Malicious codes injected to trusted websites

•

Turn off ”HTTP TRACE” support
Doxing
•

Public release of personal indentifying information (including pictures)

•

Be careful with what to share
Elicitation
•

Strategical use of conversation extracting information without giving the victim
the feeling of interrogation

•

Be aware of the tactics the social engineers use
Pharming
•

Redirecting users from safe sites to extract personal data (eg. mimicking bank
sites)

•

Type websites instead of clicking on links, look out for URL:s that use variations
in spelling or domain names
Phreaking
•

Gaining unauthorized access to telecommunication systems

•

Do not provide secure phone numbers providing access to a Private Branch
Exchange or through the Public Branch Exchange to the public phone network
Scams
•

Fake deals that trick people into providing eg. money in exchange for the deal

•

Sounds too good to be true? Popular events and news are often used as bait to
open infected emails, visit infected websites, or donate money to bogus
charities
Spoofing
•

Hiding or faking user identitys

•

Know the co-workers, clients etc. of a business or the family and friends on the
other hand
Phishing
•

Usually emails that looks like originated from a legitimate organization/person
and contains links or files with malware etc.

•

Do not open or click on attachments or links if not 100% sure of its safe
Sources
•

http://www.fbi.gov/about-us/investigate/counterintelligence/internet-socialnetworking-risks

More Related Content

What's hot

Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009
canadianlawyer
 
Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235
brendaylo
 

What's hot (18)

Internet Safety Glossary of Terms
Internet Safety Glossary of TermsInternet Safety Glossary of Terms
Internet Safety Glossary of Terms
 
Chapter 8.legal. opportunities
Chapter 8.legal. opportunitiesChapter 8.legal. opportunities
Chapter 8.legal. opportunities
 
Day 2
Day 2Day 2
Day 2
 
Social media-threats
Social media-threatsSocial media-threats
Social media-threats
 
UW School of Medicine Social Engineering and Phishing Awareness
UW School of Medicine   Social Engineering and Phishing AwarenessUW School of Medicine   Social Engineering and Phishing Awareness
UW School of Medicine Social Engineering and Phishing Awareness
 
Social media privacy issues
Social media privacy issuesSocial media privacy issues
Social media privacy issues
 
Social media risk
Social media riskSocial media risk
Social media risk
 
Social media-threats
Social media-threatsSocial media-threats
Social media-threats
 
Social Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social MediaSocial Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social Media
 
Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009Social Media And Privacy October 9 2009
Social Media And Privacy October 9 2009
 
Introduction to Social engineering | Techniques of Social engineering
Introduction to Social engineering | Techniques of Social engineeringIntroduction to Social engineering | Techniques of Social engineering
Introduction to Social engineering | Techniques of Social engineering
 
Cyber safety 101
Cyber safety 101Cyber safety 101
Cyber safety 101
 
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment TechnologiesOnline Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
 
Online safety, security, and ethics
Online safety, security, and ethicsOnline safety, security, and ethics
Online safety, security, and ethics
 
Social Media and the Future of Privacy
Social Media and the Future of PrivacySocial Media and the Future of Privacy
Social Media and the Future of Privacy
 
Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235
 
Social Networking Threats
Social Networking ThreatsSocial Networking Threats
Social Networking Threats
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquette
 

Viewers also liked

06 01-13 - jesus, the solution to a big problem
06 01-13 - jesus, the solution to a big problem06 01-13 - jesus, the solution to a big problem
06 01-13 - jesus, the solution to a big problem
andywestphal3
 
Cele mai importante inventii din istorie
Cele mai importante inventii din istorieCele mai importante inventii din istorie
Cele mai importante inventii din istorie
Loreta Gherghinoiu
 
Awodele toxicidad moringa
Awodele toxicidad moringaAwodele toxicidad moringa
Awodele toxicidad moringa
Fausto Dutan
 
Ntl sources slides 2011 gpo
Ntl sources slides 2011 gpoNtl sources slides 2011 gpo
Ntl sources slides 2011 gpo
Rosalyn Alleman
 
Ecological succession & cycles of matter
Ecological succession & cycles of matterEcological succession & cycles of matter
Ecological succession & cycles of matter
jdrinks
 
Vocabulary yr
Vocabulary yrVocabulary yr
Vocabulary yr
jdrinks
 
Vocabulary yr
Vocabulary yrVocabulary yr
Vocabulary yr
jdrinks
 

Viewers also liked (20)

06 01-13 - jesus, the solution to a big problem
06 01-13 - jesus, the solution to a big problem06 01-13 - jesus, the solution to a big problem
06 01-13 - jesus, the solution to a big problem
 
Present perfect continuous
Present perfect continuousPresent perfect continuous
Present perfect continuous
 
How to lose a job?
How to lose a job?How to lose a job?
How to lose a job?
 
Cele mai importante inventii din istorie
Cele mai importante inventii din istorieCele mai importante inventii din istorie
Cele mai importante inventii din istorie
 
environment
environmentenvironment
environment
 
State of Rural Minnesota 2013-preview
State of Rural Minnesota 2013-previewState of Rural Minnesota 2013-preview
State of Rural Minnesota 2013-preview
 
Mathematical Sets
Mathematical Sets Mathematical Sets
Mathematical Sets
 
Sot 2008 revisi
Sot 2008 revisiSot 2008 revisi
Sot 2008 revisi
 
Programa propio de dearrollo personal
Programa propio de dearrollo personalPrograma propio de dearrollo personal
Programa propio de dearrollo personal
 
Awodele toxicidad moringa
Awodele toxicidad moringaAwodele toxicidad moringa
Awodele toxicidad moringa
 
Walter
WalterWalter
Walter
 
Global warming.jasper
Global warming.jasperGlobal warming.jasper
Global warming.jasper
 
Ntl sources slides 2011 gpo
Ntl sources slides 2011 gpoNtl sources slides 2011 gpo
Ntl sources slides 2011 gpo
 
crea tu pagina web
crea tu pagina webcrea tu pagina web
crea tu pagina web
 
TDD carlos vences
TDD   carlos vencesTDD   carlos vences
TDD carlos vences
 
Ecological succession & cycles of matter
Ecological succession & cycles of matterEcological succession & cycles of matter
Ecological succession & cycles of matter
 
Imc presentation
Imc presentationImc presentation
Imc presentation
 
Vocabulary yr
Vocabulary yrVocabulary yr
Vocabulary yr
 
vmware optimization
vmware optimizationvmware optimization
vmware optimization
 
Vocabulary yr
Vocabulary yrVocabulary yr
Vocabulary yr
 

Similar to Threaths and risks

INTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptxINTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptx
BHUt6
 

Similar to Threaths and risks (20)

Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptx
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptx
 
INTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptxINTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptx
 
Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?Social Engineering - Are You Protecting Your Data Enough?
Social Engineering - Are You Protecting Your Data Enough?
 
Introduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptxIntroduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptx
 
edu 3 ppt.pptx
edu 3 ppt.pptxedu 3 ppt.pptx
edu 3 ppt.pptx
 
HACKING VS PHISHING.pptx
HACKING VS PHISHING.pptxHACKING VS PHISHING.pptx
HACKING VS PHISHING.pptx
 
HACKING VS PHISHING.pptx
HACKING VS PHISHING.pptxHACKING VS PHISHING.pptx
HACKING VS PHISHING.pptx
 
Phishing 101 General Course
Phishing 101 General CoursePhishing 101 General Course
Phishing 101 General Course
 
Guideline about responsible use of social networks
Guideline about responsible use of social networksGuideline about responsible use of social networks
Guideline about responsible use of social networks
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
 
OWASP_Presentation_FINAl. Cybercrime and cyber security awareness
OWASP_Presentation_FINAl. Cybercrime and cyber security awarenessOWASP_Presentation_FINAl. Cybercrime and cyber security awareness
OWASP_Presentation_FINAl. Cybercrime and cyber security awareness
 
SOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITYSOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITY
 
Securing and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupSecuring and Safeguarding Your Library Setup
Securing and Safeguarding Your Library Setup
 
Unit iii: Common Hacking Techniques
Unit iii: Common Hacking TechniquesUnit iii: Common Hacking Techniques
Unit iii: Common Hacking Techniques
 
Cyber crime ppt for class 9th and 12th
Cyber crime ppt for class 9th and 12thCyber crime ppt for class 9th and 12th
Cyber crime ppt for class 9th and 12th
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2
 
NENA 2017 Doxing and Social Engineering
NENA 2017 Doxing and Social EngineeringNENA 2017 Doxing and Social Engineering
NENA 2017 Doxing and Social Engineering
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids
 

More from HHSome

Reputational risk on social media
Reputational risk on social mediaReputational risk on social media
Reputational risk on social media
HHSome
 
Spy Programs
Spy ProgramsSpy Programs
Spy Programs
HHSome
 
Social engineering
Social engineeringSocial engineering
Social engineering
HHSome
 
Katharina Urlbauer- SMM A4 Facelessness
Katharina Urlbauer- SMM A4 FacelessnessKatharina Urlbauer- SMM A4 Facelessness
Katharina Urlbauer- SMM A4 Facelessness
HHSome
 
Over posting
Over postingOver posting
Over posting
HHSome
 
Censorship
CensorshipCensorship
Censorship
HHSome
 
Piracy and infringement
Piracy and infringement Piracy and infringement
Piracy and infringement
HHSome
 
Threaths and risks
Threaths and risksThreaths and risks
Threaths and risks
HHSome
 
Assigment 4 link to prezi
Assigment 4 link to preziAssigment 4 link to prezi
Assigment 4 link to prezi
HHSome
 
Lisa Koivunen, Risks and Threats in over promoting
Lisa Koivunen, Risks and Threats in over promotingLisa Koivunen, Risks and Threats in over promoting
Lisa Koivunen, Risks and Threats in over promoting
HHSome
 
Personal information
Personal informationPersonal information
Personal information
HHSome
 

More from HHSome (19)

Assignment4
Assignment4Assignment4
Assignment4
 
Reputational risk on social media
Reputational risk on social mediaReputational risk on social media
Reputational risk on social media
 
Spy Programs
Spy ProgramsSpy Programs
Spy Programs
 
Social media threats and risks: corporate espionage
Social media threats and risks: corporate espionageSocial media threats and risks: corporate espionage
Social media threats and risks: corporate espionage
 
Assignment 4 Netiquette Kalle Andersson
Assignment 4 Netiquette Kalle AnderssonAssignment 4 Netiquette Kalle Andersson
Assignment 4 Netiquette Kalle Andersson
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Katharina Urlbauer- SMM A4 Facelessness
Katharina Urlbauer- SMM A4 FacelessnessKatharina Urlbauer- SMM A4 Facelessness
Katharina Urlbauer- SMM A4 Facelessness
 
Over posting
Over postingOver posting
Over posting
 
Censorship
CensorshipCensorship
Censorship
 
Piracy and infringement
Piracy and infringement Piracy and infringement
Piracy and infringement
 
Threaths and risks
Threaths and risksThreaths and risks
Threaths and risks
 
Assigment 4 link to prezi
Assigment 4 link to preziAssigment 4 link to prezi
Assigment 4 link to prezi
 
Lisa Koivunen, Risks and Threats in over promoting
Lisa Koivunen, Risks and Threats in over promotingLisa Koivunen, Risks and Threats in over promoting
Lisa Koivunen, Risks and Threats in over promoting
 
Phishing
PhishingPhishing
Phishing
 
Identity thefts
Identity theftsIdentity thefts
Identity thefts
 
Personal information
Personal informationPersonal information
Personal information
 
Risks and Threats in SoMe: Payments
Risks and Threats in SoMe: PaymentsRisks and Threats in SoMe: Payments
Risks and Threats in SoMe: Payments
 
Malware
MalwareMalware
Malware
 
Assignment4 yannick kramm
Assignment4 yannick krammAssignment4 yannick kramm
Assignment4 yannick kramm
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 

Threaths and risks

  • 1. Threaths and Risks in Social Media
  • 2. Basics • Social media and social networking is all about communicating and sharing information with people • Once the information is registered to a page it is no longer private • The personal information can be used to conduct attacks against both the user and the users associates • The more one post the more vulnerable one become • The information posted is NOT only used in the social media • Attacks that uses the shared information but does NOT come by way of the social networking sites: baiting, click-jacking, cross-site scripting, doxing, elicitaion, pharming, phreaking, scams, spoofing and phishing
  • 3. Baiting • Through a USB drive (or other electronic media) preloaded with malware, worms etc. attacking when using the device • Prevent by ensuring the origin of the device is safe
  • 4. Click-jacking • Secret hyperlinks under legitimate links which causes when clicked unknowningly performed actions eg. downloading malware or sharing ID:s • Disable scripting and iframes, maximize the security options
  • 5. Cross-site scripting • Malicious codes injected to trusted websites • Turn off ”HTTP TRACE” support
  • 6. Doxing • Public release of personal indentifying information (including pictures) • Be careful with what to share
  • 7. Elicitation • Strategical use of conversation extracting information without giving the victim the feeling of interrogation • Be aware of the tactics the social engineers use
  • 8. Pharming • Redirecting users from safe sites to extract personal data (eg. mimicking bank sites) • Type websites instead of clicking on links, look out for URL:s that use variations in spelling or domain names
  • 9. Phreaking • Gaining unauthorized access to telecommunication systems • Do not provide secure phone numbers providing access to a Private Branch Exchange or through the Public Branch Exchange to the public phone network
  • 10. Scams • Fake deals that trick people into providing eg. money in exchange for the deal • Sounds too good to be true? Popular events and news are often used as bait to open infected emails, visit infected websites, or donate money to bogus charities
  • 11. Spoofing • Hiding or faking user identitys • Know the co-workers, clients etc. of a business or the family and friends on the other hand
  • 12. Phishing • Usually emails that looks like originated from a legitimate organization/person and contains links or files with malware etc. • Do not open or click on attachments or links if not 100% sure of its safe