SlideShare a Scribd company logo
1 of 13
MIS & ERP
CAT 3
Presented to –
Respected Padmanabhan Sir
Team Members
01
Sheetal
21gsob2010118
03
Ujjwal Saxena
21gsob2010019
05
Harsh Mishra
21gsob2010167
02
Vaishnavi
Singh
21gsob2010400
04
Vikas Anand
21gsob2010166
facebook
Ownership
Marc Zuckerberg
Eduardo Saverin, Andrew
McCollum, Dustin Moskovitz,
and Chris Hughes
Owned by American
company
Meta Platforms- Feb 4,2004
Users
2.94 Billion Monthly active users
( 31 March 2022)
Facebook founder Mark Zuckerberg has announced that his company would get a new
name, Meta. Zuckerberg has downplayed this rebranding, and this is the first in
Facebook's 17 years of existence, and is to divert a barrage of bad PR.
Zuckerberg has been pouring billions of dollars -- $10 billion this year alone, into building
the metaverse -- an expansive, immersive vision of the internet taken from the pages of
sci-fi novels like Snow Crash and Ready Player One.
Facebook has a net worth of $527 billion
Privacy Threats
Nov 29,2011
Deceived
Consumers
By Failing to keep
Privacy promised
August 2013
Messenger
messages were
being accessed
by fb
April 4,2019
Half a billion
records of fb users
were found exposed
on Amazon Cloud
servers
June 7,2018
Bug caused 14
million users
having their
default sharing
as “public”
Sep 2019
200 million users
Phone no.
exposed online
Privacy Threats
Cambridge
Analytica
87 million fb
users info. Were
sold to Congress
Analytica
Phishing
Scam used by criminals to trick
people to revealing passwords,credit
card info. & other sensitive
information.
Internal Data
Leak
Facebook internal email accidently
reveals strategy to deal with data
breach-533 million users
Phishing related News of Facebook
Financial & Reputational Damage
Reputation
Loss due to
Data Privacy
In-efficiency
the shares dropped 25% at one
point, taking $240bn (£177bn)
off its market value, which in
turn led to a 2% drop in the
Nasdaq index.
Importance of IT team
Security Administrator
An IT security admin is a role that includes a wide range of skills and responsibilities to manage
the protection of the company’s data. Some of the most common admin’s responsibilities
include:
•Managing access
•Ensuring that data migration is secure
•Configuring security software
•Monitoring data behavior for abnormal activities
•Implementing security policies
•Testing company’s systems to locate potential risks and vulnerabilities
•Reporting security statuses and incidents (if any)
•Using software tools to automate some of the tasks
IT security consultants assess software, computer systems, and
networks for vulnerabilities, then design and implement the best security
solutions for an organization’s needs. They play the role of both the attacker
and the victim and are asked to locate and potentially exploit vulnerabilities
Cyber Security Tips-For users
Use strong password
Regular Software
Updates
Use of VPN
Manage Social Media
Settings
Cyber Security Tips – For Organizations
THANK YOU

More Related Content

Similar to Privacy threats of Facebook

The Federal Information Security Management Act
The Federal Information Security Management ActThe Federal Information Security Management Act
The Federal Information Security Management Act
Michelle Singh
 
Cyber Security DepartmentGraduation Project (407422)
Cyber Security DepartmentGraduation Project  (407422)Cyber Security DepartmentGraduation Project  (407422)
Cyber Security DepartmentGraduation Project (407422)
OllieShoresna
 
Cybersecurity Business Risk, Literature Review
Cybersecurity Business Risk, Literature ReviewCybersecurity Business Risk, Literature Review
Cybersecurity Business Risk, Literature Review
Enow Eyong
 
The Data Privacy Imperative
The Data Privacy ImperativeThe Data Privacy Imperative
The Data Privacy Imperative
butest
 
Please start preparing the your final project for presentation at .docx
Please start preparing the your final project for presentation at .docxPlease start preparing the your final project for presentation at .docx
Please start preparing the your final project for presentation at .docx
stilliegeorgiana
 

Similar to Privacy threats of Facebook (20)

The Federal Information Security Management Act
The Federal Information Security Management ActThe Federal Information Security Management Act
The Federal Information Security Management Act
 
Cyber Security DepartmentGraduation Project (407422)
Cyber Security DepartmentGraduation Project  (407422)Cyber Security DepartmentGraduation Project  (407422)
Cyber Security DepartmentGraduation Project (407422)
 
How Data Analytics is Re-defining Modern Era in Cyber Security
How Data Analytics is Re-defining Modern Era in Cyber SecurityHow Data Analytics is Re-defining Modern Era in Cyber Security
How Data Analytics is Re-defining Modern Era in Cyber Security
 
Cybersecurity Business Risk, Literature Review
Cybersecurity Business Risk, Literature ReviewCybersecurity Business Risk, Literature Review
Cybersecurity Business Risk, Literature Review
 
IDENTITY DISCLOSURE PROTECTION IN DYNAMIC NETWORKS USING K W – STRUCTURAL DIV...
IDENTITY DISCLOSURE PROTECTION IN DYNAMIC NETWORKS USING K W – STRUCTURAL DIV...IDENTITY DISCLOSURE PROTECTION IN DYNAMIC NETWORKS USING K W – STRUCTURAL DIV...
IDENTITY DISCLOSURE PROTECTION IN DYNAMIC NETWORKS USING K W – STRUCTURAL DIV...
 
User_Access_IIA-LA_3-9-2016
User_Access_IIA-LA_3-9-2016User_Access_IIA-LA_3-9-2016
User_Access_IIA-LA_3-9-2016
 
The Data Privacy Imperative
The Data Privacy ImperativeThe Data Privacy Imperative
The Data Privacy Imperative
 
Colombo White Hat Security 3rd Meetup - Recent Trends & Attacks in Cyberspace
Colombo White Hat Security 3rd Meetup - Recent Trends & Attacks in CyberspaceColombo White Hat Security 3rd Meetup - Recent Trends & Attacks in Cyberspace
Colombo White Hat Security 3rd Meetup - Recent Trends & Attacks in Cyberspace
 
Cisco 2018, Annual Cybersecurity Report
Cisco 2018, Annual Cybersecurity ReportCisco 2018, Annual Cybersecurity Report
Cisco 2018, Annual Cybersecurity Report
 
Social Media Security Risk Slide Share Version
Social Media Security Risk Slide Share VersionSocial Media Security Risk Slide Share Version
Social Media Security Risk Slide Share Version
 
defining the cyber domain.docx
defining the cyber domain.docxdefining the cyber domain.docx
defining the cyber domain.docx
 
Emerging application and data protection for multi cloud
Emerging application and data protection for multi cloudEmerging application and data protection for multi cloud
Emerging application and data protection for multi cloud
 
The 1% Who Can Take Down your Organization
The 1% Who Can Take Down your OrganizationThe 1% Who Can Take Down your Organization
The 1% Who Can Take Down your Organization
 
Protecting Facebook Account From Malicious Attacking Applications
Protecting Facebook Account From Malicious Attacking ApplicationsProtecting Facebook Account From Malicious Attacking Applications
Protecting Facebook Account From Malicious Attacking Applications
 
Cybersecurity report
Cybersecurity reportCybersecurity report
Cybersecurity report
 
Cybersecurity: Protecting Local Government Digital Resources Report
Cybersecurity: Protecting Local Government Digital Resources ReportCybersecurity: Protecting Local Government Digital Resources Report
Cybersecurity: Protecting Local Government Digital Resources Report
 
IRJET- Design and Development of a System for Predicting Threats using Data S...
IRJET- Design and Development of a System for Predicting Threats using Data S...IRJET- Design and Development of a System for Predicting Threats using Data S...
IRJET- Design and Development of a System for Predicting Threats using Data S...
 
Please start preparing the your final project for presentation at .docx
Please start preparing the your final project for presentation at .docxPlease start preparing the your final project for presentation at .docx
Please start preparing the your final project for presentation at .docx
 
How Will Your Cloud Strategy Impact Your Cyber Strategy?
How Will Your Cloud Strategy Impact Your Cyber Strategy?How Will Your Cloud Strategy Impact Your Cyber Strategy?
How Will Your Cloud Strategy Impact Your Cyber Strategy?
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 

Recently uploaded

How to blow up on social media simple di
How to blow up on social media simple diHow to blow up on social media simple di
How to blow up on social media simple di
RachaelOnuche
 

Recently uploaded (7)

MalluProgrammers. Careeradvice.Webinarppt.pdf
MalluProgrammers. Careeradvice.Webinarppt.pdfMalluProgrammers. Careeradvice.Webinarppt.pdf
MalluProgrammers. Careeradvice.Webinarppt.pdf
 
How to blow up on social media simple di
How to blow up on social media simple diHow to blow up on social media simple di
How to blow up on social media simple di
 
Looking to Drive Traffic from Pinterest?
Looking to Drive Traffic from Pinterest?Looking to Drive Traffic from Pinterest?
Looking to Drive Traffic from Pinterest?
 
Want to Amplify Your Pinterest Content?...
Want to Amplify Your Pinterest Content?...Want to Amplify Your Pinterest Content?...
Want to Amplify Your Pinterest Content?...
 
MalluProgrammers. Careeradvice.Webinarppt.pdf
MalluProgrammers. Careeradvice.Webinarppt.pdfMalluProgrammers. Careeradvice.Webinarppt.pdf
MalluProgrammers. Careeradvice.Webinarppt.pdf
 
Unlock Facebook Success with Sociocosmos
Unlock Facebook Success with SociocosmosUnlock Facebook Success with Sociocosmos
Unlock Facebook Success with Sociocosmos
 
The Colossal Studio Events Packages.pdf
The Colossal Studio  Events Packages.pdfThe Colossal Studio  Events Packages.pdf
The Colossal Studio Events Packages.pdf
 

Privacy threats of Facebook

  • 1. MIS & ERP CAT 3 Presented to – Respected Padmanabhan Sir
  • 2. Team Members 01 Sheetal 21gsob2010118 03 Ujjwal Saxena 21gsob2010019 05 Harsh Mishra 21gsob2010167 02 Vaishnavi Singh 21gsob2010400 04 Vikas Anand 21gsob2010166
  • 3. facebook Ownership Marc Zuckerberg Eduardo Saverin, Andrew McCollum, Dustin Moskovitz, and Chris Hughes Owned by American company Meta Platforms- Feb 4,2004 Users 2.94 Billion Monthly active users ( 31 March 2022)
  • 4. Facebook founder Mark Zuckerberg has announced that his company would get a new name, Meta. Zuckerberg has downplayed this rebranding, and this is the first in Facebook's 17 years of existence, and is to divert a barrage of bad PR. Zuckerberg has been pouring billions of dollars -- $10 billion this year alone, into building the metaverse -- an expansive, immersive vision of the internet taken from the pages of sci-fi novels like Snow Crash and Ready Player One. Facebook has a net worth of $527 billion
  • 5.
  • 6. Privacy Threats Nov 29,2011 Deceived Consumers By Failing to keep Privacy promised August 2013 Messenger messages were being accessed by fb April 4,2019 Half a billion records of fb users were found exposed on Amazon Cloud servers June 7,2018 Bug caused 14 million users having their default sharing as “public” Sep 2019 200 million users Phone no. exposed online
  • 7. Privacy Threats Cambridge Analytica 87 million fb users info. Were sold to Congress Analytica Phishing Scam used by criminals to trick people to revealing passwords,credit card info. & other sensitive information. Internal Data Leak Facebook internal email accidently reveals strategy to deal with data breach-533 million users
  • 8. Phishing related News of Facebook
  • 9. Financial & Reputational Damage Reputation Loss due to Data Privacy In-efficiency the shares dropped 25% at one point, taking $240bn (£177bn) off its market value, which in turn led to a 2% drop in the Nasdaq index.
  • 10. Importance of IT team Security Administrator An IT security admin is a role that includes a wide range of skills and responsibilities to manage the protection of the company’s data. Some of the most common admin’s responsibilities include: •Managing access •Ensuring that data migration is secure •Configuring security software •Monitoring data behavior for abnormal activities •Implementing security policies •Testing company’s systems to locate potential risks and vulnerabilities •Reporting security statuses and incidents (if any) •Using software tools to automate some of the tasks IT security consultants assess software, computer systems, and networks for vulnerabilities, then design and implement the best security solutions for an organization’s needs. They play the role of both the attacker and the victim and are asked to locate and potentially exploit vulnerabilities
  • 11. Cyber Security Tips-For users Use strong password Regular Software Updates Use of VPN Manage Social Media Settings
  • 12. Cyber Security Tips – For Organizations