Introduction of Social Media
Advantage of Social Media
Disadvantage of Social Media
why Social Media is free?
Threat of Social Media
Precaution for use of Social Media
KeyLogger
Countermeasures for KeyLogger
1. SOCIAL MEDIA AND ITS EFFECT
ON SECURITY
PRESENTED BY: RAJKIRAN R. NADAR
2. WHAT IS SOCIAL MEDIA:
• Websites and applications that enable users to create and share
content or to participate in social networking.
• Common Feature Of Social Media:
1) interactive Web 2.0 Internet-based applications.
2) User-generated content
3) facilitate the development of online social networks
4) Provide specific service
3. SOME PROMINENT EXAMPLES OF SOCIAL
MEDIA
• Facebook : is a popular free social networking website that
allows registered users to create profiles, upload photos and
video, send messages and keep in touch with friends, family
and colleagues
• Twitter : is a free microblogging service that allows registered
members to broadcast short posts called tweets. Twitter
members can broadcast tweets and follow other users' tweets
by using multiple platforms and devices
• Wikipedia : is a free, open content online encyclopedia created
through the collaborative effort of a community of users known
as Wikipedians.
• LinkedIn : is a social networking site designed specifically for
4. • Google+: is Google's social networking project, designed to
replicate the way people interact offline more closely than is
the case in other social networking services.
• YouTube : is video-sharing website which allows users to
upload, view, rate, share, add to favorites, report, comment on
videos, and subscribe to other users.
• Pinterest is a social curation website for sharing and
categorizing images found online. Pinterest requires brief
descriptions but the main focus of the site is visual
5.
6.
7.
8.
9. Question :
Social Media’s are free website like Facebook or
Google
Then are we customer of free website?
10.
11. 5 THREATS TO YOUR SECURITY WHEN
USING SOCIAL MEDIA:
• 1. Having Your Identity Stolen
• Precautions: 1)Have a strong password:
Check Password Strength: https://howsecureismypassword.net
12. 2. GETTING YOUR COMPUTER OR SOCIAL PROFILE
HACKED
2)Be careful with your status updates
3) Don’t reveal your location.
Precautions:
1) Hover over the link.
2) Try a link scanner: Try URLVoid
3) Check shortened links:
Some shortened link sites include bit.ly, Ow.ly, and
TinyURL.
e.g.: http://bit.ly/KestalCares
13.
14. 3. INADVERTENTLY LETTING STALKERS FIND YOU:
• When you are online, cookies track your activity as you move
from site to site.
Precautions:
1) click on the “Do Not Track” feature
2) clear the cache and cookies on your browser
regularly
4. LETTING BURGLARS KNOW YOUR WHEREABOUTS
Precautions:
1) Use highest privacy control.
2) Be selective with the status updates.
15. 5. BECOMING OVERCONFIDENT
3)Avoid posting specific travel plans. Never post
when, where, or how long you’ll be gone.
4)Wait until you are home to post pictures to a
vacation album
• Many users believe as long as they have a firewall and an
antivirus installed, there is no threat to security.
• Many people also believe that they don’t have anything worth
hacking so there’s no need to worry about security.
16. • Avoid posting information including:
1. Travel plans
2. Your full address and birthdate
3. Your children’s’ names, school, and birthdates
4. Location information, such as the name of your work place
5. Your daily schedule
17. CYBER STALKER ARRESTED
• Hyderabad: A MBA student from Karimnagar was arrested by
Rachakonda cyber cell for harassing a girl by creating a fake
Facebook profile on her name and posting abusive messages to
her friends. He also posted her photo and phone number on
various websites.
18. KEYLOGGER:
• A keylogger is a hardware device or a software program that
records the real time activity of a computer user including the
keyboard keys they press.
19. WHAT INFORMATION A KEYLOGGER CAN
COLLECT ?
• The capabilities of keyloggers vary, but when installed on a device they can
generally do the following:
1. capture any passwords entered by users on the device
2. take screen captures of the device at periodic intervals
3. record the URLs that were visited via Web browsers, and possibly also take
screen captures of the Web pages viewed
4. record a list of the applications run by users on the device
5. capture logs of all instant messaging (IM) sessions
6. capture copies of sent emails
7. automatically send the reports containing stored logs and emails to a
remote location (by email, FTP or HTTP).
20. HOW DOES A KEYLOGGER GET ON YOUR
COMPUTER ?
• A keylogger can be installed on your computer any number of
ways
• Anyone with access to your computer could install it
• Keyloggers could come as a component part of a virus or from
any application installation, despite how deceptively innocent it
may look
• This is part of the reason why you should always be sure you’re
downloading files from a trusted resource.