SlideShare a Scribd company logo
1 of 17
Cyber Security
A Case Study on “ Chatter - A Social networking
platform “
By : Prathibha
PRN : 085
Sec : B
Table of Contents
1. Introduction
2. Why PwC?
3. Chatter’s Cyber Security Position
4. Chatter’s Cyber security risks
5. Pwc teams and Solutions
6. Conclusion
Introduction
Introduction
Cybersecurity entails safeguarding computer systems, networks,
programs, and data from unauthorized access and cyber threats,
ensuring confidentiality, integrity, and availability.
It's vital for protecting sensitive data, preventing unauthorized
access, and maintaining digital system integrity, benefiting
individuals, businesses, and governments by averting financial loss,
reputational damage, and operational disruption.
As cyber threats evolve, robust cybersecurity investments are
indispensable for upholding trust and resilience in our
interconnected digital landscape.
Why PwC?
Why Choose PwC?
PwC, a top-tier professional services firm, provides bespoke
cybersecurity solutions addressing diverse business requirements.
Drawing upon extensive experience in audit, consulting, and
technology, PwC aids organizations in mitigating cyber risks and
defending digital assets against emerging threats.
As a frontrunner in social media cybersecurity, PwC conducts
thorough assessments and deploys customized strategies alongside
cutting-edge technologies to safeguard user data. With a global
presence spanning 150 countries, PwC emphasizes trust and
transparency, working closely with clients to enhance security
awareness and resilience against cyber threats while preserving
platform integrity.
Chatter’s Cyber Security
Position
Chatter - Cyber Security Position
Physical assets :
1. Company iPhones and laptops
2. Staff and their awareness of
cyber security
3. Data Storage Devices
4. Servers
5. Network Equipment
Informational Assets:
1. User details ( bank passwords,
locations, addresses, profiles )
2. Company Analysis reports
3. Security and Access Controls
4. Intellectual property like patents,
copyrights, trade marks.
We can analyze Chatter’s Cyber Security Position by a simple Security Risk
Assessment.
Assets Identification : We Identify the types of assets that could possibly be at
risk
Threats to assets :
Theft- Theft of assets refers to the unlawful taking or removal of property or resources
belonging to an entity.This can lead to unauthorised access of data
Phishing - Phishing is a deceptive cyber attack where attackers trick people into giving
sensitive information by impersonating trusted sources.
Malwares- Malware, short for malicious software, refers to any software intentionally
designed to cause damage, disrupt operations, or gain unauthorized access to computer
systems or networks.
Data Breaches - A data breach occurs when sensitive, confidential, or protected
information is accessed, disclosed, or used by unauthorized parties without authorization.
DoS attacks- A Denial-of-Service (DoS) attack is a cyber attack that aims to disrupt or
temporarily disable a computer system or network by overwhelming it with a flood of
excessive traffic, thus rendering it inaccessible to legitimate users.
Vulnerability assessment:
The recent incident involving the theft of a Chatter employee's laptop poses a
significant threat to the platform's cybersecurity. Access to the information stored
on the stolen device could potentially be exploited to compromise the integrity of the
company's data.
Additionally, due to employees' limited knowledge of cybersecurity measures,
Chatter is susceptible to various threats including unauthorized access, spyware,
malware, and ransomware attacks.
Furthermore, the possibility of a Denial of Service (DoS) attack on the app could
result in user dissatisfaction and loss of user base. Despite inherent vulnerabilities,
efforts to mitigate cybersecurity risks are imperative to safeguard Chatter's digital
infrastructure and minimize potential harm.
Chatter’s Risks
1. Breach of User Data:
- Users share personal information, including photos, videos, addresses, and
bank details, on Chatter.
- Third-party data breaches can lead to severe consequences, such as access to
sensitive information by hackers, exploitation by human-trafficking
organizations, and financial scams ( caused by usage of user’s bank info for in-
app purchases being leaked ).
- Regulatory scrutiny, legal liabilities, and reputational damage may result
from data privacy concerns.
- Loss of user trust and market share to competitors are potential outcomes
for Chatter.
2.DoS Attacks on Servers:
- Hackers disrupt Chatter's operations by launching DoS attacks on its servers using malware
and viruses.
- Depending on the severity, these attacks can cause minor to major disruptions, affecting the
organization's revenue and day-to-day operations.
3.Account Takeover, Impersonation, and False Information:
- Hackers gaining unauthorized access to user or employee credentials can impersonate
individuals or spread false information on behalf of the company.
- This can lead to legal consequences and damage the organization's reputation.
PwC’s Solutions
PwC Team’s Solutions
Chatter’s priorities should be :
1. Maintenance of Privacy of user information
2. Building stronger measures against hacking, malwares.
3. Training employees and keeping their skills with respect to cyber security up to
date.
4. Setting up new authentication systems to avoid possibilities of unauthorized access.
Core advisory Team :
Providing a complete analysis to Chatter’s Management on the type, levels and
probabilities of different kinds of cyber security risks to design a good strategy for
maintaining and upgrading measures against cyber security risk.
Crisis Team :
1. Handle the incident of the “ loss of a laptop “ by finding ways to secure data in the
laptop and avoid further issues of the incident
2. Teach the employees ways to avoid, handle and recover from such attacks.
Cyber Threat team:
1. This team will help chatter in making themselves aware about potential
cyber threats and help in prevention of cyber security risks by staying
updated.
2. Ethical hackers can also e used by chatter to test the levels and weaknesses
in their cyber security measures being used.
Identity and access Management :
A new system for authorisation must be used by Chatter’s employees such that
unauthorised access is prevented and an additional layer of safety is provided by the
organisation in a way that doesn’t allow hackers to gain information of the company
and/or its users easily.
Conclusion
Conclusion
In conclusion, ensuring robust cybersecurity measures for Chatter,
or any social media platform, is paramount in safeguarding user
data, maintaining trust, and upholding the integrity of the platform.
By addressing risks such as data breaches, phishing attacks, content
moderation challenges, and privacy violations, Chatter can bolster its
defences against evolving cyber threats.
Implementing proactive security strategies, regular risk
assessments, user education initiatives, and compliance with
relevant regulations are essential steps in mitigating these risks and
fostering a secure digital environment for users.
Through continuous vigilance and investment in cybersecurity,
Chatter can navigate the complex landscape of cyber threats while
providing a safe and trusted platform for users to connect and
communicate.

More Related Content

Similar to Chatter's cyber security position analysis

Cyber Security Threats | Cyberroot Risk Advisory
Cyber Security Threats | Cyberroot Risk AdvisoryCyber Security Threats | Cyberroot Risk Advisory
Cyber Security Threats | Cyberroot Risk AdvisoryCR Group
 
SEMINAR ON CYBER SECURITY.pptx
SEMINAR ON CYBER SECURITY.pptxSEMINAR ON CYBER SECURITY.pptx
SEMINAR ON CYBER SECURITY.pptxGauravWankar2
 
Understanding Cybersecurity Risk_ Protecting Your Digital Assets.pptx
Understanding Cybersecurity Risk_ Protecting Your Digital Assets.pptxUnderstanding Cybersecurity Risk_ Protecting Your Digital Assets.pptx
Understanding Cybersecurity Risk_ Protecting Your Digital Assets.pptxoffensoSEOwork
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfCareerera
 
SECURITY TOOLS AND PRACTICES THAT ARE MINIMISING THE SURGE IN SUPPLY CHAIN AT...
SECURITY TOOLS AND PRACTICES THAT ARE MINIMISING THE SURGE IN SUPPLY CHAIN AT...SECURITY TOOLS AND PRACTICES THAT ARE MINIMISING THE SURGE IN SUPPLY CHAIN AT...
SECURITY TOOLS AND PRACTICES THAT ARE MINIMISING THE SURGE IN SUPPLY CHAIN AT...VOROR
 
Introduction-to-Cyber-Security presentation.pdf
Introduction-to-Cyber-Security presentation.pdfIntroduction-to-Cyber-Security presentation.pdf
Introduction-to-Cyber-Security presentation.pdfNaruto103394
 
Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdfPavelVtek3
 
Cyber security
Cyber securityCyber security
Cyber securityAkdu095
 
How to avoid cyber security attacks in 2024 - CyberHive.pdf
How to avoid cyber security attacks in 2024 - CyberHive.pdfHow to avoid cyber security attacks in 2024 - CyberHive.pdf
How to avoid cyber security attacks in 2024 - CyberHive.pdfonline Marketing
 
Cyber Threat Intelligence.pptx
Cyber Threat Intelligence.pptxCyber Threat Intelligence.pptx
Cyber Threat Intelligence.pptxAbimbolaFisher1
 
CyberSecurity and Importance of cybersecurity
CyberSecurity and Importance of cybersecurityCyberSecurity and Importance of cybersecurity
CyberSecurity and Importance of cybersecurityHome
 
DIGITAL EMPOWERMENT ASSIGNMENT.docx
DIGITAL EMPOWERMENT ASSIGNMENT.docxDIGITAL EMPOWERMENT ASSIGNMENT.docx
DIGITAL EMPOWERMENT ASSIGNMENT.docxHateMe9
 

Similar to Chatter's cyber security position analysis (20)

Cyber Security Threats | Cyberroot Risk Advisory
Cyber Security Threats | Cyberroot Risk AdvisoryCyber Security Threats | Cyberroot Risk Advisory
Cyber Security Threats | Cyberroot Risk Advisory
 
SEMINAR ON CYBER SECURITY.pptx
SEMINAR ON CYBER SECURITY.pptxSEMINAR ON CYBER SECURITY.pptx
SEMINAR ON CYBER SECURITY.pptx
 
Module 1.pdf
Module 1.pdfModule 1.pdf
Module 1.pdf
 
module 1 Cyber Security Concepts
module 1 Cyber Security Conceptsmodule 1 Cyber Security Concepts
module 1 Cyber Security Concepts
 
Understanding Cybersecurity Risk_ Protecting Your Digital Assets.pptx
Understanding Cybersecurity Risk_ Protecting Your Digital Assets.pptxUnderstanding Cybersecurity Risk_ Protecting Your Digital Assets.pptx
Understanding Cybersecurity Risk_ Protecting Your Digital Assets.pptx
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
 
DarkWeb
DarkWebDarkWeb
DarkWeb
 
THESIS-2(2)
THESIS-2(2)THESIS-2(2)
THESIS-2(2)
 
SECURITY TOOLS AND PRACTICES THAT ARE MINIMISING THE SURGE IN SUPPLY CHAIN AT...
SECURITY TOOLS AND PRACTICES THAT ARE MINIMISING THE SURGE IN SUPPLY CHAIN AT...SECURITY TOOLS AND PRACTICES THAT ARE MINIMISING THE SURGE IN SUPPLY CHAIN AT...
SECURITY TOOLS AND PRACTICES THAT ARE MINIMISING THE SURGE IN SUPPLY CHAIN AT...
 
Introduction-to-Cyber-Security presentation.pdf
Introduction-to-Cyber-Security presentation.pdfIntroduction-to-Cyber-Security presentation.pdf
Introduction-to-Cyber-Security presentation.pdf
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdf
 
C018131821
C018131821C018131821
C018131821
 
Mim Attack Essay
Mim Attack EssayMim Attack Essay
Mim Attack Essay
 
Cyber security
Cyber securityCyber security
Cyber security
 
How to avoid cyber security attacks in 2024 - CyberHive.pdf
How to avoid cyber security attacks in 2024 - CyberHive.pdfHow to avoid cyber security attacks in 2024 - CyberHive.pdf
How to avoid cyber security attacks in 2024 - CyberHive.pdf
 
Cyber Threat Intelligence.pptx
Cyber Threat Intelligence.pptxCyber Threat Intelligence.pptx
Cyber Threat Intelligence.pptx
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
CyberSecurity and Importance of cybersecurity
CyberSecurity and Importance of cybersecurityCyberSecurity and Importance of cybersecurity
CyberSecurity and Importance of cybersecurity
 
DIGITAL EMPOWERMENT ASSIGNMENT.docx
DIGITAL EMPOWERMENT ASSIGNMENT.docxDIGITAL EMPOWERMENT ASSIGNMENT.docx
DIGITAL EMPOWERMENT ASSIGNMENT.docx
 

Recently uploaded

CATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDF
CATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDFCATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDF
CATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDFOrient Homes
 
Pitch Deck Teardown: NOQX's $200k Pre-seed deck
Pitch Deck Teardown: NOQX's $200k Pre-seed deckPitch Deck Teardown: NOQX's $200k Pre-seed deck
Pitch Deck Teardown: NOQX's $200k Pre-seed deckHajeJanKamps
 
NewBase 22 April 2024 Energy News issue - 1718 by Khaled Al Awadi (AutoRe...
NewBase  22 April  2024  Energy News issue - 1718 by Khaled Al Awadi  (AutoRe...NewBase  22 April  2024  Energy News issue - 1718 by Khaled Al Awadi  (AutoRe...
NewBase 22 April 2024 Energy News issue - 1718 by Khaled Al Awadi (AutoRe...Khaled Al Awadi
 
Investment analysis and portfolio management
Investment analysis and portfolio managementInvestment analysis and portfolio management
Investment analysis and portfolio managementJunaidKhan750825
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessAggregage
 
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In.../:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...lizamodels9
 
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCRsoniya singh
 
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts ServiceVip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Serviceankitnayak356677
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis UsageNeil Kimberley
 
Non Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptxNon Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptxAbhayThakur200703
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCRsoniya singh
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756
Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756
Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756dollysharma2066
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth MarketingShawn Pang
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurSuhani Kapoor
 
BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
Islamabad Escorts | Call 03274100048 | Escort Service in Islamabad
Islamabad Escorts | Call 03274100048 | Escort Service in IslamabadIslamabad Escorts | Call 03274100048 | Escort Service in Islamabad
Islamabad Escorts | Call 03274100048 | Escort Service in IslamabadAyesha Khan
 

Recently uploaded (20)

CATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDF
CATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDFCATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDF
CATALOG cáp điện Goldcup (bảng giá) 1.4.2024.PDF
 
Pitch Deck Teardown: NOQX's $200k Pre-seed deck
Pitch Deck Teardown: NOQX's $200k Pre-seed deckPitch Deck Teardown: NOQX's $200k Pre-seed deck
Pitch Deck Teardown: NOQX's $200k Pre-seed deck
 
NewBase 22 April 2024 Energy News issue - 1718 by Khaled Al Awadi (AutoRe...
NewBase  22 April  2024  Energy News issue - 1718 by Khaled Al Awadi  (AutoRe...NewBase  22 April  2024  Energy News issue - 1718 by Khaled Al Awadi  (AutoRe...
NewBase 22 April 2024 Energy News issue - 1718 by Khaled Al Awadi (AutoRe...
 
Investment analysis and portfolio management
Investment analysis and portfolio managementInvestment analysis and portfolio management
Investment analysis and portfolio management
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for Success
 
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In.../:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
 
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
 
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts ServiceVip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage
 
Non Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptxNon Text Magic Studio Magic Design for Presentations L&P.pptx
Non Text Magic Studio Magic Design for Presentations L&P.pptx
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Hauz Khas 🔝 Delhi NCR
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756
Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756
Call Girls In ⇛⇛Chhatarpur⇚⇚. Brings Offer Delhi Contact Us 8377877756
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
 
Best Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting PartnershipBest Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting Partnership
 
BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In BELLMONT HOTEL ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
Islamabad Escorts | Call 03274100048 | Escort Service in Islamabad
Islamabad Escorts | Call 03274100048 | Escort Service in IslamabadIslamabad Escorts | Call 03274100048 | Escort Service in Islamabad
Islamabad Escorts | Call 03274100048 | Escort Service in Islamabad
 

Chatter's cyber security position analysis

  • 1. Cyber Security A Case Study on “ Chatter - A Social networking platform “ By : Prathibha PRN : 085 Sec : B
  • 2. Table of Contents 1. Introduction 2. Why PwC? 3. Chatter’s Cyber Security Position 4. Chatter’s Cyber security risks 5. Pwc teams and Solutions 6. Conclusion
  • 4. Introduction Cybersecurity entails safeguarding computer systems, networks, programs, and data from unauthorized access and cyber threats, ensuring confidentiality, integrity, and availability. It's vital for protecting sensitive data, preventing unauthorized access, and maintaining digital system integrity, benefiting individuals, businesses, and governments by averting financial loss, reputational damage, and operational disruption. As cyber threats evolve, robust cybersecurity investments are indispensable for upholding trust and resilience in our interconnected digital landscape.
  • 6. Why Choose PwC? PwC, a top-tier professional services firm, provides bespoke cybersecurity solutions addressing diverse business requirements. Drawing upon extensive experience in audit, consulting, and technology, PwC aids organizations in mitigating cyber risks and defending digital assets against emerging threats. As a frontrunner in social media cybersecurity, PwC conducts thorough assessments and deploys customized strategies alongside cutting-edge technologies to safeguard user data. With a global presence spanning 150 countries, PwC emphasizes trust and transparency, working closely with clients to enhance security awareness and resilience against cyber threats while preserving platform integrity.
  • 8. Chatter - Cyber Security Position Physical assets : 1. Company iPhones and laptops 2. Staff and their awareness of cyber security 3. Data Storage Devices 4. Servers 5. Network Equipment Informational Assets: 1. User details ( bank passwords, locations, addresses, profiles ) 2. Company Analysis reports 3. Security and Access Controls 4. Intellectual property like patents, copyrights, trade marks. We can analyze Chatter’s Cyber Security Position by a simple Security Risk Assessment. Assets Identification : We Identify the types of assets that could possibly be at risk
  • 9. Threats to assets : Theft- Theft of assets refers to the unlawful taking or removal of property or resources belonging to an entity.This can lead to unauthorised access of data Phishing - Phishing is a deceptive cyber attack where attackers trick people into giving sensitive information by impersonating trusted sources. Malwares- Malware, short for malicious software, refers to any software intentionally designed to cause damage, disrupt operations, or gain unauthorized access to computer systems or networks. Data Breaches - A data breach occurs when sensitive, confidential, or protected information is accessed, disclosed, or used by unauthorized parties without authorization. DoS attacks- A Denial-of-Service (DoS) attack is a cyber attack that aims to disrupt or temporarily disable a computer system or network by overwhelming it with a flood of excessive traffic, thus rendering it inaccessible to legitimate users.
  • 10. Vulnerability assessment: The recent incident involving the theft of a Chatter employee's laptop poses a significant threat to the platform's cybersecurity. Access to the information stored on the stolen device could potentially be exploited to compromise the integrity of the company's data. Additionally, due to employees' limited knowledge of cybersecurity measures, Chatter is susceptible to various threats including unauthorized access, spyware, malware, and ransomware attacks. Furthermore, the possibility of a Denial of Service (DoS) attack on the app could result in user dissatisfaction and loss of user base. Despite inherent vulnerabilities, efforts to mitigate cybersecurity risks are imperative to safeguard Chatter's digital infrastructure and minimize potential harm.
  • 11. Chatter’s Risks 1. Breach of User Data: - Users share personal information, including photos, videos, addresses, and bank details, on Chatter. - Third-party data breaches can lead to severe consequences, such as access to sensitive information by hackers, exploitation by human-trafficking organizations, and financial scams ( caused by usage of user’s bank info for in- app purchases being leaked ). - Regulatory scrutiny, legal liabilities, and reputational damage may result from data privacy concerns. - Loss of user trust and market share to competitors are potential outcomes for Chatter.
  • 12. 2.DoS Attacks on Servers: - Hackers disrupt Chatter's operations by launching DoS attacks on its servers using malware and viruses. - Depending on the severity, these attacks can cause minor to major disruptions, affecting the organization's revenue and day-to-day operations. 3.Account Takeover, Impersonation, and False Information: - Hackers gaining unauthorized access to user or employee credentials can impersonate individuals or spread false information on behalf of the company. - This can lead to legal consequences and damage the organization's reputation.
  • 14. PwC Team’s Solutions Chatter’s priorities should be : 1. Maintenance of Privacy of user information 2. Building stronger measures against hacking, malwares. 3. Training employees and keeping their skills with respect to cyber security up to date. 4. Setting up new authentication systems to avoid possibilities of unauthorized access. Core advisory Team : Providing a complete analysis to Chatter’s Management on the type, levels and probabilities of different kinds of cyber security risks to design a good strategy for maintaining and upgrading measures against cyber security risk.
  • 15. Crisis Team : 1. Handle the incident of the “ loss of a laptop “ by finding ways to secure data in the laptop and avoid further issues of the incident 2. Teach the employees ways to avoid, handle and recover from such attacks. Cyber Threat team: 1. This team will help chatter in making themselves aware about potential cyber threats and help in prevention of cyber security risks by staying updated. 2. Ethical hackers can also e used by chatter to test the levels and weaknesses in their cyber security measures being used. Identity and access Management : A new system for authorisation must be used by Chatter’s employees such that unauthorised access is prevented and an additional layer of safety is provided by the organisation in a way that doesn’t allow hackers to gain information of the company and/or its users easily.
  • 17. Conclusion In conclusion, ensuring robust cybersecurity measures for Chatter, or any social media platform, is paramount in safeguarding user data, maintaining trust, and upholding the integrity of the platform. By addressing risks such as data breaches, phishing attacks, content moderation challenges, and privacy violations, Chatter can bolster its defences against evolving cyber threats. Implementing proactive security strategies, regular risk assessments, user education initiatives, and compliance with relevant regulations are essential steps in mitigating these risks and fostering a secure digital environment for users. Through continuous vigilance and investment in cybersecurity, Chatter can navigate the complex landscape of cyber threats while providing a safe and trusted platform for users to connect and communicate.