A short informational presentation for educators on the role and responsiblity they have to educate students on Cyber Safety. Includes link to lessons.
Cyberterrorism is the use of Internet based attacks in terrorist activities, including acts of deliberate, large-scale disruption of computer networks, especially of personal computers attached to the Internet, by the means of tools such as computer viruses.
Cyberterrorism is a controversial term. Some authors choose a very narrow definition, relating to deployments, by known terrorist organizations, of disruption attacks against information systems for the primary purpose of creating alarm and panic. By this narrow definition, it is difficult to identify any instances of cyberterrorism.
Cyberterrorism can be also defined as the intentional use of computer, networks, and public internet to cause destruction and harm for personal objectives.[1] Objectives may be political or ideological since this is a form of terrorism[citation needed].
There is much concern from government and media sources about potential damages that could be caused by cyberterrorism, and this has prompted official responses from government agencies.
Hacking Vs Cracking in Computer NetworksSrikanth VNV
Hacking and Cracking are two entirely different concepts whose differences are discussed in this presentation. While both are meant for same kind of work, but the purpose defines the differences
A short informational presentation for educators on the role and responsiblity they have to educate students on Cyber Safety. Includes link to lessons.
Cyberterrorism is the use of Internet based attacks in terrorist activities, including acts of deliberate, large-scale disruption of computer networks, especially of personal computers attached to the Internet, by the means of tools such as computer viruses.
Cyberterrorism is a controversial term. Some authors choose a very narrow definition, relating to deployments, by known terrorist organizations, of disruption attacks against information systems for the primary purpose of creating alarm and panic. By this narrow definition, it is difficult to identify any instances of cyberterrorism.
Cyberterrorism can be also defined as the intentional use of computer, networks, and public internet to cause destruction and harm for personal objectives.[1] Objectives may be political or ideological since this is a form of terrorism[citation needed].
There is much concern from government and media sources about potential damages that could be caused by cyberterrorism, and this has prompted official responses from government agencies.
Hacking Vs Cracking in Computer NetworksSrikanth VNV
Hacking and Cracking are two entirely different concepts whose differences are discussed in this presentation. While both are meant for same kind of work, but the purpose defines the differences
What is Cyber Law? Why is cyber security law needed? International cyber law. What is copyright? What are security, controls, privacy, piracy and ethics? Code of ethics for computer professionals. What is cyber insurance?
7 Cyber Crimes on Social Media Against Women [India]Sorav Jain
Its time people are aware of the rising Social Media crimes. While we look at the positives, we should also be looking at the negatives of this industry. This article will throw some insights on what are some of the most commonly faced threats by women in India. Cyber safety has become extremely important and this is just a lesson.
Cyber Security Awareness introduction. Why is Cyber Security important? What do I have to do to protect me from Cyber attacks? How to create a IT Security Awareness Plan ?
this ppt contents Introduction
Categories of Cyber Crime
Principles of Computer Security
Types of Cyber Crime
Types of Cyber Attack by Percentage
Cyber Threat Evolution
Advantages of Cyber Security
Safety Tips to Cyber Crime
What is Cyber Law? Why is cyber security law needed? International cyber law. What is copyright? What are security, controls, privacy, piracy and ethics? Code of ethics for computer professionals. What is cyber insurance?
7 Cyber Crimes on Social Media Against Women [India]Sorav Jain
Its time people are aware of the rising Social Media crimes. While we look at the positives, we should also be looking at the negatives of this industry. This article will throw some insights on what are some of the most commonly faced threats by women in India. Cyber safety has become extremely important and this is just a lesson.
Cyber Security Awareness introduction. Why is Cyber Security important? What do I have to do to protect me from Cyber attacks? How to create a IT Security Awareness Plan ?
this ppt contents Introduction
Categories of Cyber Crime
Principles of Computer Security
Types of Cyber Crime
Types of Cyber Attack by Percentage
Cyber Threat Evolution
Advantages of Cyber Security
Safety Tips to Cyber Crime
Cyber Crime has become most concerned topic in India. What are the rules & regulations of cyber world are highlighted along with precautions to taken while using social media and online activities
There are several different social media platforms where crime is initiated, but Facebook and Twitter are the most common. Criminals use social networking sites to gather information and target victims, but their specific methods differ based on the nature of the crime at hand.
Cyber crime, burglary, and sex crimes are the three categories of criminal offenses which are most often initiated by social media sites, and the sooner people realize this, the sooner they’ll be able to protect themselves online. So, how exactly are criminals using social media? Find out in our latest presentation on Social Media & Crime!
Cyber crime in a Smart Phone & Social Media Obsessed WorldJohn Palfreyman
With so much hype, and shrouded in technical gobbledygook it's hard to get a real handle on Cyber Crime, and how we can best prevent and / or investigate it. This presentation explores Cyber Crime, and it's relationship with Cyber Security. It then considers the vulnerabilities introduced by the pervasive use of smart phones and social media technologies, and how a "smarter" approach can be adopted to make systems secure.
When you're using Instant Checkmate to run background checks on individuals, you may come across some specific terms in your reports that you might not be familiar with. To help you better understand exactly what you're seeing in your reports, we've compiled a list of the most frequently used and related terms in the personal criminal background check industry.
www.instantcheckmate.com/glossary
Dangers of Social Media that was presented by Alex Berta at Level 10 Technology. If you found this slideshow useful please feel free to either reach out to me or send me a message.
Perimeter E-Security: Will Facebook Get You Hired or Fired?Taylor Van Sickle
What is the impact of social media on your organization? Perimeter E-Security shares the impact that social media can have in the workplace. Learn more on http://www.perimeterusa.com
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfvichu19891
Cyber Crime:
As Internet usage is growing daily the world is coming closer. The World Wide Web sounds like
a vast phenomenon but surprisingly one of its qualities is bringing the world closer making it a
smaller place to live in for its users. However, it has also managed to create another problem for
people who spend long hours browsing the Cyber World – which is cyber crimes. While law
enforcement agencies are trying to tackle this problem, it is growing steadily and many people
have become victims of hacking, theft, identity theft and malicious software. One of the best
ways to avoid being a victim of cyber crimes and protecting your sensitive information is by
making use of impenetrable security that uses a unified system of software and hardware to
authenticate any information that is sent or accessed over the Internet. However, before you can
understand more about this system, let us find out more about cyber crimes.
Types of Cyber Crimes:
When any crime is committed over the Internet it is referred to as a cyber crime. There are many
types of cyber crimes and the most common ones are explained below:
1.Hacking: This is a type of crime wherein a person’s computer is broken into so that his
personal or sensitive information can be accessed. In the United States, hacking is classified as a
felony and punishable as such. This is different from ethical hacking, which many organizations
use to check their Internet security protection. In hacking, the criminal uses a variety of software
to enter a person’s computer and the person may not be aware that his computer is being
accessed from a remote location.
2.Theft: This crime occurs when a person violates copyrights and downloads music, movies,
games and software. There are even peer sharing websites which encourage software piracy and
many of these websites are now being targeted by the FBI. Today, the justice system is
addressing this cyber crime and there are laws that prevent people from illegal downloading.
3.Cyber Stalking: This is a kind of online harassment wherein the victim is subjected to a barrage
of online messages and emails. Typically, these stalkers know their victims and instead of
resorting to offline stalking, they use the Internet to stalk. However, if they notice that cyber
stalking is not having the desired effect, they begin offline stalking along with cyber stalking to
make the victims’ lives more miserable.
4.Identity Theft: This has become a major problem with people using the Internet for cash
transactions and banking services. In this cyber crime, a criminal accesses data about a person’s
bank account, credit cards, Social Security, debit card and other sensitive information to siphon
money or to buy things online in the victim’s name. It can result in major financial losses for the
victim and even spoil the victim’s credit history.
5.Malicious Software: These are Internet-based software or programs that are used to disrupt a
network. The software is used to gain ac.
Cybercrime is a Phenomenon that Threatens Community PeaceMubarak Al Hadadi
The trend towards the use of electronic information networks has increased in recent times as an international communication tool in different walks of life, thus saving a lot of speed, distances and effort on the person. However the increased use of technological systems has led to many problems and risks, and has introduced types of crimes that were not previously known, called cyber crimes.
What is Social Media?Positive Effects/Advantages of Social Media,Negative effects/Disadvantages of Social Media,True research facts,Threats from Social Media,Prevention,Conclusion and Implication
For more information , visit : http://www.computercareer.in/projects-by-cc/
Cyber-Stalking Threat to People or Bane to Technologyijtsrd
A day without the use of technology in our lives seems like an impossible mission. We have become entirely dependent on it in divergent ways. Technology has helped us in creating great ideas that we can communicate with people present anywhere on this earth. Apart from the fact that technology has made our lives easy, it also bought in a lot of difficulties. With the massive advancement of technology along with the evolution of time, the crime rate of cyber offences keeps increasing every day. One such cyber assault that requires immediate attention is cyber stalking. Cyber stalking involves continuous or persistent following of a person through electronic media with or without the persons consent. Cyber stalking, unlike the offline stalking, is severe as the identity of the perpetrator is unknown and geographical proximity is no barrier. The severity of cyber talking has increased in the recent times as the current generation is found all the time surfing on their phones or laptops and being busy with social networking media like Facebook, Instagram, Whatsapp and many more. The reason why one may become a cyber-stalker can be because of revenge, obsession, sadism, denial, insult and many more. The post effects of cyber stalking to a victim can be psychologically overwhelming that there are cases where the victims have committed suicide being incapable of coping with the psychological and emotional stress. Cyber stalking can be used to blackmail victims as well. It can also include morphing of the victims image with nude pictures and posting it on public and social websites thus destroying the reputation and dignity of the victim. One of the highly disadvantageous facts in cyber offences is that once such obscene picture of the victim is posted, the post gets shared to more and more people. Therefore even if the perpetrator is found and the origin where the obscene pictures were posted is deleted, it is difficult to find all places where the post has been shared. Thus its high time that more emphasis is laid on introducing effective and efficient laws in field of newly formed cyber offences such as cyber stalking. H. M. Shambhavee "Cyber-Stalking: Threat to People or Bane to Technology" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-2 , February 2019, URL: https://www.ijtsrd.com/papers/ijtsrd21354.pdf
Paper URL: https://www.ijtsrd.com/management/law-and-management/21354/cyber-stalking-threat-to-people-or-bane-to-technology/h-m-shambhavee
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Epistemic Interaction - tuning interfaces to provide information for AI support
Facebook
1. UK6153 Cyber Law
Cyber Crime in the Social Network
Name
Matrick No.
Date
Lecturers
:
:
:
:
Punithemalar Hariaratnam
GP01285
27 July 2013 (Saturday)
Dr Rizal Rahman
2. Just what do we mean when we say,
Social Network?
3. A social network service focuses on building and reflecting of
social networks or social relations among people, e.g., who
share interests and/or activities
The process of building online communities, often
accomplished both through 'groups' and 'friends lists' that
allow greater interaction on websites.
Interactive communication in which participants in online
communities such as Facebook share thoughts, photos, etc.
with members of their own personal networks in a
controlled way
6. A focus on building social
relationships among people.
Building online communities.
Interactive communication
among participants.
7. • Facebook claims that 50% of active users log into the site each day.
This would mean at least 175 million users every 24 hours
• Twitter now has 75 million user accounts (15 million active)
• LinkedIn has over 50 million members worldwide.
• Facebook currently has in excess of 350 million active users on
global basis. Six months ago, this was 250 million. This is over a
40% growth in less than 6 months.
• More than 35 million Facebook users update their status each day.
• Photo uploads to Facebook have increased by more than 100%.
(2.5 billion)
• More than 250 Facebook applications have over a Million
combined user seach month
8. Cyber Crime
• Crime committed using a computer and the internet
to steal a person’s identity or illegal imports or
malicious programs
• Computer used as object or subject of a crime
• Online activities are Vulnerable to crime and can
compromise personal safety just as common
everyday unless law makers, law enforcement and
individuals need to know how to protect themselves
and the persons for which they are responsible
9. The first recorded cyber crime took place in the
year 1820! That is not surprising considering
the fact that the abacus, which is thought to be
the earliest form of a computer, has been
around since 3500 B.C. in India, Japan and
China. The era of modern computers, however,
began with the analytical engine of Charles
Babbage.
The first spam email took place in 1978 where
it was sent over Arpanet (Advance research
projects agency network)
10. • With the rising popularity of the social
networking websites today, you'll find many
Cyber crimes where adults impersonate
children, becoming friendly, and then coaxing
children to meet face-to-face. This is aserious
problem today with youth as young as
• 13 years having sanctioned access to these
social media and networking sites.
11. Types of cyber crime
• Hacking
– Unauthorised access to computer
• Child pornography
– Paedophilia who are sexually attracted to children and use false identity
• Denial of service attack
– Flooring bandwidth of victim with spam mails
• Virus dissemination
– Malicious software ie; trojan horse etc
• Computer vandalism
– Damaging or destroying data
• Cyber Terrorism
– Hate email
• Software piracy
– Theft of software through illegal copying
• Credit Card Fraud
– Hack and misuse your card
12. •
•
•
•
•
•
•
•
Net extortion
– Copying confidential data and extort for huge amounts
Phishing
– Pulling our confidential info from banks or financial institutions
Spoofing
– Pretend to be in identity of another computer
Cyber Stalking
– Following victim by sending email, entering chatroom etc
Salami Sttack
– Insignificant changes, deducting small amount from individuals account
– Confidential info from banks or financial institutions
Spoofing
– Pretend to be in identity of another computer
Cyber Stalking
– Following victim by sending email, entering chatroom etc
Salami Sttack
– Insignificant changes, deducting small amount from individuals account
13.
14. ‘79 per cent of social media users
victims of cyber crime’
by Lee Ya Yun, April 6, 2013, Saturday
15. Why social media is the target!
• Booming social media popularity
• The obvious social media addiction/lure
• Social media becoming an ideal place for
crime
• The vast transition from emails to social
media Rising usage of social media over
smartphones -
16. Cybercriminals use social media not only to commit crime
online, but also for carrying out real world crime owing to
“over-sharing” across these social platforms.
• A survey of 2,000 home-owners stated that 35% users post
their vacation plans on social networking sites. Availability of
such authentic information helps the criminals achieve their
motives easily. Adding to these reasons, the money
associated with the malware market is also a motivation for
criminals to attack using social media.
• Although social media talks more about individual users, the
cyber criminals not only attack the user as an individual, but
they also use it as a channel to victimise businesses.
17. MURDERED BY A MAN SHE MET ONLINE
.
Ashleigh Hall was groomed by Peter Chapman
via Facebook after her claimed to be a teenager
18. A study by Cyberoam reveals that disclosures over social media highly affect
business. Here is the summary of disclosures in brief:
19. According to Sophos Security
Threat Report 2013, Malaysia is
the sixth most vulnerable to
cyber crime.
Listed among the 10 riskiest countries, Malaysia is
also reported to be highly exposed to Android PC and
devices malware attacks. Remember that in the event
of a cyber crime, victims can lodge a report with
CyberSecurity Malaysia.
20. Just like any other medium, social media can also become a
source of data leakage, intrusions, entry for malicious content,
loss of productivity and so on. A good balance between security
and social networking can help. How? Here are a few pointers
that will help:
• Establish an organizational policy for social networking and
regularly train them on the safety measures
• Monitor access of social networks in your organization
• Use strong passwords for your corporate profile on social
networking sites
21. • Upgrade IT Network Security with a solution that offers
multiple security features and scans HTTPS sites (most
social networking sites today are on HTTPS).
• When signing up for social media sites, ask employees to
avoid using official email address
• Caution employees on clicking the links wisely or when
installing plugins/pop-ups
• Ask them to keep a track on the personal information
they post
22. • Request them to avoid allowing social networking services to
scan their email address book
• Limit the number of persons authorized to blog or tweet on
behalf of the company
• Choose an official spokesperson for Twitter/Facebook
• Ensure that the authorized person knows what can be
communicated, and when?
• Keep a record of all public/employee disclosures
23. Scams
Criminals have been utilizing the scam for centuries. In the
Facebook world, scams are particularly effective at drawing
people in by simply enticing an individual to click on a link that
would interest almost anyone, such as an innocent-looking
notification that you’ve won a free prize like a gift card. Then, in
order to claim the prize, scammers require you to submit some
information, such as a credit card number or Social Security
number. This description may make it seem like scams are easy
to spot, but even the most savvy social media user has to be on
the lookout for illegitimate requests for information.
24. Robbery
It doesn’t take much for a thief to find out where
you live, go to school, work, or hang out if you make
that information readily available on Facebook. If
you use Facebook’s check-in or Google Maps
feature, then you could be in a heap of trouble if a
robber is paying attention. This person isn’t always a
complete stranger either; they may be an old
acquaintance or someone else you’d never expect to
come rob you.
25. Identity theft
With the large amount of personal information
swarming around Facebook these days, it has
become fairly easy for criminals to steal users’
identities. Hackers often break into users’ e-mails
and make fake Facebook accounts. From there they
can access personal and bank information and
cause havoc to your sense of security. Protect
yourself from identity theft on Facebook by keeping
your profile very secure and free of personal
information that a criminal would love to have.
26. Defamation
An individual commits the crime of defamation when
they communicate a false statement to a third party
that paints another individual or entity in a negative
light. Facebook makes communicating defamatory
statements frighteningly easy, and the exposure
Facebook provides makes it more likely that businesses
or individuals will be harmed by the defamatory
statement, and thus more likely to pursue legal
remedies. Be careful what you say on Facebook; you
may be committing a crime without even knowing it.
27. Harassment
Harassment happens all the time on Facebook. From
sexual harassment to assault threats, there has been
a significant increase in the number of harassment
cases happening on Facebook. It’s not uncommon for
sex offenders and sexual predators to prey on
unsuspecting victims on Facebook and even pose as a
teen or college student. Harassing messages,
inappropriate comments, and other persistent
behaviors should be reported to Facebook and your
local police station.
28. Cyberbullying
Cyberbullying is a common occurrence among
teenagers on Facebook and one that can result in
serious criminal charges if it goes far enough.
Cyberbullying on Facebook has contributed to the
deaths of several teens who either committed
suicide or were killed by a peer. Cyberbullying that
involves hacking or password and identity theft may
be punishable under state and federal law. When
adults engage in this kind of online behavior it is
called cyber-harassment or cyberstalking.
29. Stalking
The term “stalking” is thrown around a lot on
Facebook, and it is often meant as a joke for regularly
looking at someone’s profile. However, the actual act
of cyberstalking is a common crime on the social
networking site and can result in a serious offense.
Cyberstalking typically involves harassing a person
with messages, written threats, and other persistent
online behavior that endangers a person’s safety.
Although cyberstalking may seem like nothing more
than annoying behavior, it is a legitimate cause for
concern in many cases and can even lead to in-person
stalking or endangerment if not treated seriously.
30. A good balance between
security and productivity is the
need of the hour for
organisations facing similar
challenges due to their
presence over social media.