This is a presentation Bill gave at the May 2009 NAISG meeting on the security dangers of such social networking entities as Facebook, LinkedIn and Twitter.
This document discusses security and privacy issues on social networking sites. It identifies different types of social networks and factors that influence users' selection of social networks like ease of use, friends using the network, and privacy and security. The document outlines threats to social networks like identity theft through profile cloning, spam attacks, malware spreading, and privacy and security issues related to shared user profile data, activity data, and third party application access. It provides statistics on common security threats to social networks and references publications on related research.
The issues of security and privacy in social network Noori Sadeq
The document discusses security and privacy issues for users of social networks. When users connect their social media accounts to third-party applications, it can compromise their personal information if not done securely. The purpose is to examine how social network usage and integration with third parties can impact user security and privacy. Users need to be aware of privacy settings and how sharing information openly online exposes them to risks like hacking or loss of control of their accounts and data.
The document discusses various security threats that exist on social networks, including phishing attacks, vulnerabilities in third-party applications, weak password security, cross-site scripting attacks, clickjacking, insecure frameworks, SQL injections, and DDOS attacks. It provides examples of each type of attack, such as phishing links that install malware, apps that access too much user data if hacked, passwords being easily guessed, malicious JavaScript that can be installed through photo tags, and privacy settings being exploited to view other profiles. The document emphasizes that with over a billion users exchanging personal information, social networks face many potential threats but that Facebook focuses heavily on security to prevent hacks of its own system.
This document discusses privacy issues with social networking. It begins by noting people's growing concerns about privacy online. It then outlines different types of social networks like social media sites for photos, videos, and audio; and location-based networks. The main privacy concerns addressed are identity theft from shared personal information, location tracking by services, and other issues like risks to children. The document concludes by providing some general tips for using social networks privately like using strong passwords and privacy settings.
Online Social Networks: 5 threats and 5 ways to use them safelyTom Eston
This document discusses online social networks and some of the threats associated with using them. It defines online social networks as online communities where users can share interests and interact through chat, messaging, and other features. The most popular networks are used most by Generation Y and teens. Some key threats include cyberbullying, stalking, sexual predators, vulnerabilities in applications that can compromise privacy settings, spear phishing spam, and the aggregation of personal data by networks. It provides five ways to safely use social networks such as setting private defaults, being wary of applications, limiting personal information shared, only accepting friend requests from known people, and only posting information one is comfortable with others seeing.
There is no argument about the popularity of the social platforms such as Facebook, YouTube, twitter, etc. These platforms can be used to stay in touch with your friends, increase sales revenues for organizations and as a collaboration tool to stay connected with the public. However, each of these benefits comes at a cost, putting your private information at a risk/ exposed. We aim to discuss the common security risks associated with usage of these platforms including risk mitigation strategies.
Intro Video : https://www.youtube.com/watch?v=zxpa4dNVd3c
Presentation for Computer Society of Sri Lanka on 24 Feb 2015
This presentation provides an inside view of how the Social media presence could harm any individual if no proper vigilance is kept while being active on various social platforms.
This document discusses security and privacy issues on social networking sites. It identifies different types of social networks and factors that influence users' selection of social networks like ease of use, friends using the network, and privacy and security. The document outlines threats to social networks like identity theft through profile cloning, spam attacks, malware spreading, and privacy and security issues related to shared user profile data, activity data, and third party application access. It provides statistics on common security threats to social networks and references publications on related research.
The issues of security and privacy in social network Noori Sadeq
The document discusses security and privacy issues for users of social networks. When users connect their social media accounts to third-party applications, it can compromise their personal information if not done securely. The purpose is to examine how social network usage and integration with third parties can impact user security and privacy. Users need to be aware of privacy settings and how sharing information openly online exposes them to risks like hacking or loss of control of their accounts and data.
The document discusses various security threats that exist on social networks, including phishing attacks, vulnerabilities in third-party applications, weak password security, cross-site scripting attacks, clickjacking, insecure frameworks, SQL injections, and DDOS attacks. It provides examples of each type of attack, such as phishing links that install malware, apps that access too much user data if hacked, passwords being easily guessed, malicious JavaScript that can be installed through photo tags, and privacy settings being exploited to view other profiles. The document emphasizes that with over a billion users exchanging personal information, social networks face many potential threats but that Facebook focuses heavily on security to prevent hacks of its own system.
This document discusses privacy issues with social networking. It begins by noting people's growing concerns about privacy online. It then outlines different types of social networks like social media sites for photos, videos, and audio; and location-based networks. The main privacy concerns addressed are identity theft from shared personal information, location tracking by services, and other issues like risks to children. The document concludes by providing some general tips for using social networks privately like using strong passwords and privacy settings.
Online Social Networks: 5 threats and 5 ways to use them safelyTom Eston
This document discusses online social networks and some of the threats associated with using them. It defines online social networks as online communities where users can share interests and interact through chat, messaging, and other features. The most popular networks are used most by Generation Y and teens. Some key threats include cyberbullying, stalking, sexual predators, vulnerabilities in applications that can compromise privacy settings, spear phishing spam, and the aggregation of personal data by networks. It provides five ways to safely use social networks such as setting private defaults, being wary of applications, limiting personal information shared, only accepting friend requests from known people, and only posting information one is comfortable with others seeing.
There is no argument about the popularity of the social platforms such as Facebook, YouTube, twitter, etc. These platforms can be used to stay in touch with your friends, increase sales revenues for organizations and as a collaboration tool to stay connected with the public. However, each of these benefits comes at a cost, putting your private information at a risk/ exposed. We aim to discuss the common security risks associated with usage of these platforms including risk mitigation strategies.
Intro Video : https://www.youtube.com/watch?v=zxpa4dNVd3c
Presentation for Computer Society of Sri Lanka on 24 Feb 2015
This presentation provides an inside view of how the Social media presence could harm any individual if no proper vigilance is kept while being active on various social platforms.
The document discusses security issues with social networking sites. It notes that while social networks provide advantages, they can also pose security threats if not used carefully. Personal and business information, as well as computers, can be at risk if malicious links or files are spread through social contacts. Attackers can also mine sites for valuable personal data like email addresses, physical addresses, birthdates, and profiles to use for spam, fraud, and other crimes. The privacy and security of social networks can also be compromised by programming flaws that hackers exploit. Users must be aware of potential risks and take steps like limiting shared information, vetting contacts, and avoiding suspicious content.
How to Like Social Media Network SecurityBrian Honan
This is my presentation from Source Dublin 2014 on cyber crime and social media.
Social media networks provide individuals and businesses with exciting opportunities to communicate and collaborate with others throughout the world. But with these opportunities come a number of security challenges and risks. This talk will outline how social media networks can pose various threats to businesses, from information leakage, reputational damage, to social engineering profiling, and vectors for enabling compromise of corporate systems. Social media networks also enable the rapid dissemination of news which in the event of an information security breach could either save or destroy an organisations reputation. Understanding and dealing with these challenges will enable companies to like and favourite social media networks in a secure way.
Social media and security essentials.pptxPink Elephant
Social media use has grown tremendously, with over 500 million Facebook users and 105 million Twitter users. However, this growth has also increased security risks. Research from Websense found a 111% increase in malicious websites from 2009 to 2010, with nearly 80% of compromised legitimate sites. Additionally, 40% of Facebook status updates contain links, with 10% of those links being spam or malicious. The Cisco annual security report also warns that social media is blurring network security boundaries and that criminals are effectively using social networks to scam users.
Basic tips for staying safe and protecting personal privacy on popular social media sites, including Facebook, Twitter, and Instagram. Designed for casual users of social media.
Social Media Basics: Security Loopholes with Twitter & Other Social MediaTyler Shields
The document appears to be a syllabus for a course on social media security basics. It includes sections on definition of terms, risks, common attacks, and what can be done to protect yourself. Some common social media attacks mentioned are malware distribution, command and control of malware, compromise of sensitive data, social media worms like KoobFace that spread through messages/posts, targeted attacks, password/account hacking, and spam. The syllabus suggests users should avoid random links, use strong unique passwords, and not trust unsolicited messages. Vendors and enterprises are encouraged to implement better security practices while more research should be done on social media threats.
Social networking allows users to interact and connect with other users through dedicated websites and applications. It involves expanding business and social contacts by connecting with people who share similar interests. Popular social networking sites emerged in the 1990s like MySpace and Facebook. While social networking allows users to stay connected with friends and meet new people, it also presents privacy, security, and oversharing risks that users must be aware of. Analyzing social networks can occur at the micro, meso, and macro levels.
Privacy and Security in Online Social Media : Privacy and Social MediaIIIT Hyderabad
This document discusses privacy and security issues related to using online social media. It covers topics like how privacy is defined, Westin's three categories of privacy attitudes, and different types of privacy issues that can occur on Facebook. Specific examples mentioned include getting personalized ads based on online activity and demographic information being collected from social media users. The document appears to be from a tutorial or presentation on privacy concerns in social media.
The document discusses privacy issues related to social networks like Facebook. It raises questions about who has control over personal data that is tagged or shared through applications on social networks and what constitutes a reasonable expectation of privacy. It suggests that social networks should implement more privacy-friendly default settings that restrict sharing of personal information to selected contacts by default rather than exposing it publicly.
Presentation on Cyber Safety presented at the ETC! 2009 conference in Modesto, CA to K-12 school district adminstrators and teachers. This slide show is my portion, discussing the definition of cybersafety.
This document discusses internet safety practices for elementary school students. It provides resources for teaching students about internet dangers, including quizzes, videos, and games. It recommends that parents monitor what information teens post online, discuss internet safety with children, and use filtering software to block inappropriate content. The document advises reporting any unsafe situations to the National Center for Missing and Exploited Children via their 24-hour hotline or online CyberTipLine.
When web 2.0 sneezes, everyone gets sickStefan Tanase
Web 2.0 applications have become increasingly popular among Internet users in the past few years. This trend is very unlikely to come to an end soon. More and more 'classic' websites are shifting towards web 2.0 concepts, start-ups are all about web 2.0 and new users are adopting the web 2.0 lifestyle every day.
This paper aims to address the following questions:
What exactly is web 2.0?
What are the concepts and technologies that make web 2.0 what it is?
Why does web 2.0 attract malware authors?
How did malware spread over the Internet before web 2.0?
What are the new attack vectors created by web 2.0 technologies?
What social engineering tactics emerge over the web 2.0 concepts?
How dangerous is the combination of human & technological vulnerabilities?
Are web 2.0 attacks more efficient?
How difficult is it to protect ourselves?
How are web 2.0 threats going to evolve?
Web 2.0 applications are not only being used at home, but also in the corporate environment. The new attack vectors are raising the stakes, both for malware authors and security professionals. The user is somewhere in between the two sides, unwittingly helping the attackers while also suffering from the attacks.
The U.S. Department of State's Bureau of Educational and Cultural Affairs provides safety tips for using social networks, email, and the internet. The tips include never sharing private contact information publicly, carefully managing privacy settings, considering how content may be perceived before posting, being wary of third party applications accessing profile information, reporting any site abuses, and exercising caution with unsolicited emails or requests for private information. Basic computer security practices like scanning removable media and attachments are also recommended.
This document discusses security and privacy issues related to Facebook, including cyber identity theft, cybersquatting, and spamming. The author proposes to develop a third-party application called "Footlight" to help Facebook users secure their privacy and security from identity theft. A literature review is presented on previous research related to security and privacy problems on social media sites like Facebook. The author aims to determine how to protect social networks from spamming and identity theft, evaluate the level of privacy sensitivity and spam rate, and detect identity theft on Facebook. The proposed research method involves a quantitative survey of 250 respondents to analyze security and privacy preferences and issues on Facebook.
This document discusses how software insecurity can be distributed through social networking. It begins with background on software insecurity, which has historically spread through means like floppy disks and early internet sharing. The core topic examines how viruses can propagate through social networking sites as users communicate and share files through features like email, instant messaging, and photo sharing. It also explores how applications and tools used for social networking could host infected content or macros. The document concludes that social networking has become a major means of communication but also enables various ways for software insecurity to spread between users.
Cyber Security aware society is the need of the hour, there is a growing need for Cyber Security awareness, every user of internet should know at least the basics of cyber security, an educated and aware user can help in minimizing the impact and rate of cyber crimes, particularly of those that are related with online transactions and phishing…
Social media can be misused in several ways, including loss of privacy, sexual predators, cyberbullying, excessive time consumption, and loss of social skills. When personal information and photos are shared online without privacy settings, it becomes available to anyone and could be viewed or misused by sexual predators. Social media also enables cyberbullying through mean comments and messages. While social media is intended for social interaction, some users spend too much time on sites instead of more productive activities. Additionally, relying solely on online conversations rather than in-person social skills can negatively impact users. However, social media may not be inherently harmful when used appropriately and for the right purposes.
When it comes to social media, most of us expect that we are in control of what we share about ourselves, and who we share with. In this hands-on workshop, we will dispel common myths and misconception about social media privacy as well as discuss step-by-step instructions for securing out social media selves.
Social Networking Sites have become the means of the communication and have
experienced growth in the recent years. As these sites offer services for free of costs are
attracting the people all around the world. Some technologies are emerging in the field of
Internet but still the users are facing the security leakages by unauthorized users. Many of
the Social Sites are managed by the Third Party Domains which keep track of all the user
information along with the access details. Most Online Social Networking (OSN) Sites
provide an “accept all or nothing” mechanism for managing permission from Third Party
Access (TPA) to access user’s private data [3]. The Social Media sites do not provide any
mechanism for privacy on the shared data among the multiple users. Many users share their
personal information without knowing about the cyber thefts and risks associated with it.
From the survey it has been found that the teenagers are least concerned about the
navigating privacy. Privacy associated with the Social media is the very crucial thing.
Different methods are discussed regarding sharing of the personal information and leakage
of this information through different mediums. Different models are also proposed in this
paper regarding the privacy control of third party access of the personal information. An
approach is proposed which allows users to share their access control configuration for TPA
s with their friends who can reuse and rate such configurations [3]
Prezentacja pokazująca szersze spektrum mediów społecznościowych nie ograniczając się tylko do Facebooka. Porusza ona także kwestię rozwoju social media w najbliższym czasie. Prezentacja została zaprezentowana podczas czerwcowego Netcampa.
The document discusses security issues with social networking sites. It notes that while social networks provide advantages, they can also pose security threats if not used carefully. Personal and business information, as well as computers, can be at risk if malicious links or files are spread through social contacts. Attackers can also mine sites for valuable personal data like email addresses, physical addresses, birthdates, and profiles to use for spam, fraud, and other crimes. The privacy and security of social networks can also be compromised by programming flaws that hackers exploit. Users must be aware of potential risks and take steps like limiting shared information, vetting contacts, and avoiding suspicious content.
How to Like Social Media Network SecurityBrian Honan
This is my presentation from Source Dublin 2014 on cyber crime and social media.
Social media networks provide individuals and businesses with exciting opportunities to communicate and collaborate with others throughout the world. But with these opportunities come a number of security challenges and risks. This talk will outline how social media networks can pose various threats to businesses, from information leakage, reputational damage, to social engineering profiling, and vectors for enabling compromise of corporate systems. Social media networks also enable the rapid dissemination of news which in the event of an information security breach could either save or destroy an organisations reputation. Understanding and dealing with these challenges will enable companies to like and favourite social media networks in a secure way.
Social media and security essentials.pptxPink Elephant
Social media use has grown tremendously, with over 500 million Facebook users and 105 million Twitter users. However, this growth has also increased security risks. Research from Websense found a 111% increase in malicious websites from 2009 to 2010, with nearly 80% of compromised legitimate sites. Additionally, 40% of Facebook status updates contain links, with 10% of those links being spam or malicious. The Cisco annual security report also warns that social media is blurring network security boundaries and that criminals are effectively using social networks to scam users.
Basic tips for staying safe and protecting personal privacy on popular social media sites, including Facebook, Twitter, and Instagram. Designed for casual users of social media.
Social Media Basics: Security Loopholes with Twitter & Other Social MediaTyler Shields
The document appears to be a syllabus for a course on social media security basics. It includes sections on definition of terms, risks, common attacks, and what can be done to protect yourself. Some common social media attacks mentioned are malware distribution, command and control of malware, compromise of sensitive data, social media worms like KoobFace that spread through messages/posts, targeted attacks, password/account hacking, and spam. The syllabus suggests users should avoid random links, use strong unique passwords, and not trust unsolicited messages. Vendors and enterprises are encouraged to implement better security practices while more research should be done on social media threats.
Social networking allows users to interact and connect with other users through dedicated websites and applications. It involves expanding business and social contacts by connecting with people who share similar interests. Popular social networking sites emerged in the 1990s like MySpace and Facebook. While social networking allows users to stay connected with friends and meet new people, it also presents privacy, security, and oversharing risks that users must be aware of. Analyzing social networks can occur at the micro, meso, and macro levels.
Privacy and Security in Online Social Media : Privacy and Social MediaIIIT Hyderabad
This document discusses privacy and security issues related to using online social media. It covers topics like how privacy is defined, Westin's three categories of privacy attitudes, and different types of privacy issues that can occur on Facebook. Specific examples mentioned include getting personalized ads based on online activity and demographic information being collected from social media users. The document appears to be from a tutorial or presentation on privacy concerns in social media.
The document discusses privacy issues related to social networks like Facebook. It raises questions about who has control over personal data that is tagged or shared through applications on social networks and what constitutes a reasonable expectation of privacy. It suggests that social networks should implement more privacy-friendly default settings that restrict sharing of personal information to selected contacts by default rather than exposing it publicly.
Presentation on Cyber Safety presented at the ETC! 2009 conference in Modesto, CA to K-12 school district adminstrators and teachers. This slide show is my portion, discussing the definition of cybersafety.
This document discusses internet safety practices for elementary school students. It provides resources for teaching students about internet dangers, including quizzes, videos, and games. It recommends that parents monitor what information teens post online, discuss internet safety with children, and use filtering software to block inappropriate content. The document advises reporting any unsafe situations to the National Center for Missing and Exploited Children via their 24-hour hotline or online CyberTipLine.
When web 2.0 sneezes, everyone gets sickStefan Tanase
Web 2.0 applications have become increasingly popular among Internet users in the past few years. This trend is very unlikely to come to an end soon. More and more 'classic' websites are shifting towards web 2.0 concepts, start-ups are all about web 2.0 and new users are adopting the web 2.0 lifestyle every day.
This paper aims to address the following questions:
What exactly is web 2.0?
What are the concepts and technologies that make web 2.0 what it is?
Why does web 2.0 attract malware authors?
How did malware spread over the Internet before web 2.0?
What are the new attack vectors created by web 2.0 technologies?
What social engineering tactics emerge over the web 2.0 concepts?
How dangerous is the combination of human & technological vulnerabilities?
Are web 2.0 attacks more efficient?
How difficult is it to protect ourselves?
How are web 2.0 threats going to evolve?
Web 2.0 applications are not only being used at home, but also in the corporate environment. The new attack vectors are raising the stakes, both for malware authors and security professionals. The user is somewhere in between the two sides, unwittingly helping the attackers while also suffering from the attacks.
The U.S. Department of State's Bureau of Educational and Cultural Affairs provides safety tips for using social networks, email, and the internet. The tips include never sharing private contact information publicly, carefully managing privacy settings, considering how content may be perceived before posting, being wary of third party applications accessing profile information, reporting any site abuses, and exercising caution with unsolicited emails or requests for private information. Basic computer security practices like scanning removable media and attachments are also recommended.
This document discusses security and privacy issues related to Facebook, including cyber identity theft, cybersquatting, and spamming. The author proposes to develop a third-party application called "Footlight" to help Facebook users secure their privacy and security from identity theft. A literature review is presented on previous research related to security and privacy problems on social media sites like Facebook. The author aims to determine how to protect social networks from spamming and identity theft, evaluate the level of privacy sensitivity and spam rate, and detect identity theft on Facebook. The proposed research method involves a quantitative survey of 250 respondents to analyze security and privacy preferences and issues on Facebook.
This document discusses how software insecurity can be distributed through social networking. It begins with background on software insecurity, which has historically spread through means like floppy disks and early internet sharing. The core topic examines how viruses can propagate through social networking sites as users communicate and share files through features like email, instant messaging, and photo sharing. It also explores how applications and tools used for social networking could host infected content or macros. The document concludes that social networking has become a major means of communication but also enables various ways for software insecurity to spread between users.
Cyber Security aware society is the need of the hour, there is a growing need for Cyber Security awareness, every user of internet should know at least the basics of cyber security, an educated and aware user can help in minimizing the impact and rate of cyber crimes, particularly of those that are related with online transactions and phishing…
Social media can be misused in several ways, including loss of privacy, sexual predators, cyberbullying, excessive time consumption, and loss of social skills. When personal information and photos are shared online without privacy settings, it becomes available to anyone and could be viewed or misused by sexual predators. Social media also enables cyberbullying through mean comments and messages. While social media is intended for social interaction, some users spend too much time on sites instead of more productive activities. Additionally, relying solely on online conversations rather than in-person social skills can negatively impact users. However, social media may not be inherently harmful when used appropriately and for the right purposes.
When it comes to social media, most of us expect that we are in control of what we share about ourselves, and who we share with. In this hands-on workshop, we will dispel common myths and misconception about social media privacy as well as discuss step-by-step instructions for securing out social media selves.
Social Networking Sites have become the means of the communication and have
experienced growth in the recent years. As these sites offer services for free of costs are
attracting the people all around the world. Some technologies are emerging in the field of
Internet but still the users are facing the security leakages by unauthorized users. Many of
the Social Sites are managed by the Third Party Domains which keep track of all the user
information along with the access details. Most Online Social Networking (OSN) Sites
provide an “accept all or nothing” mechanism for managing permission from Third Party
Access (TPA) to access user’s private data [3]. The Social Media sites do not provide any
mechanism for privacy on the shared data among the multiple users. Many users share their
personal information without knowing about the cyber thefts and risks associated with it.
From the survey it has been found that the teenagers are least concerned about the
navigating privacy. Privacy associated with the Social media is the very crucial thing.
Different methods are discussed regarding sharing of the personal information and leakage
of this information through different mediums. Different models are also proposed in this
paper regarding the privacy control of third party access of the personal information. An
approach is proposed which allows users to share their access control configuration for TPA
s with their friends who can reuse and rate such configurations [3]
Prezentacja pokazująca szersze spektrum mediów społecznościowych nie ograniczając się tylko do Facebooka. Porusza ona także kwestię rozwoju social media w najbliższym czasie. Prezentacja została zaprezentowana podczas czerwcowego Netcampa.
these were some slides i was playing with on the flight out to swfoo considering what i wanted to speak about/what was interesting to me... the story isn't totally pulled together by any means - just some questions -
Dzisiaj każdy z nas jest częścią jakiejś społeczności. Chcemy dzielić się z innymi swoją pasją, ciekawostkami znalezionymi w sieci czy zdjęciami z rodzinnych uroczystości. Z drugiej strony sami lubimy „podglądać” internetowe życie naszych znajomych, komentować je i w nim uczestniczyć. W sieci pozostawiamy mnóstwo informacji o sobie samych, czy więc możemy chronić do nich dostęp po prostu wyłączając komputer?
KGB, Active Measures, Disinformation and SubversionPeter Hammond
Cheka
A term of terror in the Soviet Union, the KGB was the Committee for State Security of the Soviet Union. Initially it was named the Cheka (Emergency Committee) and founded 20 December 1917, by the instruction of Vladimir Lenin. The Cheka was established by Felix Dzerzhinsky. The Cheka was tasked by the Soviet Politburo with arresting, torturing and executing many tens-of-thousands of dissidents, deserters, reactionaries and counter revolutionaries.
NKVD and the GULAG
In 1922 the Cheka was renamed the NKVD (People's Commissariat for Internal Affairs). The NKVD included the regular public police force of the USSR, including traffic police, border guards and archives. The NKVD is most notorious for running the GULAG forced labour camps, conducting mass extra-judicial executions, espionage, political assassinations and enforcing Stalinist policy within communist movements in other countries. GULAG was the acronym for Main Administration of Corrective Labour Camps.
Abstract:
This article examines how online groups are formed and sustained during crisis periods, especially when political polarization in society is at its highest level. We focus on the use of Vkontakte (VK), a popular social networking site in Ukraine, to understand how it was used by Pro- and Anti-Maidan groups during the 2013/2014 crisis in Ukraine. In particular, we ask whether and to what extent the ideology (or other factors) of a particular group shapes its network structure. We find some support that online social networks are likely to represent local and potentially preexisting social networks, likely due to the dominance of reciprocal (and often close) relationships on VK and opportunities for group members to meet face-to-face during offline protests. We also identify a number of group-level indicators, such as degree centralization, modularity index and average engagement level, that could help to classify groups based on their network properties. Community researchers can start applying these group-level indicators to online communities outside VK; they can also learn from this article how to identify networks of spam and marketing accounts.
This document discusses the history and growth of social media and its increasing use by government agencies. It notes that one-third of US internet users now use social media and new tools to access government services and information. For those users, government is becoming more participatory as nearly one-quarter publish commentary online about government issues. The document also outlines how government agencies at different levels have begun using social media platforms like Twitter, Facebook, and YouTube to communicate about issues like the Gulf oil spill, storm reporting, and public health initiatives. It introduces the concept of "Government 2.0" or using new technologies to enable more efficient delivery of e-services and practices like open government.
This study analyzed 425 Facebook pages run by Japanese local governments to examine how they are using social media. The researchers found that the most common policy areas local governments focused on were community development and promotion. Employment, agriculture, and childcare tended to have smaller fan bases, while tourism and public relations had larger fan bases. Most policy areas had low user engagement, but childcare, education, and public relations had more mid-range or higher engagement levels. The number of fans and engagement varied depending on the specific policy area each page focused on.
DISINFORMATION ON SOCIAL MEDIA DURING GEZI PARK PROTESTS�turkeyprotests
This document lists examples of disinformation that spread on social media during the 2013 Gezi Park protests in Turkey. It describes instances where photos from other times and places were intentionally misrepresented as being from the protests. Some examples include using photos from 2012 to falsely claim police were attacking children or using chemicals, and photos from 2011 being used to suggest large protest marches. It also discusses altered photos, hacked social media accounts, and false claims of violence spread on social media during the demonstrations.
Prezentacja z 34. Warsztatów Click Appsw których miałem przyjemność występować i mówić o tym, dlaczego Facebook jest coraz częściej nazywany serwisem mobilnym. Kraków 08.08.2013
There are many Problems what a user face while using facebook. These problems could be related to hacking, unwanted users, spamming etc. These problems can be resolved using "facebook security and privacy settings" which is offered by the facebook itself. In this presentation, you will be having a fair view of how to configure your facebook security and privacy settings and what facebook is Exactly!
For more details, you can visit here: http://bit.ly/2kEkIrU
This document discusses social networking services and focuses on Facebook. It provides details on what a social networking service is, how Facebook was founded in 2004 by Mark Zuckerberg and others, and how it initially launched at Harvard before expanding to other universities. Key statistics are given on Facebook's user base, revenue, expenses, and criticisms around privacy and other issues. Both the positive impacts of staying connected with friends and the potential negative impacts like cyberbullying are acknowledged.
This document provides an overview of security and hacking. It defines security as protection from harm and defines differences between security and protection. It then discusses what hacking and hackers are, provides a brief history of hacking from the 1960s to present day, and describes different types of hackers like white hat and black hat hackers. The document also outlines the hacking process and some common tools used. It lists some famous hackers and recent news stories about hacking.
Advantages and Disadvantages of Facebookchintanchheda
Facebook is the most popular social networking platform that allows users to connect with friends and family from around the world for free. It has advantages like customizable privacy settings, opportunities for promotional activities through pages and groups, and being able to reconnect with old friends. However, it can also be addicting and waste time. There are risks like fake profiles being used to harass others, groups spreading racist content, and stalkers accessing personal information. Some studies also link heavy Facebook use to lower student grades and it potentially posing safety threats if unknown people track a user's activities.
This document provides an overview of social network analysis (SNA) including concepts, methods, and applications. It begins with background on how SNA originated from social science and network analysis/graph theory. Key concepts discussed include representing social networks as graphs, identifying strong and weak ties, central nodes, and network cohesion. Practical applications of SNA are also outlined, such as in business, law enforcement, and social media sites. The document concludes by recommending when and why to use SNA.
This is a Powerpoint presentation on Facebook. The presentation is geared towards teachers and parents of middle school students. This serves as an introduction to Facebook, highlighting the pros and cons.
1) Government-influenced mainstream media in Hungary is often a direct channel for Russian narratives, unlike other Visegrad countries. The state news agency and pro-government TV and newspapers regularly publish Russian and pro-Russian content.
2) Alternative media sites spreading pro-Russian narratives are limited, around 6-10 relatively serious sites. Most are marginal. Only 16% of Hungarians prefer alternative media.
3) The content promotes anti-Western, anti-EU, anti-NATO, anti-Ukraine, and anti-US narratives. There is a lack of Hungary-specific content likely due to a lack of Russian knowledge about Hungary.
4) Hungarian society is only receptive to Russian narratives
Social media privacy threats that you need to keep an eye on in 2021Impulse Digital
Social media users' interests about information protection have seen a sharp ascent throughout the most recent couple of years. Cybercriminals have developed the ability to deceive social based media users into sharing touchy individual data and information.
The document discusses security issues related to social networks. It notes that social networks store large amounts of private user data, making personal information vulnerable to malicious actors like hackers. It emphasizes the importance of using strong, unique passwords for each account and limiting personal details shared publicly. The document also examines privacy controls, identity theft, malware, social engineering and other fraud risks associated with using social media platforms. Protecting privacy and being aware of potential threats are key to staying secure in social networks.
CIS490 Lab 1 Social Engineering AuditSocial engineering attacks.docxmonicafrancis71118
CIS490 Lab 1: Social Engineering Audit
Social engineering attacks are the most prevalent types of attacks against IT systems. This is primarily due to the fact that they directly attack the weakest link in any IT system…the users. While there are many ways to lock down, or secure data residing on a computer or other device, securing data held in the brains of users is difficult to secure for a number of reasons. People have the ability to reason and even redefine rules, while computers do not. If you tell a computer to not allow access to a particular file by a particular user, the computer will do just that. However, a human can be tricked into giving up all sorts of information, often without even knowing that they have done so.
For this lab, you will conduct a social engineering audit on various social media websites. Almost every social engineering attack begins with the collection of data. The aim of collecting this data is to discover ways in which the target of the attack can be tricked into giving up potentially valuable information. This initial data can take many forms: birth dates, addresses, user names, pictures, phone numbers, names of co-workers or relatives, and much more. Often times this seemingly innocent data can be used to either directly impersonate someone the target trusts, or to build a collection of data which can be used to know more about the movements, personality, or general life of the target.
This lab has two parts, as described below:Part 1: Gathering data
To accomplish this part of the lab, you will access some social media sites of your choice. Obviously Facebook is a veritable treasure trove of personal data. However, there are many others like Flickr, Twitter, YouTube, LinkedIn, and Instagram, which you might also consider. Locate data posted by or about users (they could be friends and family, or people you don’t know) which you feel could be exploited in a social engineering attack. This data can consist of many different things, but should pose a potential security risk for the user, or others. For example, my sister-in-law recently posted a baby shower invitation on Facebook to all her friends. Since my sister-in-law is a heavy Facebook user, the invitation was undoubtedly viewed by many people my sister-in-law does not even know. A baby shower invitation might not seem like a big deal, but think about what it contained. My sister-in-law’s home address for sending gifts for non-attenders. A time frame when she will not be home (because she will be away at the shower), and the address of where she will be during that time. Do you see the potential security problem here? This is only one of many examples I see on social media sites all the time.Part 2: The analysis
After you have gathered data from various social media sites which you feel could be used in an attack, you will conduct an analysis of your OWN social media accounts. Look at the types of data you felt were potentially d.
Exploring machine learning techniques for fake profile detection in online so...IJECEIAES
The online social network is the largest network, more than 4 billion users use social media and with its rapid growth, the risk of maintaining the integrity of data has tremendously increased. There are several kinds of security challenges in online social networks (OSNs). Many abominable behaviors try to hack social sites and misuse the data available on these sites. Therefore, protection against such behaviors has become an essential requirement. Though there are many types of security threats in online social networks but, one of the significant threats is the fake profile. Fake profiles are created intentionally with certain motives, and such profiles may be targeted to steal or acquire sensitive information and/or spread rumors on online social networks with specific motives. Fake profiles are primarily used to steal or extract information by means of friendly interaction online and/or misusing online data available on social sites. Thus, fake profile detection in social media networks is attracting the attention of researchers. This paper aims to discuss various machine learning (ML) methods used by researchers for fake profile detection to explore the further possibility of improvising the machine learning models for speedy results.
What is Social Media?Positive Effects/Advantages of Social Media,Negative effects/Disadvantages of Social Media,True research facts,Threats from Social Media,Prevention,Conclusion and Implication
For more information , visit : http://www.computercareer.in/projects-by-cc/
Norton by Symantec identifies the top 5 scams and spams to avoid on Facebook that are prevalent in the Middle East. These include "Like-" or "Share-baiting" scams, "Like" clickjacking scams, malicious applications, copy-paste script attacks, and hoaxes. Norton advises users to protect themselves by removing offensive posts and applications, changing passwords, and using Norton Safe Web for Facebook to scan for unsafe links.
Introduction to Social Media, Types of Social Media, Professional Uses of Social Media, Impact of Social Media, Negative Side of Social Media, Cyber Bullying, Safety Tips are included in this ppt.
Cybersafety talk given to parents at William Clark College:
How can I be sure my child will be safe when using the Internet?
What are the new social networking sites?
How can I learn more about protecting my child? Internet Safety - Parent A wareness Evening
Come to an interactive workshop where these issues will be addressed to help you learn how to best protect your children when using the Internet. The evening will include a 30 minute demonstration session followed by Q&A. All are welcome to attend free of charge; tea/coffee will be available.
Facilitator: Suresh Sood (Researcher with the School of Marketing in the Faculty of Business, University of Technology Sydney)
Monday 22" , March 2010, 7 pm William Clarke College, Library Conference Room
Enquiries: Liz Nix Ph 8882 2100 (extension 182) efn@wcc.nsw.edu.au
l highly recommend this workshop to all College parents and encourage you to attend and invite others who may be interested: David Raphael
The document discusses threats to privacy and confidentiality on social media. It identifies three main threats: 1) Malware like viruses can steal personal information from computers through social media links or extensions. 2) Social engineering techniques like creating fake profiles or phishing scams can trick users into sharing private information. 3) Social media networks track users across the web through techniques like single sign-on to collect user data for advertisers. The document concludes that due to these threats, personal data on social media cannot be considered confidential.
This document appears to be the table of contents for an issue of the magazine "PRACTICAL PROTECTION IT SECURITY MAGAZINE". It lists the editor in chief and editorial board members. It then outlines the various sections in the issue, including articles on mobile malware trends, smartphone security and privacy, defending cell phones and PDAs, and a trip report from the RSA security conference. It provides authors for each of the articles. The document also includes brief descriptions of some of the articles.
1. The document discusses issues around detecting spam and identifying fake profiles on social networks like Facebook, Twitter, and Sina Weibo.
2. It notes that 20-40% of profiles on social networks could be fake, and identifies challenges in differentiating fake from legitimate profiles due to limited publicly available user data and varying privacy policies across networks.
3. The paper aims to identify approaches for detecting fake profiles using only the minimal publicly available data on each network, and to evaluate their accuracy compared to existing methods using more extensive data.
L1b Trends in ICT - Online Safety and Security.pdfJeth Cuenco
This document provides an introduction to information and communication technologies. It discusses trends in ICT such as convergence of technologies, social media, and mobile technologies. It also covers online safety and security issues like malware, spam, and phishing. The document emphasizes the importance of protecting one's online reputation and intellectual property, and stresses practicing good netiquette when communicating online.
Advantages and Disadvantages Of Social MediaDilna DV
This document discusses the advantages and disadvantages of social media. It begins with defining social media as websites and apps that allow users to create and share content or participate in social networking. Some key advantages mentioned are worldwide connectivity, finding people with common interests, and its use as a promotional tool. Disadvantages include cyberbullying, risks of fraud and identity theft due to lack of privacy controls, addiction, and negative impacts on family relationships and student motivation. The document concludes that social media can be beneficial if used wisely, but individuals must take responsibility for their own safety when sharing personal information online.
The document summarizes key points about protecting personal information and security on social media:
- The NSA has circumvented or cracked much internet encryption and collaborated with tech companies to introduce weaknesses in encryption standards.
- Users should be aware of how their personal information can be exploited if devices are compromised and privacy is valuable.
- Common tips for safe social media use include using strong passwords, customizing strict privacy settings, being wary of links, cookies and requests for sensitive information.
This document outlines some key aspects of social networking including popular platforms, advantages, and disadvantages. It discusses how social networking allows worldwide connectivity and real-time information sharing, but also poses higher risks of cyberbullying, fraud, and identity theft due to privacy issues. The conclusion acknowledges that social networks can be helpful if used wisely, but harmful if too much personal information is shared or time is spent unnecessarily.
Cyber crime is a growing problem as more activities move online. There are many types of cyber crimes, including hacking, identity theft, and cyberbullying. Cyber criminals operate in organized networks similar to businesses, with different roles like leaders, engineers, and money mules. They are motivated by profit and use various technical methods and resources to attack networks and systems. Governments struggle to combat cyber crime due to its global and anonymous nature online.
Social networking sites have become major targets for cybercrime due to the large amounts of personal user information they collect. Criminals are able to use details from profiles to craft convincing phishing emails and social engineer victims. While anonymity online enables some criminal behavior, removing anonymity also poses risks to privacy and freedom of expression. As more data is aggregated about individuals, it will become easier over time to identify users and develop detailed profiles about their lives, habits, and relationships, even if they try to remain anonymous. This aggregated data could then potentially be used for surveillance and other strategic purposes beyond just marketing. Strong privacy laws and regulations are needed to curb these emerging threats to privacy.
Social media and the future of social networkingRussetanSc
Social media has evolved greatly over time and will continue to change the future. It started with basic communication tools like email and phones and now includes large social networks like Facebook and Twitter. These platforms have had major impacts on society such as influencing political movements and revolutions. However, increased social media use has also led to growing concerns around privacy, identity issues, cybercrime, and other negative impacts. Looking ahead, social networking will likely become even more integrated into work, education, and daily life, but these developments also may exacerbate existing problems with privacy, addiction, and mental health issues related to social media use.
Similar to Security Dangers of Social Networking (20)
1. Slapped in the Facebook: The wonders (and security threats) of social networking Presentation for the National Information Security Group (NAISG), May 2009 monthly meeting