SlideShare a Scribd company logo
Web 2.0/Social Networks and Security By: Sherry Gu For: ACC626
Agenda Definition of Web 2.0  Magnitude on use of Web 2.0/social networking applications  Impacts of Web 2.0/social networks have on security and security risks Types of security attacks  Triggers/motivations behind security attacks Remedies/solutions to security vulnerabilities Implications for accountants
What is Web 2.0? Web 2.0 Conference “Network as Platform” – Web 2.0 “managing, understanding, responding…” “…to massive amount of user generated data…” “…in real time”
Magnitude of Use For Businesses: 2008 Survey: 18% of companies use blogs 32% of companies use wikis 23% of companies use RSS-feeds Forrester Research: Spending on Web 2.0 application: $4.6 billion in 2013
Impacts on Security Risks Control/Detection Risk  Add complexity to the current system (multiple platforms, multiple sources) Inherent Risk Interactive nature Increase in likelihood of leaking confidential data Statistics: 40% users attacked by malwares and phishing from social networking sites Ranked as “most serious risk to information security” in 2010 by SMB’s 60% companies believed that employee behaviour on social networks could endanger network security
XSS Attack Injecting malicious codes into otherwise trusted websites Gives hackers access to information on browser E.g. “Samy” Attack on MySpace Add Samy as a friend Add “Samy is my hero” on profile pages One million friend requests
CSRF Attack Lure users to open/load malicious links Gives hacker access to already - authenticated applications Hacker make undesirable modifications/changes/extractions to applications E.g. Gmail Malicious codes create email filters that that forward emails to another account
Malwares/Spywares/Adwares Malware: worms, viruses, trojan Examples: Koobface family malware on Youtube and Facebook Bebloh Trojan: “man-in-the-browser” attack
Spear Phishing Target specific organizations Seek unauthorized access to confidential data Appearance of sender: more direct relationship with the victim Social networks: help hackers to build more complete profile about the sender
Identity Theft Researchers from Eurecom Profile cloning Cross-site cloning Authentication problems
Triggers/Motivations  Technical nature: Largely dependent on source codes: e.g. AJAX Open – source Complex scripts and dynamic technology: difficult for protection software to identify malware signatures
Triggers/Motivations  Financial Gain Hack into bank accounts Sell to buyers in the large underground market Organized crime/bot recruitment Web 2.0 applications are: public, open, scalable, anonymous
Remedies/Solutions Employee use policies and education  (balance between flexibility and security) Strengthen monitoring and reviewing activities: extensive logs and audit trails Encryption of user data using public and private keys
Implications for Accountants Auditors:  Assess need for risk assessment Social network/Web 2.0 strategy, policies,  and regulatory compliance requirements Risk assessment Identify types of risk Analyze threat potential Validate risk ratings Hire IT specialist ISACA: social media assurance/audit program
Conclusion Heightened security risks Risk assessment is critical Policies and procedures
Web 2.0/Social Networks and Security

More Related Content

What's hot

Getting Hacked is a Nasty Business. Events are in for a Rude Awakening.
Getting Hacked is a Nasty Business. Events are in for a Rude Awakening.Getting Hacked is a Nasty Business. Events are in for a Rude Awakening.
Getting Hacked is a Nasty Business. Events are in for a Rude Awakening.
Michelle Bruno
 
Websense 2013 Threat Report
Websense 2013 Threat ReportWebsense 2013 Threat Report
Websense 2013 Threat Report
Kim Jensen
 
Microsoft warns of potential attacks
Microsoft warns of potential attacksMicrosoft warns of potential attacks
Microsoft warns of potential attacks
John Davis
 
5 Cybersecurity threats in Public Sector
5 Cybersecurity threats in Public Sector5 Cybersecurity threats in Public Sector
5 Cybersecurity threats in Public Sector
Seqrite
 
Data security for healthcare industry
Data security for healthcare industryData security for healthcare industry
Data security for healthcare industry
Seqrite
 
Top 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail IndustryTop 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail Industry
Seqrite
 
Content Management System Security
Content Management System SecurityContent Management System Security
Content Management System Security
Samvel Gevorgyan
 
Top 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in BankingTop 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in Banking
Seqrite
 
Conférence - Adopter une approche de sécurité applicative avancée - #ACSS 2019
Conférence - Adopter une approche de sécurité applicative avancée - #ACSS 2019Conférence - Adopter une approche de sécurité applicative avancée - #ACSS 2019
Conférence - Adopter une approche de sécurité applicative avancée - #ACSS 2019
African Cyber Security Summit
 
[Infographic] Data Loss Prevention
[Infographic] Data Loss Prevention[Infographic] Data Loss Prevention
[Infographic] Data Loss Prevention
Seqrite
 
Importance of cyber security in education sector
Importance of cyber security in education sectorImportance of cyber security in education sector
Importance of cyber security in education sector
Seqrite
 
INFOGRAPHIC: Secure Computing as Threats Evolve
INFOGRAPHIC: Secure Computing as Threats EvolveINFOGRAPHIC: Secure Computing as Threats Evolve
INFOGRAPHIC: Secure Computing as Threats Evolve
Symantec
 
Gaining A Foothold
Gaining A FootholdGaining A Foothold
Gaining A Foothold
Claranet UK
 
Current Emerging Threats
Current Emerging ThreatsCurrent Emerging Threats
Current Emerging Threats
dnomura
 
[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the world[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the world
Seqrite
 
Content filters presentation
Content filters presentationContent filters presentation
Content filters presentation
kdore
 
Cybersecurity Challenges in Retail 2020: How to Prevent Retail Theft
Cybersecurity Challenges in Retail 2020: How to Prevent Retail TheftCybersecurity Challenges in Retail 2020: How to Prevent Retail Theft
Cybersecurity Challenges in Retail 2020: How to Prevent Retail Theft
Intellias
 
Research Paper
Research PaperResearch Paper
Research Paper
David Chaponniere
 
How Does a Data Breach Happen?
How Does a Data Breach Happen? How Does a Data Breach Happen?
How Does a Data Breach Happen?
Claranet UK
 
Security Awareness Training from KnowBe4
Security Awareness Training from KnowBe4Security Awareness Training from KnowBe4
Security Awareness Training from KnowBe4
Carol Montgomery Adams
 

What's hot (20)

Getting Hacked is a Nasty Business. Events are in for a Rude Awakening.
Getting Hacked is a Nasty Business. Events are in for a Rude Awakening.Getting Hacked is a Nasty Business. Events are in for a Rude Awakening.
Getting Hacked is a Nasty Business. Events are in for a Rude Awakening.
 
Websense 2013 Threat Report
Websense 2013 Threat ReportWebsense 2013 Threat Report
Websense 2013 Threat Report
 
Microsoft warns of potential attacks
Microsoft warns of potential attacksMicrosoft warns of potential attacks
Microsoft warns of potential attacks
 
5 Cybersecurity threats in Public Sector
5 Cybersecurity threats in Public Sector5 Cybersecurity threats in Public Sector
5 Cybersecurity threats in Public Sector
 
Data security for healthcare industry
Data security for healthcare industryData security for healthcare industry
Data security for healthcare industry
 
Top 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail IndustryTop 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail Industry
 
Content Management System Security
Content Management System SecurityContent Management System Security
Content Management System Security
 
Top 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in BankingTop 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in Banking
 
Conférence - Adopter une approche de sécurité applicative avancée - #ACSS 2019
Conférence - Adopter une approche de sécurité applicative avancée - #ACSS 2019Conférence - Adopter une approche de sécurité applicative avancée - #ACSS 2019
Conférence - Adopter une approche de sécurité applicative avancée - #ACSS 2019
 
[Infographic] Data Loss Prevention
[Infographic] Data Loss Prevention[Infographic] Data Loss Prevention
[Infographic] Data Loss Prevention
 
Importance of cyber security in education sector
Importance of cyber security in education sectorImportance of cyber security in education sector
Importance of cyber security in education sector
 
INFOGRAPHIC: Secure Computing as Threats Evolve
INFOGRAPHIC: Secure Computing as Threats EvolveINFOGRAPHIC: Secure Computing as Threats Evolve
INFOGRAPHIC: Secure Computing as Threats Evolve
 
Gaining A Foothold
Gaining A FootholdGaining A Foothold
Gaining A Foothold
 
Current Emerging Threats
Current Emerging ThreatsCurrent Emerging Threats
Current Emerging Threats
 
[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the world[Infographic] 7 Cyber attacks that shook the world
[Infographic] 7 Cyber attacks that shook the world
 
Content filters presentation
Content filters presentationContent filters presentation
Content filters presentation
 
Cybersecurity Challenges in Retail 2020: How to Prevent Retail Theft
Cybersecurity Challenges in Retail 2020: How to Prevent Retail TheftCybersecurity Challenges in Retail 2020: How to Prevent Retail Theft
Cybersecurity Challenges in Retail 2020: How to Prevent Retail Theft
 
Research Paper
Research PaperResearch Paper
Research Paper
 
How Does a Data Breach Happen?
How Does a Data Breach Happen? How Does a Data Breach Happen?
How Does a Data Breach Happen?
 
Security Awareness Training from KnowBe4
Security Awareness Training from KnowBe4Security Awareness Training from KnowBe4
Security Awareness Training from KnowBe4
 

Viewers also liked

Algoritmo francisco chancay 4to b.docx
Algoritmo francisco chancay 4to b.docxAlgoritmo francisco chancay 4to b.docx
Algoritmo francisco chancay 4to b.docx
francisco chancay
 
Aparato fonador (árabe)
Aparato fonador (árabe)Aparato fonador (árabe)
Aparato fonador (árabe)
Carlos Serrano
 
Planning meeting 6/14/11
Planning meeting 6/14/11Planning meeting 6/14/11
Planning meeting 6/14/11
OyateOmniciye
 
Eva carolina aguirre v2
Eva carolina aguirre v2Eva carolina aguirre v2
Eva carolina aguirre v2
Eva Carolina Aguirre
 
Our Organic Garden...
Our Organic Garden...Our Organic Garden...
Our Organic Garden...
OyateOmniciye
 
Oyate Omniciye Visioning and Listening Sessions
Oyate Omniciye Visioning and Listening SessionsOyate Omniciye Visioning and Listening Sessions
Oyate Omniciye Visioning and Listening Sessions
OyateOmniciye
 
B o s s vs L e a d e r
B o s s  vs  L e a d e rB o s s  vs  L e a d e r
B o s s vs L e a d e r
Re.AL Coaching Open Mind Solutions
 

Viewers also liked (8)

Algoritmo francisco chancay 4to b.docx
Algoritmo francisco chancay 4to b.docxAlgoritmo francisco chancay 4to b.docx
Algoritmo francisco chancay 4to b.docx
 
Aparato fonador (árabe)
Aparato fonador (árabe)Aparato fonador (árabe)
Aparato fonador (árabe)
 
Planning meeting 6/14/11
Planning meeting 6/14/11Planning meeting 6/14/11
Planning meeting 6/14/11
 
Life
LifeLife
Life
 
Eva carolina aguirre v2
Eva carolina aguirre v2Eva carolina aguirre v2
Eva carolina aguirre v2
 
Our Organic Garden...
Our Organic Garden...Our Organic Garden...
Our Organic Garden...
 
Oyate Omniciye Visioning and Listening Sessions
Oyate Omniciye Visioning and Listening SessionsOyate Omniciye Visioning and Listening Sessions
Oyate Omniciye Visioning and Listening Sessions
 
B o s s vs L e a d e r
B o s s  vs  L e a d e rB o s s  vs  L e a d e r
B o s s vs L e a d e r
 

Similar to Web 2.0/Social Networks and Security

Social Media Security
Social Media SecuritySocial Media Security
Social Media Security
scstatelibrary
 
Security in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudSecurity in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and Cloud
ITDogadjaji.com
 
Insecure trends in web technologies 2009
Insecure trends in web technologies 2009Insecure trends in web technologies 2009
Insecure trends in web technologies 2009
Chandrakanth Narreddy
 
F5 Hero Asset - Inside the head of a Hacker Final
F5 Hero Asset - Inside the head of a Hacker FinalF5 Hero Asset - Inside the head of a Hacker Final
F5 Hero Asset - Inside the head of a Hacker Final
Shallu Behar-Sheehan FCIM
 
Emerging web security threats
Emerging web security threatsEmerging web security threats
Emerging web security threats
Insikt Intelligence
 
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
ijccsa
 
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
ijccsa
 
Risk and Threat Assessment Report Anthony WolfBSA 5.docx
Risk and Threat Assessment Report Anthony WolfBSA 5.docxRisk and Threat Assessment Report Anthony WolfBSA 5.docx
Risk and Threat Assessment Report Anthony WolfBSA 5.docx
malbert5
 
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec Technology and Consulting
 
CyberCrime - Lse summer school 2010 mg270
CyberCrime - Lse summer school 2010 mg270CyberCrime - Lse summer school 2010 mg270
CyberCrime - Lse summer school 2010 mg270
Dario
 
Risk and Threat Assessment Report Anthony WolfBSA 5.docx
Risk and Threat Assessment Report Anthony WolfBSA 5.docxRisk and Threat Assessment Report Anthony WolfBSA 5.docx
Risk and Threat Assessment Report Anthony WolfBSA 5.docx
joellemurphey
 
3 Hkcert Trend
3  Hkcert Trend3  Hkcert Trend
3 Hkcert Trend
SC Leung
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112
Erik Ginalick
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threats
ReadWrite
 
Information security
Information securityInformation security
Information security
Appin Faridabad
 
When web 2.0 sneezes, everyone gets sick
When web 2.0 sneezes, everyone gets sickWhen web 2.0 sneezes, everyone gets sick
When web 2.0 sneezes, everyone gets sick
Stefan Tanase
 
The Dangers of Lapto
The Dangers of LaptoThe Dangers of Lapto
The Dangers of Lapto
Infosec Europe
 
C3
C3C3
File000145
File000145File000145
File000145
Desmond Devendran
 
Keeping up with the Revolution in IT Security
Keeping up with the Revolution in IT SecurityKeeping up with the Revolution in IT Security
Keeping up with the Revolution in IT Security
Distil Networks
 

Similar to Web 2.0/Social Networks and Security (20)

Social Media Security
Social Media SecuritySocial Media Security
Social Media Security
 
Security in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudSecurity in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and Cloud
 
Insecure trends in web technologies 2009
Insecure trends in web technologies 2009Insecure trends in web technologies 2009
Insecure trends in web technologies 2009
 
F5 Hero Asset - Inside the head of a Hacker Final
F5 Hero Asset - Inside the head of a Hacker FinalF5 Hero Asset - Inside the head of a Hacker Final
F5 Hero Asset - Inside the head of a Hacker Final
 
Emerging web security threats
Emerging web security threatsEmerging web security threats
Emerging web security threats
 
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
A Multi-Layer Real Time Remote Monitoring & Corporate Network System For Viru...
 
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)International Journal on Cloud Computing: Services and Architecture (IJCCSA)
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
 
Risk and Threat Assessment Report Anthony WolfBSA 5.docx
Risk and Threat Assessment Report Anthony WolfBSA 5.docxRisk and Threat Assessment Report Anthony WolfBSA 5.docx
Risk and Threat Assessment Report Anthony WolfBSA 5.docx
 
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
 
CyberCrime - Lse summer school 2010 mg270
CyberCrime - Lse summer school 2010 mg270CyberCrime - Lse summer school 2010 mg270
CyberCrime - Lse summer school 2010 mg270
 
Risk and Threat Assessment Report Anthony WolfBSA 5.docx
Risk and Threat Assessment Report Anthony WolfBSA 5.docxRisk and Threat Assessment Report Anthony WolfBSA 5.docx
Risk and Threat Assessment Report Anthony WolfBSA 5.docx
 
3 Hkcert Trend
3  Hkcert Trend3  Hkcert Trend
3 Hkcert Trend
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threats
 
Information security
Information securityInformation security
Information security
 
When web 2.0 sneezes, everyone gets sick
When web 2.0 sneezes, everyone gets sickWhen web 2.0 sneezes, everyone gets sick
When web 2.0 sneezes, everyone gets sick
 
The Dangers of Lapto
The Dangers of LaptoThe Dangers of Lapto
The Dangers of Lapto
 
C3
C3C3
C3
 
File000145
File000145File000145
File000145
 
Keeping up with the Revolution in IT Security
Keeping up with the Revolution in IT SecurityKeeping up with the Revolution in IT Security
Keeping up with the Revolution in IT Security
 

Recently uploaded

Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 

Recently uploaded (20)

Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 

Web 2.0/Social Networks and Security

  • 1. Web 2.0/Social Networks and Security By: Sherry Gu For: ACC626
  • 2. Agenda Definition of Web 2.0 Magnitude on use of Web 2.0/social networking applications Impacts of Web 2.0/social networks have on security and security risks Types of security attacks Triggers/motivations behind security attacks Remedies/solutions to security vulnerabilities Implications for accountants
  • 3. What is Web 2.0? Web 2.0 Conference “Network as Platform” – Web 2.0 “managing, understanding, responding…” “…to massive amount of user generated data…” “…in real time”
  • 4. Magnitude of Use For Businesses: 2008 Survey: 18% of companies use blogs 32% of companies use wikis 23% of companies use RSS-feeds Forrester Research: Spending on Web 2.0 application: $4.6 billion in 2013
  • 5. Impacts on Security Risks Control/Detection Risk Add complexity to the current system (multiple platforms, multiple sources) Inherent Risk Interactive nature Increase in likelihood of leaking confidential data Statistics: 40% users attacked by malwares and phishing from social networking sites Ranked as “most serious risk to information security” in 2010 by SMB’s 60% companies believed that employee behaviour on social networks could endanger network security
  • 6. XSS Attack Injecting malicious codes into otherwise trusted websites Gives hackers access to information on browser E.g. “Samy” Attack on MySpace Add Samy as a friend Add “Samy is my hero” on profile pages One million friend requests
  • 7. CSRF Attack Lure users to open/load malicious links Gives hacker access to already - authenticated applications Hacker make undesirable modifications/changes/extractions to applications E.g. Gmail Malicious codes create email filters that that forward emails to another account
  • 8. Malwares/Spywares/Adwares Malware: worms, viruses, trojan Examples: Koobface family malware on Youtube and Facebook Bebloh Trojan: “man-in-the-browser” attack
  • 9. Spear Phishing Target specific organizations Seek unauthorized access to confidential data Appearance of sender: more direct relationship with the victim Social networks: help hackers to build more complete profile about the sender
  • 10. Identity Theft Researchers from Eurecom Profile cloning Cross-site cloning Authentication problems
  • 11. Triggers/Motivations Technical nature: Largely dependent on source codes: e.g. AJAX Open – source Complex scripts and dynamic technology: difficult for protection software to identify malware signatures
  • 12. Triggers/Motivations Financial Gain Hack into bank accounts Sell to buyers in the large underground market Organized crime/bot recruitment Web 2.0 applications are: public, open, scalable, anonymous
  • 13. Remedies/Solutions Employee use policies and education (balance between flexibility and security) Strengthen monitoring and reviewing activities: extensive logs and audit trails Encryption of user data using public and private keys
  • 14. Implications for Accountants Auditors: Assess need for risk assessment Social network/Web 2.0 strategy, policies, and regulatory compliance requirements Risk assessment Identify types of risk Analyze threat potential Validate risk ratings Hire IT specialist ISACA: social media assurance/audit program
  • 15. Conclusion Heightened security risks Risk assessment is critical Policies and procedures