Most Effective Ways to Overcome Impersonation on Social Networking Site’s Problem

Page 1

#SocialNetworking

Most Effective Ways to Overcome Impersonation on Social Networking Site’s Problem

www.info-savvy.com


PROPOSAL OUTLINE KEY DISCUSSION POINTS

1) Impersonation on Social Networking Sites 2) Impersonation on Facebook 3) Social Networking Threats to Corporate Networks 4) Insider Threats 5) Type of Insider Threats 6) Why is Insider Attack Effective?

www.info-savvy.com


IMPERSONATION ON SOCIAL NETWORKING SITES Today social networking sites are widely used by many people that allow them to build online profiles, share information, pictures, blog entries, music clips, and so on. Thus, it is relatively easier for an attacker to impersonate someone, The victim is likely to trust them and eventually reveal information that would help the attacker gain access to a system.

www.info-savvy.com


IMPERSONATION ON FACEBOOK Facebook is a well-known social networking site or service that connects people to other people. It is widely used to communicate with friends, and share and upload photos, links, and videos. To impersonate users on Facebook, attackers use nicknames instead of their real names. They create fake accounts and try to add “Friends” to view others’ profiles to obtain critical and valuable information.

www.info-savvy.com


“Don’t use social media to impress people; use it to impact people.” -Dave Willis

www.info-savvy.com


SOCIAL NETWORKING THREATS TO CORPORATE NETWORKS Before sharing data on a social networking site or enhancing their channels, groups, or profiles, private and corporate users should be aware of the following social or technical security risks they could face.

Data Theft Involuntary Data Leakage Targeted Attacks Network Vulnerability Spam and Phishing

Modification of Content Malware Propagation Business Reputation Infrastructure & Maintenance Loss of Productivity costs

www.info-savvy.com


INSIDER THREATS An insider is any employee (trusted person) having access to critical assets of an organization. An insider attack involves using privileged access to violate rules or intentionally cause a threat to the organization’s information or information systems. Insiders can easily bypass security rules, corrupt valuable resources, and access sensitive information. It is difficult to figure out an insider attack. Insider attacks may also cause great loss to the company. About 60% of attacks occur from behind the firewall. It is easier to launch an insider attack, and preventing such attacks is difficult.

www.info-savvy.com


Malicious Insider Negligent Insider Professional Insider Compromised Insider

www.info-savvy.com


WHY IS INSIDER ATTACK EFFECTIVE? An insider attack is effective because of the following reasons: -Insider attacks go undetectable for years together and remediation

is

expensive. - An insider attack is easy to launch. - Preventing insider attack is difficult. - The inside attacker can easily succeed. - It is very difficult to differentiate harmful actions from employee’s regular work. It is hard to identify whether employees are performing malicious activities or not. - Even after detection of malicious activities of the employee, he/she may refuse to accept by claiming it is a mistake done unintentionally.

www.info-savvy.com


“Social Networking helps reach people Easier and Quicker”

www.info-savvy.com


Click here for continue reading... https://www.info-savvy.com/most-effective-ways-toovercome-impersonation-on-social-networking-sitesproblem/

www.info-savvy.com


OUR SOCIAL SITES GET TO KNOW US

FACEBOOK

TWITTER

www.info-savvy.com

INSTAGRAM


Contact Us Address 2nd Floor Sai NiketanOpp Borivali Railway StationBorivali West MumbaiMaharashtra 400092INDIA

Phone +91-8879441408

www.info-savvy.com


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.