#SocialNetworking
Most Effective Ways to Overcome Impersonation on Social Networking Site’s Problem
www.info-savvy.com
PROPOSAL OUTLINE KEY DISCUSSION POINTS
1) Impersonation on Social Networking Sites 2) Impersonation on Facebook 3) Social Networking Threats to Corporate Networks 4) Insider Threats 5) Type of Insider Threats 6) Why is Insider Attack Effective?
www.info-savvy.com
IMPERSONATION ON SOCIAL NETWORKING SITES Today social networking sites are widely used by many people that allow them to build online profiles, share information, pictures, blog entries, music clips, and so on. Thus, it is relatively easier for an attacker to impersonate someone, The victim is likely to trust them and eventually reveal information that would help the attacker gain access to a system.
www.info-savvy.com
IMPERSONATION ON FACEBOOK Facebook is a well-known social networking site or service that connects people to other people. It is widely used to communicate with friends, and share and upload photos, links, and videos. To impersonate users on Facebook, attackers use nicknames instead of their real names. They create fake accounts and try to add “Friends” to view others’ profiles to obtain critical and valuable information.
www.info-savvy.com
“Don’t use social media to impress people; use it to impact people.” -Dave Willis
www.info-savvy.com
SOCIAL NETWORKING THREATS TO CORPORATE NETWORKS Before sharing data on a social networking site or enhancing their channels, groups, or profiles, private and corporate users should be aware of the following social or technical security risks they could face.
Data Theft Involuntary Data Leakage Targeted Attacks Network Vulnerability Spam and Phishing
Modification of Content Malware Propagation Business Reputation Infrastructure & Maintenance Loss of Productivity costs
www.info-savvy.com
INSIDER THREATS An insider is any employee (trusted person) having access to critical assets of an organization. An insider attack involves using privileged access to violate rules or intentionally cause a threat to the organization’s information or information systems. Insiders can easily bypass security rules, corrupt valuable resources, and access sensitive information. It is difficult to figure out an insider attack. Insider attacks may also cause great loss to the company. About 60% of attacks occur from behind the firewall. It is easier to launch an insider attack, and preventing such attacks is difficult.
www.info-savvy.com
Malicious Insider Negligent Insider Professional Insider Compromised Insider
www.info-savvy.com
WHY IS INSIDER ATTACK EFFECTIVE? An insider attack is effective because of the following reasons: -Insider attacks go undetectable for years together and remediation
is
expensive. - An insider attack is easy to launch. - Preventing insider attack is difficult. - The inside attacker can easily succeed. - It is very difficult to differentiate harmful actions from employee’s regular work. It is hard to identify whether employees are performing malicious activities or not. - Even after detection of malicious activities of the employee, he/she may refuse to accept by claiming it is a mistake done unintentionally.
www.info-savvy.com
“Social Networking helps reach people Easier and Quicker”
www.info-savvy.com
Click here for continue reading... https://www.info-savvy.com/most-effective-ways-toovercome-impersonation-on-social-networking-sitesproblem/
www.info-savvy.com
OUR SOCIAL SITES GET TO KNOW US
www.info-savvy.com
Contact Us Address 2nd Floor Sai NiketanOpp Borivali Railway StationBorivali West MumbaiMaharashtra 400092INDIA
Phone +91-8879441408
www.info-savvy.com