Most Effective Ways to Overcome Impersonation on Social Networking Site’s Problem

Page 1

Most Effective Ways to Overcome Impersonation on Social Networking Site’s Problem www.infosavvy.com


PROPOSAL OUTLINE KEY DISCUSSION POINTS

1) Impersonation on Social Networking Sites 2) Impe rsonation on Facebook 3) Social Networking Threats to Corporate Networks 4) I nsider Threats 5) Typ e of Insider Threats 6) Why is Insider Attack Effective?

www.info-savvy.com


IMPERSONATION ON SOCIAL NETWORKING SITES Today social networking sites are widely used by many people that allow them to build online profiles, share information, pictures, blog entries, music clips, and so on. Thus, it is relatively easier for an attacker to impersonate someone, The victim is likely to trust them and eventually reveal information that would help the attacker gain access to a system.

www.info-


IMPERSONATION ON FACEBOOK Facebook is a well-known social networking site or service that connects people to other people. It is widely used to communicate with friends, and share and upload photos, links, and videos. To impersonate users on Facebook, attackers use nicknames instead of their real names. They create fake accounts and try to add “Friends” to view others’ profiles to obtain critical and valuable www.info-savvy.com


“Don’t use social media to impress people; use it to impact people.” -Dave Willis www.info-


SOCIAL NETWORKING THREATS TO CORPORATE NETWORKS Before sharing data on a social networking site or enhancing their channels, groups, or profiles, private and corporate users should be aware of the following social or technical security risks they could face.

• Data Theft • Modification of Content • Involuntary Data Leakage• Malware Propagation • Targeted Attacks • Business Reputation • Network Vulnerability • Infrastructure & Maintenance Loss • Spam and Phishing of • Productivity costs www.info-


INSIDER THREATS An insider is any employee (trusted person) having access to critical assets of an organization. An insider attack involves using privileged access to violate rules or intentionally cause a threat to the organization’s information or information systems. Insiders can easily bypass security rules, corrupt valuable resources, and access sensitive information. It is difficult to figure out an insider attack. Insider attacks may also cause great loss to the company. About 60% of attacks occur from behind the firewall. It is easier to launch an insider attack, and preventing such attacks is difficult.

www.info-


• Malicious Insider • Negligent Insider • Professional Insider • Compromised Insider

www.info-savvy.com


WHY IS INSIDER ATTACK EFFECTIVE? An insider attack is effective because of the following reasons: -Insider attacks go undetectable for years together and remediation is expensive. - An insider attack is easy to launch. - Preventing insider attack is difficult. - The inside attacker can easily succeed. - It is very difficult to differentiate harmful actions from employee’s regular work. It is hard to identify whether employees are performing malicious activities or not. - Even after detection of malicious activities of the employee, he/she may refuse to accept by claiming it is a mistake done unintentionally.

www.info-


“Social Networking helps reach people Easier and Quicker”

www.info-savvy.com


Click here for continue reading... https://www.info-savvy.com/most-effective-ways-toovercome-impersonation-on-social-networking-sitesproblem/

www.info-


OUR SOCIAL SIT ES GET TO KNOW US

FACEBOOK

TWITTER

www.info-

INSTAGRAM


Contact Us Address 2nd Floor Sai NiketanOpp Borivali Railway StationBorivali West MumbaiMaharashtra 400092INDIA

Phone +91-8879441408

www.info-


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.