Huwebes, Marso 9, 2017

I. INTRODUCTION
     This research is all about the Cyber Crimes and Threats experienced by the High School Students.
    
     The researcher want’s to know/prove that in our generation many teenagers/students have an addiction in different social media sites or online games.

     The researcher want’s to do a interview for the for the teenagers/students, to know the percentage of the people who being involve in crime.

     According to Nick MC, social media have become prominent parts of life for many young people today. There are many positive aspects, but there are equally as many dangers that come with use of sites such as Facebook, Twitter, etc.

     Another to Statistical Analysis System (SAS). The riots that make broke out across England during the summer of 2011 also demonstrated the power of social media as an influenced of mass action. But the problem goes much deeper than these widely publicized incidents.

     Social media sites are used daily to coordinate more standard criminal activity- from engineering and coordinating criminal gangs to terrorist group. The growing criminality associated with social media has been a wake-up call to government agencies. We can no longer stand on the sidelines and watch. We need to actively participate and monitor the discussions so we can use social media data as a source of intelligence of social media could provide.

     There are 7 examples of different threats using social media:
1.  Social engineering:  Today, ‘social engineering’ is one of the most prevalent social media threats and also the most popular tactic for cyber criminals. Social media platforms allow attackers to find personal information that can be used to target specific individuals. Using information from employee profiles, a plausible fake account can be created to establish trust over time. Once the trust is built, the attacker might start asking for specific information, like internal server names, project names, or even have the new friend open an infected document or visit a prepared website that will drop a backdoor onto their computer. 
2.  Targeted phishing attacks: Such attacks are carried out to steal money or confidential information, as was the case with the Hydraq attacks in early 2010 that compromised critical information of several multi national companies. This social media threat is an example of social engineering tactics, whereby attackers exploit fear and anxiety, instead of system vulnerability to get users to part with their money. Since these attacks are so specific and targeted, the chances of success are higher.
3.  Fake accounts:  In July 2010, a fake profile named Robin Sage was actively pushed to request connections to random people, which most people accepted without knowing who the fictitious woman was. The seriousness of such social media threats gets underscored when one considers that the fake account in this case, was successful in connecting with hundreds of people from various organizations, including military, government, and security firms.
4.  Celebrity name misuse: This is one of the popular social media threats of today. There have been several incidents of hackers registering a new account under the name of a celebrity. Such a fake account can be used to spread misinformation and rumors or to attract new followers that can later be spammed. The gravity of these threats lies in the fact that hackers can use social media to extract users’ personal information and misuse it. There is generally no real authentication process that links a virtual profile to a real life identity. Hence, authentication of identification is important to protect against these social media threats.
5.  Site compromise:In this social media threat, if an attacker compromises a social networking site with malicious code, any visitor to the site would be susceptible to attack. Hackers have also found ways to insert malicious code into advertisements and create rogue third-party applications, which lure users and ultimately compromise their computers or gather their personal information.
6.  Social media used for spreading spam and malware: Social networking sites like Twitter and Facebook are often used to spread malware. The growing popularity of shortened URLs is also giving rise to several social media threats. Cyber criminals often mask their links with a short URL making it difficult for the user to identify whether it is pointing to a legitimate or malicious site. This threat is a real possibility for social bookmarking and micro blogging sites, which are used to spread links and news in a very short span of time.  
7.  Confidential information leak: The scariest of social media threats is where employees start revealing seemingly uncritical technical information to the public. This could be a Twitter comment stating that the user is fed up configuring a particular firewall product at work or a status message indicating that the user finally found a way around a Web proxy product being used, and is now able to post to his profile again. An attacker could use this information to identify the security software of the user or the company.


Walang komento:

Mag-post ng isang Komento