I. INTRODUCTION
This
research is all about the Cyber Crimes and Threats experienced by the High
School Students.
The
researcher want’s to know/prove that in our generation many teenagers/students
have an addiction in different social media sites or online games.
The
researcher want’s to do a interview for the for the teenagers/students, to know
the percentage of the people who being involve in crime.
According
to Nick MC, social media have become prominent parts of life for many young
people today. There are many positive aspects, but there are equally as many
dangers that come with use of sites such as Facebook, Twitter, etc.
Another
to Statistical Analysis System
(SAS). The riots that make broke out across England during the summer of 2011
also demonstrated the power of social media as an influenced of mass action.
But the problem goes much deeper than these widely publicized incidents.
Social media sites are used daily to
coordinate more standard criminal activity- from engineering and coordinating
criminal gangs to terrorist group. The growing criminality associated with
social media has been a wake-up call to government agencies. We can no longer
stand on the sidelines and watch. We need to actively participate and monitor
the discussions so we can use social media data as a source of intelligence of
social media could provide.
There are 7 examples of different threats
using social media:
1.
Social
engineering: Today, ‘social engineering’ is one of
the most prevalent
social media threats and also the most popular tactic for cyber
criminals. Social media platforms allow attackers to find personal information
that can be used to target specific individuals. Using information from
employee profiles, a plausible fake account can be created to establish trust
over time. Once the trust is built, the attacker might start asking for
specific information, like internal server names, project names, or even have
the new friend open an infected document or visit a prepared website that will
drop a backdoor onto their computer.
2.
Targeted phishing
attacks: Such attacks are carried out to steal
money or confidential information, as was the case with the Hydraq attacks in
early 2010 that compromised critical information of several multi national
companies. This social media threat is an example of
social engineering tactics, whereby attackers exploit fear and anxiety, instead
of system vulnerability to get users to part with their money. Since these
attacks are so specific and targeted, the chances of success are higher.
3.
Fake accounts: In July 2010, a fake profile named Robin Sage was actively
pushed to request connections to random people, which most people accepted
without knowing who the fictitious woman was. The seriousness of such social media threats gets
underscored when one considers that the fake account in this case, was
successful in connecting with hundreds of people from various organizations,
including military, government, and security firms.
4.
Celebrity name misuse: This is one of the popular social media threats of today.
There have been several incidents of hackers registering a new account under
the name of a celebrity. Such a fake account can be used to spread
misinformation and rumors or to attract new followers that can later be
spammed. The gravity of these threats lies in the fact that hackers can use social media to extract users’ personal
information and misuse it. There is generally no real
authentication process that links a virtual profile to a real life identity.
Hence, authentication of identification is important to protect against these
social media threats.
5.
Site compromise:In this social media threat, if an
attacker compromises a social networking site with malicious code, any visitor
to the site would be susceptible to attack. Hackers have also found ways to
insert malicious code into advertisements and create rogue third-party
applications, which lure users and ultimately compromise their computers or
gather their personal information.
6.
Social media used for
spreading spam and malware: Social
networking sites like Twitter and Facebook are often used to spread malware.
The growing popularity of shortened URLs is also giving rise to several social media threats. Cyber criminals
often mask their links with a short URL making it difficult for the user to
identify whether it is pointing to a legitimate or malicious site. This threat
is a real possibility for social bookmarking and micro blogging sites, which
are used to spread links and news in a very short span of time.
7.
Confidential information
leak: The scariest of social media threats is where
employees start revealing seemingly uncritical technical information to the
public. This could be a Twitter comment stating that the user is fed up
configuring a particular firewall product at work or a status message
indicating that the user finally found a way around a Web proxy product being
used, and is now able to post to his profile again. An attacker could use this
information to identify the security software of the user or the company.
Walang komento:
Mag-post ng isang Komento