logo

Cyber Threats in Social Media Technologies

12 Pages3939 Words91 Views
   

Added on  2023-01-19

About This Document

This report discusses the different cyber threats in social media technologies, such as celebrity name misuse, spreading spam and malware, targeted phishing attacks, and more. It provides insights into the impact of these threats and offers recommendations on how to protect oneself from them.

Cyber Threats in Social Media Technologies

   Added on 2023-01-19

ShareRelated Documents
CYBER THREATS IN
SOCIAL MEDIA
TECHNOLOGIES
Name - Bussa Rahul
ID -1722167
Course- MSc International Bussiness
Block- Intercultural Bussiness And competencies
Cyber Threats in Social Media Technologies_1
TABLE OF CONTENTS
INTRODUCTION...........................................................................................................................1
MAIN BODY...................................................................................................................................1
Develop the ideas logically as full as possible.............................................................................1
Different component of problem and now keeping an appropriate balance................................3
Explain and justify the points made, presenting supporting evidence where appropriate. You
can use theories or data or both but always support your statements, otherwise they could be
seen as ‘hearsay’..........................................................................................................................5
CONCLUSION................................................................................................................................7
RECOMMENDATIONS.................................................................................................................7
REFERENCES..............................................................................................................................10
Cyber Threats in Social Media Technologies_2
INTRODUCTION
Cyber threat in the social media technology is the malicious act that is being seek to
damage the data, steal data and disrupt the digital life in general. As these cyber attacks includes
the threats such as computer viruses, breach of data as well as denial of service attacks. Most
common type of cyber threats are phishing, password attack, leakage of personal data etc. this
report contains the general view that indicates the ideas that develops logically in the context of
cyber threats in Social Media Technologies that are misuse the name of celebrity, spreading
spam and malware, fake accounts, leakage of information, confidential information leak.
MAIN BODY
Develop the ideas logically as full as possible
Facebook is the social media networking site facing the issues of social media threats as many
users target the Facebook for scam as many hackers is using the Facebook messenger service as
a platform that may turn into the huge cyber threat. Facebook is one of the most common and
used social networking sites in this one can communicate to others, can share their views, photos
and can also tag photos (Cerrudo, 2015). One can also make the groups of people who shares the
common interest, create the pages, can join the groups and can do many more things. Some of
the threats are :
Celebrity name misuse
This is one of the most popular threat of social media many incidents of hackers is
registering the new account even on the name of celebrity. Fake account is being used to spread
the misinformation and rumours so that they can attract the new followers that can be spammed
later. The gravity in these threats lies that hackers can use social media so that they can extract
the personal information and later they misuse it (Gunitsky, 2015).
Spreading spam and malware
As Facebook is the social networking sites is often used to spread the malware. Growing
popularity of short URLs give rise to many social media threats. As cyber criminal is often mask
to the link by making the short URL as it is difficult for the user to identify that whether it is
being pointing to the legitimate as well as malicious site. This threat is considered as the real
possibility for social bookmarking and to the micro belonging sites and spread the link as well as
news in very short span of time.
1
Cyber Threats in Social Media Technologies_3
Targeted phishing attacks
Such attacks is being created and carried out to steal the money as well as confidential
information as it is in the case of hydra q attacks that is being happened due to the criticl
information is being leaked. As the Social media threat is one of the example of social
engineering tactics, whereby attackers exploit fear and anxiety, instead of system vulnerability to
get users to part with their money. As these attacks is very specific and targeted, having chances
of success is higher.
Confidential information leak
It is the scariest threat of Facebook where the employees start revealing as it seems
uncritical technical information to public as Facebook stated that the user is fed up in configuring
for the particular firewall of product at work this indicates that the user is fed up in configuring a
particular firewall. An attacker can use this information to identify the security of software of
user and company as well.
Site Compromise
As the attacker compromise the social networking site from the code that is malicious
than any visitor of the site can suspect to attack. Hackers also find the ways so that they insert
malicious code to advertisements and can create the rogue third-party applications, from that the
users and ultimately compromise their computers or gather their personal information.
Fake accounts
Fake account can actively push for the request connection to random people, that most
people is being accepted without even knowing that who is that fictitious woman. The
seriousness of having this social media threats is getting underscored when one considered that
having the fake account in this case is successful while connecting to hundreds of people from
several organisations that includes military, government and security firms.
Social engineering
In today world this social engineering is one of the most prevalent social media threats
and also the most popular tactic for cyber criminals. Social media platforms allows the attackers
to find personal information so that it can be used to target specific individuals. They use the
information of the employees and their profiles to make the fake account or can take the personal
2
Cyber Threats in Social Media Technologies_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
IS Security and Risk Management Assignment PDF
|10
|3410
|84

Social Media Security Threats and Practices for Secure Social Enterprise Networking System
|4
|942
|274

Network Security Threats and Control Measures for Open University Malaysia
|10
|3121
|88

Identified Vulnerabilities and Preventive Measures for Social and Operational Threats
|2
|642
|189

Importance of Privacy in Instagram Privacy Name of the Student Name
|8
|377
|457

Cybercrime: Motivations, Consequences, and Current Defence
|9
|3137
|159