logo

Identified Vulnerabilities and Preventive Measures for Social and Operational Threats

2 Pages642 Words189 Views
   

Added on  2019-09-23

About This Document

This article discusses the various types of social and operational threats such as profile cloning, brand impersonation, manipulation, phishing, and more. It also provides preventive measures to protect your system and data from these threats.

Identified Vulnerabilities and Preventive Measures for Social and Operational Threats

   Added on 2019-09-23

ShareRelated Documents
Identified Vulnerabilities:Profile Cloning: This type of threat is associated with social threats where social media accountof an individual is hacked by creating fake accounts and making users' to click on fake maliciouslinksBrand Impersonation: This type of social threat impersonates brands such as companies bypresenting false links of customer support to the users.Manipulation: Hackers create fake accounts in order to inflate clicks, likes and shares on socialmedia so as to manipulate the user to believe on a perception.Bots: Attackers usually use software to create a function to automatically spread malicious links.Phishing: A fraudulent act to acquire sensitive information relevant to the account. Thisinformation includes usernames, passwords, credit card details, etc.Employees Errors: A kind of Operational threat that occurs when errors are done by employeeswhile operating the system and applications. System failure: A kind of Operational threat that occurs when entire system or a part of systemfails.Virus: A virus is a computer program that can infect all the computers on which it is executed. Itaffects the data as well as applications on the computerWorm: A worm is a type of virus that does not alter any data on computer but duplicates files somany times that it runs out of hard disk storage.Trojan: Trojan horses are computer programs that pretend to be the safe applications but offersremote access of your computer to hackers.Spyware: Spyware as name suggests spies on user and collects account details such asusername, passwords and sends it to the hackers.Spam: Spam consumes unnecessary bandwidth being presented as an advertisement at user'send.Adware: Similar to spyware, adware collects user information but in purpose to targetadvertisements.Rootkits: Rootkits are one of the most dangerous threats to system since they start when thesystem boots up that is before the antivirus starts. Its intent is to collect user specific sensitiveinformation.
Identified Vulnerabilities and Preventive Measures for Social and Operational Threats_1

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Assignment on Risks and Risk Management
|11
|781
|13

Software Security: Importance, Techniques and Limitations
|9
|2795
|469

Malicious Software Protection Policy
|6
|1728
|181

Networking: Malicious Attacks, Social Engineering, Information Security Risks, Network Auditing, and Risk Assessment Management
|10
|3587
|73

Cyber-Security in Shipping Industry: Ransomware and Malware
|9
|1431
|233

Ransomware Attack and its Impact
|13
|2416
|74