Presentation is loading. Please wait.

Presentation is loading. Please wait.

An Insight into the Relationship Between Social Media and the Susceptibility to Malicious Intent Presented by Rebecca Morgan 15/05/2015 >>>>2.

Similar presentations


Presentation on theme: "An Insight into the Relationship Between Social Media and the Susceptibility to Malicious Intent Presented by Rebecca Morgan 15/05/2015 >>>>2."— Presentation transcript:

1

2 An Insight into the Relationship Between Social Media and the Susceptibility to Malicious Intent Presented by Rebecca Morgan 15/05/2015 >>>>2

3 Social Media 15/05/2015Rebecca Morgan3 Social Media Facebook Twitter Google + LinkedIn Instagram Tumblr Peer to Peer communications Skype Email Mobile SMS Instant messaging The Media Newspapers Magazines New sites Radio TV

4 Facebook Most popular social media site Facebook is growing everyday 1.44 billion active users 20% of the worlds population Creation of the information era Database of personal data 15/05/2015Rebecca Morgan4

5 15/05/2015Rebecca Morgan5

6 15/05/2015Rebecca Morgan6

7 Terminology “What’s on your mind?” 15/05/2015Rebecca Morgan7 Location details

8 Why does Facebook need the data? Data as a form of currency Worth $200 billion (September 2014) Net worth $33.3 billion (July 2014) 15/05/2015Rebecca Morgan8 Users Data Target adverts Money

9 Investigations Use of Social media in investigation 15/05/2015Rebecca Morgan9

10 Investigations Metropolitan Police 1207 crimes reported involving Facebook 2014 Source of intelligence Data collection Location of crime Online threats Facility crime Grooming 15/05/2015Rebecca Morgan10

11 Intelligence 15/05/2015Rebecca Morgan11 Public available information (BBC News, 2015)

12 Types Identify token theft Identify fraud Phishing Spear-Phishing Selling Collection 15/05/2015Rebecca Morgan12

13 Data Mining Collection of personal information Combination of Data Third party applications Graph search FBStalker 15/05/2015Rebecca Morgan13

14 15/05/2015Rebecca Morgan14

15 Graph search 15/05/2015Rebecca Morgan15

16 Third party applications Kali Linux Maltego Open source tool used to determine real world links DMitry Deep magic Information Gathering Tool Google Chrome extension Facebook Friends Mapper Shows full friends lists even when hidden 15/05/2015Rebecca Morgan16

17 A few Examples 15/05/2015Rebecca Morgan17

18 Trustwave test Used Facebook to get a password, of a public figure Result Identified Wife Public likes – ran a studio Sent Phishing emails Wife opened email attachment Malicious Software Access to Apple Key chain – stores passwords 15/05/2015Rebecca Morgan18

19 Phishing examples 15/05/2015Rebecca Morgan19 The address of clicking play: huxiaoling.com/alludes.php Effect: PC - Download malware Address behind the button/link: static.ak.fbcdn.net westernvn.com Effect: Get users password Malware

20 15/05/2015Rebecca Morgan20

21 Rebecca Morgan2115/05/2015

22 Rebecca Morgan22

23 15/05/2015Rebecca Morgan23

24 15/05/2015Rebecca Morgan24

25 Offline use Open bank accounts Obtain Credit Cards, loans and benefits Take over existing accounts Mobile phone contracts Documents – passport, driving license 15/05/2015Rebecca Morgan25

26 Protection Making use and understand security measures in place 15/05/2015Rebecca Morgan26

27 Security and Privacy settings Security settings: Two way authentication Privacy settings Only me Friends Friends of Friends Public (Global) 15/05/2015Rebecca Morgan27

28 15/05/2015Rebecca Morgan28 Audience Distribution

29 15/05/2015Rebecca Morgan29

30 Privacy Check-up 15/05/2015Rebecca Morgan30

31 Privacy Check - up 15/05/2015Rebecca Morgan31

32 Deleting options Individual posts Activity log Accounts Deactivating – not deleted Deleting – takes 30 days 15/05/2015Rebecca Morgan32

33 Other Social Media All social media sites are increasing These methods can be applied to all types Data from multiple sites can be combined Search engines –names 15/05/2015Rebecca Morgan33

34 Searching a person Using a web search engine such as google Enter a persons name, possible results LinkedIn Twitter 192.com Google + Facebook Company Checker Name Encyclopaedia Online Donations Academia.edu 15/05/2015Rebecca Morgan34

35 Effects Users need to educated now and in the future Facebook advertise but not enough But users need to take responsibility for their own data Balance between using the site and distributing data 15/05/2015Rebecca Morgan35

36 Reporting Victims of malicious actives have a tendency to stay quiet Action Fraud site National Fraud Intelligence Bureau 15/05/2015Rebecca Morgan36

37 Future of Facebook Graph Search Social Media site or colossal database of personal information? Continual growth 20% of the world in 11 years Increase Cybercrime reported 15/05/2015Rebecca Morgan37

38 Conclusions Individuals need to take responsible for the distribution for their own data. Privacy and Security settings need to be implemented to restrict access to the data. Incidents need to be reported The way Facebook is used is changing 15/05/2015Rebecca Morgan38

39 Questions? Thank you for attending! 15/05/2015Rebecca Morgan39


Download ppt "An Insight into the Relationship Between Social Media and the Susceptibility to Malicious Intent Presented by Rebecca Morgan 15/05/2015 >>>>2."

Similar presentations


Ads by Google