Download presentation
Presentation is loading. Please wait.
Published byStuart Baldwin Modified over 9 years ago
2
An Insight into the Relationship Between Social Media and the Susceptibility to Malicious Intent Presented by Rebecca Morgan 15/05/2015 >>>>2
3
Social Media 15/05/2015Rebecca Morgan3 Social Media Facebook Twitter Google + LinkedIn Instagram Tumblr Peer to Peer communications Skype Email Mobile SMS Instant messaging The Media Newspapers Magazines New sites Radio TV
4
Facebook Most popular social media site Facebook is growing everyday 1.44 billion active users 20% of the worlds population Creation of the information era Database of personal data 15/05/2015Rebecca Morgan4
5
15/05/2015Rebecca Morgan5
6
15/05/2015Rebecca Morgan6
7
Terminology “What’s on your mind?” 15/05/2015Rebecca Morgan7 Location details
8
Why does Facebook need the data? Data as a form of currency Worth $200 billion (September 2014) Net worth $33.3 billion (July 2014) 15/05/2015Rebecca Morgan8 Users Data Target adverts Money
9
Investigations Use of Social media in investigation 15/05/2015Rebecca Morgan9
10
Investigations Metropolitan Police 1207 crimes reported involving Facebook 2014 Source of intelligence Data collection Location of crime Online threats Facility crime Grooming 15/05/2015Rebecca Morgan10
11
Intelligence 15/05/2015Rebecca Morgan11 Public available information (BBC News, 2015)
12
Types Identify token theft Identify fraud Phishing Spear-Phishing Selling Collection 15/05/2015Rebecca Morgan12
13
Data Mining Collection of personal information Combination of Data Third party applications Graph search FBStalker 15/05/2015Rebecca Morgan13
14
15/05/2015Rebecca Morgan14
15
Graph search 15/05/2015Rebecca Morgan15
16
Third party applications Kali Linux Maltego Open source tool used to determine real world links DMitry Deep magic Information Gathering Tool Google Chrome extension Facebook Friends Mapper Shows full friends lists even when hidden 15/05/2015Rebecca Morgan16
17
A few Examples 15/05/2015Rebecca Morgan17
18
Trustwave test Used Facebook to get a password, of a public figure Result Identified Wife Public likes – ran a studio Sent Phishing emails Wife opened email attachment Malicious Software Access to Apple Key chain – stores passwords 15/05/2015Rebecca Morgan18
19
Phishing examples 15/05/2015Rebecca Morgan19 The address of clicking play: huxiaoling.com/alludes.php Effect: PC - Download malware Address behind the button/link: static.ak.fbcdn.net westernvn.com Effect: Get users password Malware
20
15/05/2015Rebecca Morgan20
21
Rebecca Morgan2115/05/2015
22
Rebecca Morgan22
23
15/05/2015Rebecca Morgan23
24
15/05/2015Rebecca Morgan24
25
Offline use Open bank accounts Obtain Credit Cards, loans and benefits Take over existing accounts Mobile phone contracts Documents – passport, driving license 15/05/2015Rebecca Morgan25
26
Protection Making use and understand security measures in place 15/05/2015Rebecca Morgan26
27
Security and Privacy settings Security settings: Two way authentication Privacy settings Only me Friends Friends of Friends Public (Global) 15/05/2015Rebecca Morgan27
28
15/05/2015Rebecca Morgan28 Audience Distribution
29
15/05/2015Rebecca Morgan29
30
Privacy Check-up 15/05/2015Rebecca Morgan30
31
Privacy Check - up 15/05/2015Rebecca Morgan31
32
Deleting options Individual posts Activity log Accounts Deactivating – not deleted Deleting – takes 30 days 15/05/2015Rebecca Morgan32
33
Other Social Media All social media sites are increasing These methods can be applied to all types Data from multiple sites can be combined Search engines –names 15/05/2015Rebecca Morgan33
34
Searching a person Using a web search engine such as google Enter a persons name, possible results LinkedIn Twitter 192.com Google + Facebook Company Checker Name Encyclopaedia Online Donations Academia.edu 15/05/2015Rebecca Morgan34
35
Effects Users need to educated now and in the future Facebook advertise but not enough But users need to take responsibility for their own data Balance between using the site and distributing data 15/05/2015Rebecca Morgan35
36
Reporting Victims of malicious actives have a tendency to stay quiet Action Fraud site National Fraud Intelligence Bureau 15/05/2015Rebecca Morgan36
37
Future of Facebook Graph Search Social Media site or colossal database of personal information? Continual growth 20% of the world in 11 years Increase Cybercrime reported 15/05/2015Rebecca Morgan37
38
Conclusions Individuals need to take responsible for the distribution for their own data. Privacy and Security settings need to be implemented to restrict access to the data. Incidents need to be reported The way Facebook is used is changing 15/05/2015Rebecca Morgan38
39
Questions? Thank you for attending! 15/05/2015Rebecca Morgan39
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.