FIS Unit 5
FIS Unit 5
Social media has become an integral part of modern society, allowing people to
connect, share, and communicate with one another on a global scale. While it
offers numerous benefits, it also poses various security challenges.
Social media refers to online platforms and technologies that enable users to
create, share, and exchange content in the form of text, images, videos, and links.
Popular social media platforms include Facebook, Twitter, Instagram, LinkedIn,
Snapchat, and many more. Social media facilitates social networking, content
sharing, and communication, making it an essential tool for personal,
professional, and business use.
What is social media security?
Social media security refers to the measures businesses and individuals take to
protect the privacy, confidentiality and information of their social media
accounts.
Data Mining: We all leave a data trail behind on the internet. When
someone creates a new social media account and provides details such
as date of birth, name, location, and personal habits, and without our
knowledge, all these data are leveraged and shared with third-party for
targeting advertising. It can cause security concerns as third-party may
collect real-time updates on the user’s location.
Virus and Malware Attacks: Malware and viruses quite often find a
way into the computer system through annoying ads. Once gaining
access to the network, the attacker steals confidential data or causes
complete disruption to the computer system. This often causes the loss
of all kinds of data – personal, professional, financial, etc.
Cont...
Legal Issues: There are legal risks associated with the use of social
media, like posting offensive content towards any individual, community,
or country. Often, legal actions can be and are taken when such offensive
posts are made and uploaded by any individual or organization.
Risks & Challenges
Identity Theft: As millions share their personal information to get registered on one or
more social media platforms, this data becomes vulnerable as hackers and identity
thieves use this information to reset passwords, apply for loans, or other malicious
objectives.
Romance Scams: A romance scam is a fraudulent scheme in which a swindler pretends
romantic interest in a target, establishes a relationship, and then attempts to get
money or sensitive information from the target under pretenses.
Whistle-blowers: People are often impulsive on social media; they show their vexation
with their colleagues or bosses without thinking. They may deliberately reveal sensitive
data in their posts, which can cause significant damage to the reputation of the
organization.
Cont...
Cyber Stalking: It refers to harassment over the internet. Cyberstalkers harass
victims on social media by sending unpleasant and lewd messages. They
morph photos of victims and circulate them on social media, alleging rumors
making the victim’s life unbearable.
Cyber Bullying: It refers to bullying through the digital medium. It can take
place on social media, gaming, and messaging platforms. It is aimed at scaring,
shaming, or annoying the targeted victim.
Cyber Terrorism: Nowadays, social media is also used to facilitate terrorism-
related activities. It can support, promote, engage, and spread terrorism
propaganda like incitement to terrorism, recruitment, radicalizing training,
and planning of terrorist attacks.
Cont...
Connect our devices only to authorized wifi access, use privacy options provided
by various mobile operating systems, use auto-lock features, and download
apps only from authorized app stores.
Keep the operating system updated with the latest patches, turn on the
firewall, and avoid installing cracked software.
Ensure our antivirus is updated and scans are performed frequently.
We need to be smart using the internet and avoid visiting untrusted websites;
referral links to visit websites are never to be clicked; instead, type in the
browser’s URL address.
We must accept friend requests only from people we know and block those
who post upsetting content or comments.
The most common social media security risks
One common phishing scam involves fake coupons for big-name brands
like Costco, Starbucks, and Bath & Body Works. This is especially popular
on Facebook. To claim the coupon, you have to hand over personal
information like your address and birth date.
Source: Facebook
Some scammers are bolder, asking for banking information and passwords
for a coupon processing fee.
For Americans aged 20 to 39, social media is the most common contact
method for scammers.
Malware attacks and hacks
In one of the more embarrassing recent social media cyber security
incidents, the personal Twitter account of the U.S. Ambassador at
Large for Cyberspace & Digital Policy was hacked in February:
“If you give these apps your login information, whether with an access
token or by giving them your username and password, they can gain
complete access to your account. They can see your personal messages,
find information about your friends, and potentially post spam or other
harmful content on your profile. This puts your security, and the security of
your friends, at risk.”
Password theft
Those social media quizzes that ask about your first car might seem like harmless
fun. But online social media challenges and quizzes are a common method
for gathering password information or gaining personal details that are often
used as forgotten password clues.
Those concerns, of course, don’t stop people from using their favorite social
channels. The number of active social media users grew 4.2% in 2022 to 4.74
billion people.
Make sure you – and your team – understand the privacy policies and
settings for both your personal and business accounts. You should provide
privacy guidelines for employees who use their personal social accounts at
work.
Unsecured mobile phones
Mobile devices account for more than half the time we spend online. Social
media apps make it easy to access your social media accounts with just one tap.
That’s great as long as your phone stays in your own hands. But if your phone,
or an employee’s phone, is lost or stolen, one-tap access makes it easy for a
thief to access social accounts. Then they can post to your account, or even
message your connections with phishing or malware attacks.
This will help protect you not only from social media and cyber security threats, but from bad PR or legal
trouble as well.
At minimum, the security section of your social media policy should include:
These training sessions are also an opportunity to review the latest threats on
social. You can talk about whether there are any sections of the policy that need
updating.
It’s not all doom and gloom. Social media training also equips your team to use
social tools effectively. When employees understand best practices, they feel
confident using social media for their work. They’re then well-equipped to use
social media safely for both personal and professional purposes.
4. Limit access to increase social media data security
Limiting access to your social accounts is the best way to keep them secure.
You might be focused on threats coming from outside your organization.
But employees are a significant source of data breaches.
You may have whole teams of people working on social media messaging,
post creation, or customer service. But that certainly doesn’t mean that
everyone needs to know the passwords to your social accounts.
It’s critical to have a system in place that allows you to revoke access to
accounts when someone leaves your organization or changes roles. Learn
more about how this works in the Tools section below.
5. Set up a system of approvals for social posts
Not everyone who works on your social accounts needs the ability to post.
It’s an important defensive strategy to limit the number of people who can
post on your accounts. Think carefully about who needs posting ability and
why.
You can use Hootsuite to give employees or contractors the ability to draft
messages. Then, they’re all set to post at the press of a button. Leave that
last button press to a trusted person on your team.
6. Put someone in charge
Assigning a key person as the eyes and ears of your social presence can go a long way
towards mitigating risks. This person should:
This is the person team members should turn to if they ever make a mistake on social
that might expose the company to risk of any kind. This way the company can initiate
the appropriate response.
7. Set up an early warning system with social media security
monitoring tools
Keep an eye on all of your social channels. That includes the ones you use
every day as well as the ones you’ve registered but never used at all.
Assign someone to check that all the posts on your accounts are legitimate.
Cross-referencing your posts against your content calendar is a great place to
start.
Cont…
Follow up on anything unexpected. Even if a post seems legitimate, it’s worth
digging into if it strays from your content plan. It may be simple human error. Or,
it may be a sign that someone has gained access to your accounts and is testing
the water before posting something more malicious.
imposter accounts
inappropriate mentions of your brand by employees
inappropriate mentions of your brand by anyone else associated with the
company
negative conversations about your brand
You can learn how to monitor all the conversations and accounts relevant to your
brand in our complete guide to social media listening. And check out the Tools
section below for information on resources that can help.
8. Regularly check for new social media security issues
Social media security threats are constantly changing. Hackers are always
coming up with new strategies, and new scams and viruses can emerge at any
time.
Your digital assets have the same — if not more — value. They hold the
keys to your identity. Yet you share information online every day.
You post on social media, sign up for newsletters, and log in to online
banking portals. And in the absence of thoughtful digital security, any
errant sensitive information could be quietly inviting identity theft.
Cont...
10. Mobile Device Security: Protecting mobile devices with strong PINs,
biometric authentication, and installing apps only from official app stores.
12. User Awareness and Training: Educating users about common threats,
social engineering, and best practices for staying safe online.
Cyber Security Tools
1. Splunk
Splunk is an extensive cybersecurity software that can monitor network security.
It is used to conduct both real-time network monitoring and threat data
searches. It possesses a streamlined user interface for acquiring, indexing and
assembling data and generating real-time alerts, summaries, dashboards and
infographics.
2. Metasploit
Experts use Metasploit to achieve a variety of security goals, like identifying
system vulnerabilities, increasing computer system security, building cyber
defence tactics and conducting security assessments. This tool can evaluate
different systems, such as web-based apps, servers and networks. It can detect
security problems as soon as they appear, ensuring that your security is always
up to date.
Cyber Security Tools
9. Acunetix
Acunetix is an intuitive tool that enables businesses to protect their web
applications from data breaches. It detects and monitors web security
concerns and assists security experts in resolving them quickly. It is also
possible to automatically detect out-of-band vulnerabilities and audit complex
applications with this tool.
Cyber Security Tools
5. Kali Linux
This is a penetration testing tool that software testers employ to look for
weaknesses in their IT systems. You can use this tool during IT system audits to
assess the penetrability of a network or firewall system. Network administrators
can use it as an administration tool to monitor a network system from a single
device rather than installing the software on each device manually. It is a versatile
program because it can observe the tools used on a network while also examining
the hosts.
6. Wireshark
Wireshark is open-source network software that can analyse network protocols in
real-time and improve security. It is a console-based password auditing and packet
sniffer tool you can use to audit passwords, networks and packet pathways.
Cybersecurity specialists utilise this program to collect data packets and analyse
the properties of those packets, which aids in the detection of network security
flaws.
Cyber Security Tools
7. Snort
Snort is an open-source network security software that can scan networks and
prevent infiltration. Security professionals use it to conduct network traffic
analysis designed to check traces of suspected breaches. It notifies users of
intrusions and protects them by blocking malicious communications. It can also
conduct protocol assessments, recognise attacks on a system and search for
data gathered from traffic.
. TotalAV
TotalAV Antivirus provides comprehensive protection for all of your personal
and office devices in a single, easy-to-use computer and mobile application. It
protects against ransomware, malware, spyware and adware in real-time. It
also improves battery life by reducing background processes, improving startup
time and clearing junk files.
Cyber Security Tools
1. Firewalls:
- Firewall Appliances: Hardware-based devices that filter network traffic
to block or allow data packets based on predefined security rules.
- Firewall Software: Software-based solutions that provide network
security by filtering traffic at the operating system or application level.
5. Vulnerability Scanners
- These tools scan systems and networks to identify weaknesses and
vulnerabilities that could be exploited by attackers.
Cyber Security Tools
6. Encryption Tools:
- Encryption software and hardware tools protect data at rest and in transit,
ensuring that it remains confidential and secure.
3. Access Control:
- Define access control measures, including user authentication,
authorization, and least privilege principles to restrict access to sensitive
information.
4. Network Security:
- Implement firewalls, intrusion detection and prevention systems, and
encryption to protect data in transit and at rest.
5. Endpoint Security:
- Secure devices such as computers, smartphones, and IoT devices through
antivirus software, patch management, and mobile device management
(MDM) solutions.
Cont…
2. Risk Assessment:
- After identifying potential risks, the next step is to assess them. This
involves determining the likelihood of each risk occurring and the potential
impact it could have on the organization's assets, operations, reputation,
and financial health. Risks are typically assessed on a scale, often from low to
high, based on their severity and likelihood.
3. Risk Analysis:
- Risk analysis involves quantifying and measuring identified risks, typically
using methodologies such as risk matrices, risk scoring, or other risk
assessment models. The goal is to assign numerical values to risks, which can
help prioritize them.
Cont…
4.Risk Prioritization:
- Once risks are quantified and assessed, they can be prioritized based on their
significance. Risks that pose the highest potential impact and likelihood receive
top priority for mitigation and management efforts.
5. Risk Mitigation:
- After prioritization, organizations develop strategies to mitigate or manage the
most critical risks. This may involve implementing security measures, controls,
and best practices to reduce the likelihood and impact of identified risks.
6. Risk Acceptance:
- Some risks may be deemed acceptable, particularly if the cost of mitigation
outweighs the potential impact. In such cases, organizations formally accept the
risks while maintaining awareness and monitoring.
Cont…
9. Adaptive Strategy:
- Cybersecurity is dynamic, so organizations must adapt their strategies as
the threat landscape evolves. Regularly reviewing and updating the risk
assessment and mitigation strategies is crucial.
2. Risk Assessment: Identify potential security risks and vulnerabilities within the
organization's digital assets, including data, applications, and systems.
Cont…
- Gap Analysis: Identify areas where the organization falls short of compliance
requirements and develop plans to address these gaps.
DO’S
• Create strong passwords that are at least eight characters long, and including at
least a numerical value and a symbol, such as #, to foil password-cracking
software. Avoid common words, and never disclose a password online.
• Change your password every ninety days.
• Perform regular backups of important data.
• Create a password for your files in order to protect file sharing activities.
• Physically secure your laptop
• Delete any message that refers to groups or organizations that you are not a
part of.
• Download and install software only from online sources you trust.
• Never click on a link from an untrusted source.
Cont…
DON’TS
• Never write down your password. Especially on a Post-It note stuck to your
computer!
• Never give out your password to anyone, whether you know them or not.
• Never select the "Remember My Password" option. Many applications do not
store them securely.
• Never purchase anything promoted in a spam message. Even if the offer isn’t
a scam, you are only helping to finance and encourage spam.
• Please refrain from opening an e-mail attachment, even from someone you
know well, unless you were expecting it.
Cont…
• Avoid creating common passwords such as your name, social security, UNI,
etcetera.
• Do not leave your laptop unattended, even for a few minutes.
• Never reply to e-mail(s) requesting financial or personal information.
• Avoid opening e-mail(s) or e-mail attachments from an unknown sender.
• Please refrain from clicking on the close button within pop-up ads.
• Under no circumstances should you install or use pirated copies of software.
• Do not install P2P file sharing programs which can illegally download
copyrighted material.
• Never set your e-mail program to "auto-open" attachments.
Dos and Don'ts of Information Security Awareness
Computers are indispensable learning tools nowadays, and it is of utmost
importance to understand how to secure the computers, the data, and other
electronic devices. Below are some tips to help raising the awareness against
information leakage and IT security attacks.
General
People is the weakest link in information security as in many cases the
leakage can be avoided if the person involved can have better knowledge in
data protection. Users are recommended to develop information security
mindset, build and reinforce good practice through regular updates of
information security awareness.
Computer/Data Usage