Escolar Documentos
Profissional Documentos
Cultura Documentos
Media
Security
An
Introduction
Tapti
Datta
new friend really might be able to help with if you would only give him a password to gain access to a protected file on your corporate network. Just this once! Social networking sites Sometimes hackers go right to the source, injecting malicious code into a social networking site, including inside advertisements and via third-party apps. On Twitter, shortened URLs (popular due to the 140-character tweet limit) can be used to trick users into visiting malicious sites that can extract personal (and corporate) information if accessed through a work computer. Twitter is especially vulnerable to this method because it's easy to retweet a post so that it eventually could be seen by hundreds of thousands of people. Employees You knew this was coming, but even the most responsible employees have lapses in judgment, make mistakes or behave emotionally. Nobody's perfect all of the time. Organizations need to consider employee behavior when developing their approach to social media policies and practices. Lack of a social media policy Without a social media policy for your enterprise, you are inviting disaster. You can't just turn employees loose on social networking platforms and urge them to "represent." You need to spell out the goals and parameters of your enterprise's social media initiative. Otherwise you'll get exactly what you're inviting - chaos and problems. Two more imperatives related to social media policy: 1) Organizations must conduct proper training for employees, if only to clear up issues regarding official social media policies, and 2) A social media initiative needs a coordinator and champion. And that means a social media manager.
generic design of an application development model, which makes the malicious applications look authentic. Exploitation of URL Shorteners and Hidden Links - Although URL shortening services, are used for URL optimizations in which a URL is compressed; this same tactic has been adopted by attackers to fool users because it is difficult to determine the actual URL of a compressed URL.
Conclusion
Social networks have given birth to new types of elemental relations among various entities in the online world. The social networking world is virtualized in nature, but it has real-time impacts on the lives of individuals. Since these networks are part of the online world, they are not untouched by the threats and flaws present on the World Wide Web. Security and privacy are considered basic elements for effective social networking; however, the aim of web malware is to infect users and steal information by exploiting various vulnerabilities through attacks in social networks. User ignorance is a big factor in the spread of malware and is quite hard to patch. It is hard to expect robustness from a users perspective; rather, it has to be an inbuilt nature of social networking web sites. References: ISACA.org, networkworld.com