Cybersecurity Challenges in Social Media Erdal Ozkaya



Yüklə 1,17 Mb.
Pdf görüntüsü
səhifə46/73
tarix10.12.2023
ölçüsü1,17 Mb.
#139643
1   ...   42   43   44   45   46   47   48   49   ...   73
13755 Zeebaree 2020 E R (1)

4.7.2
 
From malware 
When a malware infects a user’s computer due to the user clicking on malicious links 
or downloading malicious files, the best way to recover is by using an end-host security 
program. If the computer did not have one or it was not active, it is best to get it running and 
also updated. Most antivirus companies will keep updating their software to be able to handle 
these kinds of attack vectors. If it is too late and the malware has done some damage, such as 
theft of data and damage to files, it is best to clean up the whole system by formatting and 
reinstalling backups. Also, any login credentials stored on browsers might have to be 
changed. 


77 
4.7.3
 
From identity theft 
It is common for identity theft to occur especially when the attackers are able to take 
control of a user’s account by stealing the actual credentials and changing the passwords. The 
best way to recover the account is by trying to recover the account with the ‘forgot password’ 
option. This may lead to a point that requires the account to be re-authenticated with 
information such as real ID card, which the hackers may lack but the real user will have. If 
everything fails, it is best to write an email to the social media platform. 
4.7.4
 
From sensitive information disclosure 
There is a common saying that the Internet does not forget and this is something that a 
user should always be mindful of. If some sensitive information has accidentally gotten to 
social media, it is best to remove it upon discovery. This may prevent people with malicious 
motives from accessing this information. 
4.8
 
Conclusion 
This chapter has looked at the security cyberspace of social media networks. It has 
discussed the different types of threats that users on social media face. These threats emanate 
from the information they share on their bio, the posts they make, the messages they receive, 
and the shared links they click on. The existing security policies in different organizations 
have been reviewed. Their intents, accomplishments, and failures have also been discussed. A 
tactical threat intelligence for the discussed social media threats has been created and 
discussed. To deal with threats, a framework has been established that can be applied by 
organizations to reduce the risks that they and their employees face from social media. A 
practical solution on putting an end to the issue of users falling victim to social media threats 
is end-user awareness. This chapter has delved into it and given several points on what users 


78 
should be made aware of. Lastly, a recovery process has been discussed to help users recover 
in the unfortunate scenario where they have fallen victim to social media threats. 


79 

Yüklə 1,17 Mb.

Dostları ilə paylaş:
1   ...   42   43   44   45   46   47   48   49   ...   73




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©muhaz.org 2024
rəhbərliyinə müraciət

gir | qeydiyyatdan keç
    Ana səhifə


yükləyin