4.7.2
From malware
When a malware infects a user’s computer due to the user clicking on malicious links
or downloading malicious files, the best way to recover is by using an end-host security
program. If the computer did not have one or it was not active, it is best to get it running and
also updated. Most antivirus companies will keep updating their software to be able to handle
these kinds of attack vectors. If it is too late and the malware has done some damage, such as
theft of data and damage to files, it is best to clean up the whole system by formatting and
reinstalling backups. Also, any login credentials stored on browsers might have to be
changed.
77
4.7.3
From identity theft
It is common for identity theft to occur especially when the attackers are able to take
control of a user’s account by stealing the actual credentials and changing the passwords. The
best way to recover the account is by trying to recover the account with the ‘forgot password’
option. This may lead to a point that requires the account to be re-authenticated with
information such as real ID card, which the hackers may lack but the real user will have. If
everything fails, it is best to write an email to the social media platform.
4.7.4
From sensitive information disclosure
There is a common saying that the Internet does not forget and this is something that a
user should always be mindful of. If some sensitive information has accidentally gotten to
social media, it is best to remove it upon discovery. This may prevent people with malicious
motives from accessing this information.
4.8
Conclusion
This chapter has looked at the security cyberspace of social media networks. It has
discussed the different types of threats that users on social media face. These threats emanate
from the information they share on their bio, the posts they make, the messages they receive,
and the shared links they click on. The existing security policies in different organizations
have been reviewed. Their intents, accomplishments, and failures have also been discussed. A
tactical threat intelligence for the discussed social media threats has been created and
discussed. To deal with threats, a framework has been established that can be applied by
organizations to reduce the risks that they and their employees face from social media. A
practical solution on putting an end to the issue of users falling victim to social media threats
is end-user awareness. This chapter has delved into it and given several points on what users
78
should be made aware of. Lastly, a recovery process has been discussed to help users recover
in the unfortunate scenario where they have fallen victim to social media threats.
|