|
Chapter Four: Social Media Threat in Cyberspace .......................................................................................... 5513755 Zeebaree 2020 E R (1)Chapter Four: Social Media Threat in Cyberspace .......................................................................................... 55
4.1
Preamble ................................................................................................................................................ 55
4.2
Threats in cyberspace due to social media ............................................................................................. 55
4.2.1
Worms ........................................................................................................................................ 55
4.2.2
Targeted phishing attacks .......................................................................................................... 56
4.2.3
Data leaks ................................................................................................................................... 56
4.2.4
Shortened links ........................................................................................................................... 56
4.2.5
Fake accounts ............................................................................................................................. 57
4.2.6
Rogue third-party applications ................................................................................................... 57
4.2.7
Identity theft .............................................................................................................................. 58
4.2.8
Scams .......................................................................................................................................... 59
4.3
Reviewing existing security policies ........................................................................................................ 60
4.4
Threat intelligence .................................................................................................................................. 64
4.5
Proposed framework .............................................................................................................................. 68
4.6
End user awareness ................................................................................................................................ 71
4.6.1
Limit personal information ......................................................................................................... 72
4.6.2
Do not overshare sensitive details ............................................................................................. 72
4.6.3
Strong passwords ....................................................................................................................... 73
4.6.4
Not clicking on suspicious links .................................................................................................. 73
4.6.5
Identifying targeted phishing attempts ...................................................................................... 74
4.6.6
Managing accidental disclosures ................................................................................................ 75
4.6.7
Using privacy settings ................................................................................................................. 75
4.7
Recovery ................................................................................................................................................. 76
4.7.1
From spamming .......................................................................................................................... 76
4.7.2
From malware ............................................................................................................................ 76
4.7.3
From identity theft ..................................................................................................................... 77
4.7.4
From sensitive information disclosure ....................................................................................... 77
4.8
Conclusion .............................................................................................................................................. 77
Dostları ilə paylaş: |
|
|