1 / 29

Abuses and Security of Social Media Sites

Users & Behaviors. Group: Kenie R. Moses - Rachel Sitarz - Scott Abney. Abuses and Security of Social Media Sites. Purdue University Spring 2011. Social internet TECH621. Social Media Apps and Usage. Users Behaviors: Beware of Media Apps. Scott Abney. Social Media App Intro.

jeroen
Download Presentation

Abuses and Security of Social Media Sites

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Users & Behaviors Group: Kenie R. Moses - Rachel Sitarz - Scott Abney Abuses and Security of Social Media Sites Purdue University Spring 2011 Social internet TECH621

  2. Social Media Apps and Usage Users Behaviors: Beware of Media Apps Scott Abney

  3. Social Media App Intro • Apple App Store has over 300,000 apps • Facebook is around 60,000 apps • Twitter just passed over 50,000 apps • 97% of social media users do not check apps or links for viruses

  4. Apple • App Store has over 100 millions users • User info hacked due to knockoffs off applications (Weather HD app) • Thuat Nguyen created 50 apps for app store, then charged up to $600 after hacking into over 400 iTunes accounts for furthering purchases on his other apps • Storm 8 created apps for online games that misconstrued what users were downloading, purchases ranged from $150-$1400

  5. Twitter • Around 200 million users on Twitter • Over 50% of tweets are sent from 3rd party applications • Common app that is used for hacking claims to increase subscribers • Security shield application

  6. Facebook • Between 500-600 million users • November 2010, over 60,000 people clicked on the ePrivacy app to try to see who viewed their profile • Hackers create fake Facebook login pages from apps • Early January 2011, Facebook allows apps to view both home and phone number on profiles

  7. Example Fake Facebook Login

  8. What Can You Do???? • Research applications before adding them • Never give out any private information • Check security settings on your social network • www.facecrooks.com

  9. Social Media Usage and Security Users Behaviors: How Secure Are You? Kenie R. Moses

  10. Social Network Usage • Nearly 20% of Internet users are tweeting on Twitter or using another service to share personal and business updates, or to see updates about others • 66% of LinkedIn users are decision makers or have influence in the purchase decisions at their companies • In 2011, 70+ Percent of Marketers Will Be Using Social Media

  11. Social Network Usage Continued • 54% percent of the companies studied have at least one Facebook Fan page • 72% of companies plan to invest more in social networks • 79% of the largest fortune 500 firms use Twitter, to communicate with customers or employees • 80% of companies are planning to use social networks to find or attract candidates

  12. Social Network Data Leakage • 17% of US companies investigated the exposure of confidential information via a posting to a social networking sites • 13% of US companies investigated the exposure of confidential, sensitive or private information via Twitter • 54% of ClOs said their firms do not allow employees to visit social networking sites for any reason while at work.

  13. Social Networking Pitfalls • 48% have no worries about the security of social networking sites • 46% of Facebook users feel there are security and privacy risks. • 34% have seen somebody else’s phone number posted on a social • networking site. • 9% have included their phone number and 5% have included • their on social networking sites visible to friends. • 25% have discussed holiday plans “wall-to-wall” outside their page

  14. Viruses and Hacking Techniques Used on Social Media Sites 10 1.) Koobface- Virus that steals sensitive data and sends Trojan viruses to contacts of infected 2.) Mikeyy Worm- Virus that activates upon clicked links and sends out messages to contacts. 3.) Acai Attack- Virus that activates once the ad for Acai Berry juice is clicked infecting with Malware. 4.) Facebook Phishing- Coaxes users to give up valuable log-in info on a fake log-in screen. 5.) Twittercut- Virus that promise user over 1000 loyal followers. Once clicked, installs Trojan virus. 9 8 1 7 6 5 2 4 3 1-Facebook 2-MySpace 3-Twitter 4-Bebo 5-U-Tube 6-WAYN 7-Flicker 8-Last FM 9-LinkIn 10-Other

  15. Social Media Abuse and Misuse User Behaviors: Deviant Activities Rachel Sitarz

  16. Introduction • Pornography Internet trends • Deviant behavior: Child Pornography (CP) usage • Predatory behaviors • Victimization of children

  17. Pornography Usage • Multi-billion dollar industry (Ferraro & Casey, 2005) • $97 billion worldwide • $13 billion in the US alone • Every second, $3,075.64 is being spent • 28,258 are viewing pornography every second • 372 Internet users are typing adult search terms into search engines • 39 minutes new pornography is made in US

  18. Pornography Usage Continued • Sex is the most searched topic, with one-third of all internet user visiting some form of sexually related site regularly • Anonymity, cheap, easily accessed, avoid social embarrassment, instant gratification, easily hidden

  19. Pornography Pages By Country Country Porn Pages: • United States 244,661,900 • Germany 10,030,200 • United Kingdom 8,506,800 • Australia 5,655,800 • Japan 2,700,800 • The Netherlands 1,883,800 • Russia 1,080,600 • Poland 1,049,600 • Spain 852,800

  20. Pornography Stats • 40 million U.S. adults regularly visit Internet pornography • 20% of men admit accessing pornography at work • 70% of women keep their online activities secret • 10% of adults admit to Internet sexual addition • 17% of women admit to struggling with pornography addiction

  21. Child Pornography Online • Child pornography isn't new, it’s easier to access without as many social and legal risks • Some statistics estimate that 1.5 million children have been and currently are being exploited • Multi-billion dollar industry with estimated 100,000 child pornography websites • “Golden Age of Child Pornography”

  22. Child Pornography Continued • Child pornography is one of the fastest growing businesses online • Content is continually getting worse and more graphic • 58% of CP websites are made in US

  23. Online Predators • 644,865 Registered Sex Offenders in the US (many unregistered) • 80 % of offenders were explicit about their intentions with youth • 73 % of online crimes, teens go to meet the offender on multiple occasions for multiple sexual encounters

  24. Distribution of CP Online

  25. Youth Victimization • Approximately 1 in 6 youth online (10 to 17-years-old) received a sexual solicitation or approach over the Internet. • 4% received an aggressive sexual solicitation – meeting, phone call, gifts • 34% had an unwanted exposure to pornography • 27% of the youth who encountered unwanted pornography told a parent or guardian • Research indicates that 1 in 5 girls and 1 in 10 boys will be sexually victimized before adulthood

  26. Meet 10 year-old Becky’s new 12 year-old online friend.

  27. Source References 1.) http://information-security-resources.com/2009/08/17/top-8-social-media-security-threats/ 2.) http://socialmediasecurity.com/ 3.) http://www.fastcompany.com/1563867/the-5-biggest-social-media-security-risks-for-businesses 4.) http://dns.tmcnet.com/topics/internet-security/articles/137059-social-networking-sites-sitting 5.) http://www.cdc.gov/socialmedia/Tools/guidelines/pdf/securitymitigations.pdf 6.) http://www.netsmartz.org/ 7.) http://www.missingkids.com/ 8.) http://enough.org/ 9.) Internet Watch Foundation. Annual Report, 2008 10.) Adler, A. (2001). The Perverse Law of Child Pornography. Columbia Law Review, 101(2), 209-273

  28. Source References Continued 11.) http://blog.vimov.com/2011/01/app-squatting-misuse-of-weather-hd-name-in-the-mac-app-store/ 12.) http://www.betanews.com/article/Apple-still-silent-as-more-scams-are-found-on-App-Store/1278363193 13.) http://eu.techcrunch.com/2010/11/29/over-60000-click-on-scam-facebook-app-which -claims-you-can-see-who-checked-your-profile/ 14.) http://www.switched.com/2009/09/15/5-popular-facebook-scams-and-how-to-avoid-them/ 15.) http://www.macworld.com/article/157303/2011/01/twitter_antivirusscam.html. 16.) http://downloadsquad.switched.com/2011/01/16/facebook-enables-one-click-identity-theft-option -for-rogue-application-developers/ 17.) http://www.facecrooks.com/blog/internet-safety-a-privacy/item/904-study-finds-most-social-media -users-do-not-check-shared-links-for-malware 18.) http://tech.fortune.cnn.com/2011/01/22/app-store-hits-10-billion-update/?hpt=T2 19.) http://blog.nutshellmail.com/2010/02/03/can-you-trust-third-party-twitter-applications 20.) Ferraro, M., & Casey, E. (2005). Investigating child exploitation and pornography: The Internet, the Law and Forensic Science. San Diego, CA: Elsvier Academic Press.

  29. Questions

More Related