abuses and security of social media sites n.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
Abuses and Security of Social Media Sites PowerPoint Presentation
Download Presentation
Abuses and Security of Social Media Sites

Loading in 2 Seconds...

play fullscreen
1 / 29

Abuses and Security of Social Media Sites - PowerPoint PPT Presentation


  • 116 Views
  • Uploaded on

Users & Behaviors. Group: Kenie R. Moses - Rachel Sitarz - Scott Abney. Abuses and Security of Social Media Sites. Purdue University Spring 2011. Social internet TECH621. Social Media Apps and Usage. Users Behaviors: Beware of Media Apps. Scott Abney. Social Media App Intro.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'Abuses and Security of Social Media Sites' - jeroen


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
abuses and security of social media sites

Users & Behaviors

Group: Kenie R. Moses - Rachel Sitarz - Scott Abney

Abuses and Security of Social Media Sites

Purdue University Spring 2011

Social internet TECH621

social media apps and usage
Social Media Apps and Usage

Users Behaviors: Beware of Media Apps

Scott Abney

social media app intro
Social Media App Intro
  • Apple App Store has over 300,000 apps
  • Facebook is around 60,000 apps
  • Twitter just passed over 50,000 apps
  • 97% of social media users do not check apps or links for viruses
apple
Apple
  • App Store has over 100 millions users
  • User info hacked due to knockoffs off applications (Weather HD app)
  • Thuat Nguyen created 50 apps for app store, then charged up to $600 after hacking into over 400 iTunes accounts for furthering purchases on his other apps
  • Storm 8 created apps for online games that misconstrued what users were downloading, purchases ranged from $150-$1400
twitter
Twitter
  • Around 200 million users on Twitter
  • Over 50% of tweets are sent from 3rd party applications
  • Common app that is used for hacking claims to increase subscribers
  • Security shield application
facebook
Facebook
  • Between 500-600 million users
  • November 2010, over 60,000 people clicked on the ePrivacy app to try to see who viewed their profile
  • Hackers create fake Facebook login pages from apps
  • Early January 2011, Facebook allows apps to view both home and phone number on profiles
what can you do
What Can You Do????
  • Research applications before adding them
  • Never give out any private information
  • Check security settings on your social network
  • www.facecrooks.com
social media usage and security
Social Media Usage and Security

Users Behaviors: How Secure Are You?

Kenie R. Moses

social network usage
Social Network Usage
  • Nearly 20% of Internet users are tweeting on Twitter or using another service to share personal and business updates, or to see updates about others
  • 66% of LinkedIn users are decision makers or have influence in the purchase decisions at their companies
  • In 2011, 70+ Percent of Marketers Will Be Using Social Media
social network usage continued
Social Network Usage Continued
  • 54% percent of the companies studied have at least one Facebook Fan page
  • 72% of companies plan to invest more in social networks
  • 79% of the largest fortune 500 firms use Twitter, to communicate with customers or employees
  • 80% of companies are planning to use social networks to find or attract candidates
social network data leakage
Social Network Data Leakage
  • 17% of US companies investigated the exposure of confidential information via a posting to a social networking sites
  • 13% of US companies investigated the exposure of confidential, sensitive or private information via Twitter
  • 54% of ClOs said their firms do not allow employees to visit social networking sites for any reason while at work.
social networking pitfalls
Social Networking Pitfalls
    • 48% have no worries about the security of social networking sites
  • 46% of Facebook users feel there are security and privacy risks.
  • 34% have seen somebody else’s phone number posted on a social
  • networking site.
  • 9% have included their phone number and 5% have included
  • their on social networking sites visible to friends.
  • 25% have discussed holiday plans “wall-to-wall” outside their page
viruses and hacking techniques used on social media sites
Viruses and Hacking Techniques Used on Social Media Sites

10

1.) Koobface- Virus that steals sensitive data and

sends Trojan viruses to contacts of infected

2.) Mikeyy Worm- Virus that activates upon clicked

links and sends out messages to contacts.

3.) Acai Attack- Virus that activates once the ad for

Acai Berry juice is clicked infecting with Malware.

4.) Facebook Phishing- Coaxes users to give up

valuable log-in info on a fake log-in screen.

5.) Twittercut- Virus that promise user over 1000

loyal followers. Once clicked, installs Trojan virus.

9

8

1

7

6

5

2

4

3

1-Facebook

2-MySpace

3-Twitter

4-Bebo

5-U-Tube

6-WAYN

7-Flicker

8-Last FM

9-LinkIn

10-Other

social media abuse and misuse
Social Media Abuse and Misuse

User Behaviors: Deviant Activities

Rachel Sitarz

introduction
Introduction
  • Pornography Internet trends
  • Deviant behavior: Child Pornography (CP) usage
  • Predatory behaviors
  • Victimization of children
pornography usage
Pornography Usage
  • Multi-billion dollar industry (Ferraro & Casey, 2005)
  • $97 billion worldwide
  • $13 billion in the US alone
  • Every second, $3,075.64 is being spent
  • 28,258 are viewing pornography every second
  • 372 Internet users are typing adult search terms into search engines
  • 39 minutes new pornography is made in US
pornography usage continued
Pornography Usage Continued
  • Sex is the most searched topic, with one-third of all internet user visiting some form of sexually related site regularly
  • Anonymity, cheap, easily accessed, avoid social embarrassment, instant gratification, easily hidden
pornography pages by country
Pornography Pages By Country

Country Porn Pages:

  • United States 244,661,900
  • Germany 10,030,200
  • United Kingdom 8,506,800
  • Australia 5,655,800
  • Japan 2,700,800
  • The Netherlands 1,883,800
  • Russia 1,080,600
  • Poland 1,049,600
  • Spain 852,800
pornography stats
Pornography Stats
  • 40 million U.S. adults regularly visit Internet pornography
  • 20% of men admit accessing pornography at work
  • 70% of women keep their online activities secret
  • 10% of adults admit to Internet sexual addition
  • 17% of women admit to struggling with pornography addiction
child pornography online
Child Pornography Online
  • Child pornography isn't new, it’s easier to access without as many social and legal risks
  • Some statistics estimate that 1.5 million children have been and currently are being exploited
  • Multi-billion dollar industry with estimated 100,000 child pornography websites
  • “Golden Age of Child Pornography”
child pornography continued
Child Pornography Continued
  • Child pornography is one of the fastest growing businesses online
  • Content is continually getting worse and more graphic
  • 58% of CP websites are made in US
online predators
Online Predators
  • 644,865 Registered Sex Offenders in the US (many unregistered)
  • 80 % of offenders were explicit about their intentions with youth
  • 73 % of online crimes, teens go to meet the offender on multiple occasions for multiple sexual encounters
youth victimization
Youth Victimization
  • Approximately 1 in 6 youth online (10 to 17-years-old) received a sexual solicitation or approach over the Internet.
  • 4% received an aggressive sexual solicitation – meeting, phone call, gifts
  • 34% had an unwanted exposure to pornography
  • 27% of the youth who encountered unwanted pornography told a parent or guardian
  • Research indicates that 1 in 5 girls and 1 in 10 boys will be sexually victimized before adulthood
source references
Source References

1.) http://information-security-resources.com/2009/08/17/top-8-social-media-security-threats/

2.) http://socialmediasecurity.com/

3.) http://www.fastcompany.com/1563867/the-5-biggest-social-media-security-risks-for-businesses

4.) http://dns.tmcnet.com/topics/internet-security/articles/137059-social-networking-sites-sitting

5.) http://www.cdc.gov/socialmedia/Tools/guidelines/pdf/securitymitigations.pdf

6.) http://www.netsmartz.org/

7.) http://www.missingkids.com/

8.) http://enough.org/

9.) Internet Watch Foundation. Annual Report, 2008

10.) Adler, A. (2001). The Perverse Law of Child Pornography. Columbia Law Review, 101(2), 209-273

source references continued
Source References Continued

11.) http://blog.vimov.com/2011/01/app-squatting-misuse-of-weather-hd-name-in-the-mac-app-store/

12.) http://www.betanews.com/article/Apple-still-silent-as-more-scams-are-found-on-App-Store/1278363193

13.) http://eu.techcrunch.com/2010/11/29/over-60000-click-on-scam-facebook-app-which

-claims-you-can-see-who-checked-your-profile/

14.) http://www.switched.com/2009/09/15/5-popular-facebook-scams-and-how-to-avoid-them/

15.) http://www.macworld.com/article/157303/2011/01/twitter_antivirusscam.html.

16.) http://downloadsquad.switched.com/2011/01/16/facebook-enables-one-click-identity-theft-option

-for-rogue-application-developers/

17.) http://www.facecrooks.com/blog/internet-safety-a-privacy/item/904-study-finds-most-social-media

-users-do-not-check-shared-links-for-malware

18.) http://tech.fortune.cnn.com/2011/01/22/app-store-hits-10-billion-update/?hpt=T2

19.) http://blog.nutshellmail.com/2010/02/03/can-you-trust-third-party-twitter-applications

20.) Ferraro, M., & Casey, E. (2005). Investigating child exploitation and pornography:

The Internet, the Law and Forensic Science. San Diego, CA: Elsvier Academic Press.