an insight into the relationship between social media and the susceptibility to malicious intent...
TRANSCRIPT
![Page 1: An Insight into the Relationship Between Social Media and the Susceptibility to Malicious Intent Presented by Rebecca Morgan 15/05/2015 >>>>2](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649e255503460f94b14792/html5/thumbnails/1.jpg)
![Page 2: An Insight into the Relationship Between Social Media and the Susceptibility to Malicious Intent Presented by Rebecca Morgan 15/05/2015 >>>>2](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649e255503460f94b14792/html5/thumbnails/2.jpg)
<<<<<Your Name Here>>>>> 2
An Insight into the Relationship Between Social Media and the Susceptibility to Malicious IntentPresented by Rebecca Morgan
15/05/2015
![Page 3: An Insight into the Relationship Between Social Media and the Susceptibility to Malicious Intent Presented by Rebecca Morgan 15/05/2015 >>>>2](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649e255503460f94b14792/html5/thumbnails/3.jpg)
Rebecca Morgan 3
Social Media
15/05/2015
Social Media
FacebookTwitter
Google +LinkedIn
InstagramTumblr
Peer to Peer communications
SkypeEmail
MobileSMS
Instant messaging
The Media
Newspapers MagazinesNew sites
Radio TV
![Page 4: An Insight into the Relationship Between Social Media and the Susceptibility to Malicious Intent Presented by Rebecca Morgan 15/05/2015 >>>>2](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649e255503460f94b14792/html5/thumbnails/4.jpg)
Rebecca Morgan 4
Most popular social media site
Facebook is growing everyday1.44 billion active users 20% of the worlds population
Creation of the information era
Database of personal data
15/05/2015
![Page 5: An Insight into the Relationship Between Social Media and the Susceptibility to Malicious Intent Presented by Rebecca Morgan 15/05/2015 >>>>2](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649e255503460f94b14792/html5/thumbnails/5.jpg)
Rebecca Morgan 515/05/2015
![Page 6: An Insight into the Relationship Between Social Media and the Susceptibility to Malicious Intent Presented by Rebecca Morgan 15/05/2015 >>>>2](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649e255503460f94b14792/html5/thumbnails/6.jpg)
Rebecca Morgan 615/05/2015
![Page 7: An Insight into the Relationship Between Social Media and the Susceptibility to Malicious Intent Presented by Rebecca Morgan 15/05/2015 >>>>2](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649e255503460f94b14792/html5/thumbnails/7.jpg)
Rebecca Morgan 7
Terminology
“What’s on your mind?”
15/05/2015
Location details
![Page 8: An Insight into the Relationship Between Social Media and the Susceptibility to Malicious Intent Presented by Rebecca Morgan 15/05/2015 >>>>2](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649e255503460f94b14792/html5/thumbnails/8.jpg)
Rebecca Morgan 8
Why does Facebook need the data?
• Data as a form of currency
• Worth $200 billion (September 2014)• Net worth $33.3 billion (July 2014)
15/05/2015
Users Data
Target adverts Money
![Page 9: An Insight into the Relationship Between Social Media and the Susceptibility to Malicious Intent Presented by Rebecca Morgan 15/05/2015 >>>>2](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649e255503460f94b14792/html5/thumbnails/9.jpg)
Rebecca Morgan 9
InvestigationsUse of Social media in investigation
15/05/2015
![Page 10: An Insight into the Relationship Between Social Media and the Susceptibility to Malicious Intent Presented by Rebecca Morgan 15/05/2015 >>>>2](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649e255503460f94b14792/html5/thumbnails/10.jpg)
Rebecca Morgan 10
Investigations
Metropolitan Police
1207 crimes reported involving Facebook 2014
Source of intelligence
Data collection
Location of crime
Online threats
Facility crime
Grooming
15/05/2015
![Page 11: An Insight into the Relationship Between Social Media and the Susceptibility to Malicious Intent Presented by Rebecca Morgan 15/05/2015 >>>>2](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649e255503460f94b14792/html5/thumbnails/11.jpg)
Rebecca Morgan 11
Intelligence
15/05/2015
Public available information
(BBC News, 2015)
![Page 12: An Insight into the Relationship Between Social Media and the Susceptibility to Malicious Intent Presented by Rebecca Morgan 15/05/2015 >>>>2](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649e255503460f94b14792/html5/thumbnails/12.jpg)
Rebecca Morgan 12
Types
Identify token theft
Identify fraud
Phishing
Spear-Phishing
Selling
Collection
15/05/2015
![Page 13: An Insight into the Relationship Between Social Media and the Susceptibility to Malicious Intent Presented by Rebecca Morgan 15/05/2015 >>>>2](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649e255503460f94b14792/html5/thumbnails/13.jpg)
Rebecca Morgan 13
Data Mining
Collection of personal information
Combination of Data
Third party applications
Graph search
FBStalker
15/05/2015
![Page 14: An Insight into the Relationship Between Social Media and the Susceptibility to Malicious Intent Presented by Rebecca Morgan 15/05/2015 >>>>2](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649e255503460f94b14792/html5/thumbnails/14.jpg)
Rebecca Morgan 1415/05/2015
![Page 15: An Insight into the Relationship Between Social Media and the Susceptibility to Malicious Intent Presented by Rebecca Morgan 15/05/2015 >>>>2](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649e255503460f94b14792/html5/thumbnails/15.jpg)
Rebecca Morgan 15
Graph search
15/05/2015
![Page 16: An Insight into the Relationship Between Social Media and the Susceptibility to Malicious Intent Presented by Rebecca Morgan 15/05/2015 >>>>2](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649e255503460f94b14792/html5/thumbnails/16.jpg)
Rebecca Morgan 16
Third party applications
Kali Linux
Maltego
Open source tool used to determine real world links
DMitry
Deep magic Information Gathering Tool
Google Chrome extension
Facebook Friends Mapper
Shows full friends lists even when hidden15/05/2015
![Page 17: An Insight into the Relationship Between Social Media and the Susceptibility to Malicious Intent Presented by Rebecca Morgan 15/05/2015 >>>>2](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649e255503460f94b14792/html5/thumbnails/17.jpg)
Rebecca Morgan 17
A few Examples
15/05/2015
![Page 18: An Insight into the Relationship Between Social Media and the Susceptibility to Malicious Intent Presented by Rebecca Morgan 15/05/2015 >>>>2](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649e255503460f94b14792/html5/thumbnails/18.jpg)
Rebecca Morgan 18
Trustwave test
Used Facebook to get a password, of a public figure
Result
Identified Wife
Public likes – ran a studio
Sent Phishing emails
Wife opened email attachment
Malicious Software
Access to Apple Key chain – stores passwords
15/05/2015
![Page 19: An Insight into the Relationship Between Social Media and the Susceptibility to Malicious Intent Presented by Rebecca Morgan 15/05/2015 >>>>2](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649e255503460f94b14792/html5/thumbnails/19.jpg)
Rebecca Morgan 19
Phishing examples
15/05/2015
The address of clicking play:huxiaoling.com/alludes.php
Effect:PC - Download malware
Address behind the button/link:static.ak.fbcdn.netwesternvn.com
Effect:Get users passwordMalware
![Page 20: An Insight into the Relationship Between Social Media and the Susceptibility to Malicious Intent Presented by Rebecca Morgan 15/05/2015 >>>>2](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649e255503460f94b14792/html5/thumbnails/20.jpg)
Rebecca Morgan 2015/05/2015
![Page 21: An Insight into the Relationship Between Social Media and the Susceptibility to Malicious Intent Presented by Rebecca Morgan 15/05/2015 >>>>2](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649e255503460f94b14792/html5/thumbnails/21.jpg)
Rebecca Morgan 2115/05/2015
![Page 22: An Insight into the Relationship Between Social Media and the Susceptibility to Malicious Intent Presented by Rebecca Morgan 15/05/2015 >>>>2](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649e255503460f94b14792/html5/thumbnails/22.jpg)
Rebecca Morgan 2215/05/2015
![Page 23: An Insight into the Relationship Between Social Media and the Susceptibility to Malicious Intent Presented by Rebecca Morgan 15/05/2015 >>>>2](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649e255503460f94b14792/html5/thumbnails/23.jpg)
Rebecca Morgan 2315/05/2015
![Page 24: An Insight into the Relationship Between Social Media and the Susceptibility to Malicious Intent Presented by Rebecca Morgan 15/05/2015 >>>>2](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649e255503460f94b14792/html5/thumbnails/24.jpg)
Rebecca Morgan 2415/05/2015
![Page 25: An Insight into the Relationship Between Social Media and the Susceptibility to Malicious Intent Presented by Rebecca Morgan 15/05/2015 >>>>2](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649e255503460f94b14792/html5/thumbnails/25.jpg)
Rebecca Morgan 25
Offline use
Open bank accounts
Obtain Credit Cards, loans and benefits
Take over existing accounts
Mobile phone contracts
Documents – passport, driving license15/05/2015
![Page 26: An Insight into the Relationship Between Social Media and the Susceptibility to Malicious Intent Presented by Rebecca Morgan 15/05/2015 >>>>2](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649e255503460f94b14792/html5/thumbnails/26.jpg)
Rebecca Morgan 26
ProtectionMaking use and understand security measures in place
15/05/2015
![Page 27: An Insight into the Relationship Between Social Media and the Susceptibility to Malicious Intent Presented by Rebecca Morgan 15/05/2015 >>>>2](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649e255503460f94b14792/html5/thumbnails/27.jpg)
Rebecca Morgan 27
Security and Privacy settings
Security settings:Two way authentication
Privacy settingsOnly me Friends Friends of Friends Public (Global)
15/05/2015
![Page 28: An Insight into the Relationship Between Social Media and the Susceptibility to Malicious Intent Presented by Rebecca Morgan 15/05/2015 >>>>2](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649e255503460f94b14792/html5/thumbnails/28.jpg)
Rebecca Morgan 2815/05/2015
Audience Distribution
![Page 29: An Insight into the Relationship Between Social Media and the Susceptibility to Malicious Intent Presented by Rebecca Morgan 15/05/2015 >>>>2](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649e255503460f94b14792/html5/thumbnails/29.jpg)
Rebecca Morgan 2915/05/2015
![Page 30: An Insight into the Relationship Between Social Media and the Susceptibility to Malicious Intent Presented by Rebecca Morgan 15/05/2015 >>>>2](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649e255503460f94b14792/html5/thumbnails/30.jpg)
Rebecca Morgan 30
Privacy Check-up
15/05/2015
![Page 31: An Insight into the Relationship Between Social Media and the Susceptibility to Malicious Intent Presented by Rebecca Morgan 15/05/2015 >>>>2](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649e255503460f94b14792/html5/thumbnails/31.jpg)
Rebecca Morgan 31
Privacy Check - up
15/05/2015
![Page 32: An Insight into the Relationship Between Social Media and the Susceptibility to Malicious Intent Presented by Rebecca Morgan 15/05/2015 >>>>2](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649e255503460f94b14792/html5/thumbnails/32.jpg)
Rebecca Morgan 32
Deleting options
Individual posts
Activity log
Accounts
Deactivating – not deleted
Deleting – takes 30 days15/05/2015
![Page 33: An Insight into the Relationship Between Social Media and the Susceptibility to Malicious Intent Presented by Rebecca Morgan 15/05/2015 >>>>2](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649e255503460f94b14792/html5/thumbnails/33.jpg)
Rebecca Morgan 33
Other Social Media
All social media sites are increasing
These methods can be applied to all types
Data from multiple sites can be combined
Search engines –names
15/05/2015
![Page 34: An Insight into the Relationship Between Social Media and the Susceptibility to Malicious Intent Presented by Rebecca Morgan 15/05/2015 >>>>2](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649e255503460f94b14792/html5/thumbnails/34.jpg)
Rebecca Morgan 34
Searching a person
Using a web search engine such as google
Enter a persons name, possible results LinkedInTwitter192.comGoogle +FacebookCompany CheckerName EncyclopaediaOnline DonationsAcademia.edu
15/05/2015
![Page 35: An Insight into the Relationship Between Social Media and the Susceptibility to Malicious Intent Presented by Rebecca Morgan 15/05/2015 >>>>2](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649e255503460f94b14792/html5/thumbnails/35.jpg)
Rebecca Morgan 35
Effects
Users need to educated now and in the future
Facebook advertise but not enough
But users need to take responsibility for their own data
Balance between using the site and distributing data
15/05/2015
![Page 36: An Insight into the Relationship Between Social Media and the Susceptibility to Malicious Intent Presented by Rebecca Morgan 15/05/2015 >>>>2](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649e255503460f94b14792/html5/thumbnails/36.jpg)
Rebecca Morgan 36
Reporting
Victims of malicious actives have a tendency to stay quiet
Action Fraud site
National Fraud Intelligence Bureau
15/05/2015
![Page 37: An Insight into the Relationship Between Social Media and the Susceptibility to Malicious Intent Presented by Rebecca Morgan 15/05/2015 >>>>2](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649e255503460f94b14792/html5/thumbnails/37.jpg)
Rebecca Morgan 37
Future of Facebook
Graph Search
Social Media site or colossal database of personal information?
Continual growth20% of the world in 11 years
Increase Cybercrime reported
15/05/2015
![Page 38: An Insight into the Relationship Between Social Media and the Susceptibility to Malicious Intent Presented by Rebecca Morgan 15/05/2015 >>>>2](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649e255503460f94b14792/html5/thumbnails/38.jpg)
Rebecca Morgan 38
Conclusions
Individuals need to take responsible for the distribution for their own data.
Privacy and Security settings need to be implemented to restrict access to the data.
Incidents need to be reported
The way Facebook is used is changing
15/05/2015
![Page 39: An Insight into the Relationship Between Social Media and the Susceptibility to Malicious Intent Presented by Rebecca Morgan 15/05/2015 >>>>2](https://reader035.vdocuments.site/reader035/viewer/2022062322/56649e255503460f94b14792/html5/thumbnails/39.jpg)
Rebecca Morgan 39
Questions?Thank you for attending!
15/05/2015