Social Engineering through Social Media: An Investigation on Enterprise Security

Author(s):  
Heidi Wilcox ◽  
Maumita Bhattacharya ◽  
Rafiqul Islam

As we are living in the era of social media apps, from Facebook to WhatsApp which are using everywhere. All these apps are being used by everyone . Although this may seem to be a very good sign that we are moving to the new era of “THE DIGITAL WORLD” but it may have some consequences like spreading of artificial news, crack of personal information like credit card,debit card, passwords or digital wallets etc. The users believe that every message shared on social media might be true . So to protect our internet users we have come up with an idea that provides the ability to discover homonym attack and malicious links which warns the user before they can access the site. The Social engineering attacks have stirred terribly removed from this like fraudulent attack within which we have a tendency to completely rely upon our browser to present north American nation a warning. This situation may worry some computer users but we generally don’t think much about when we perform any action on our mobile phones. But all these so called to do steps are not the right way to deal with these situation .The primary commitments of this paper are understanding a working meaning of IDN satirizing assaults and how those IDN spaces are being introduced in the URL bar in some Internet programs, proposing a working arrangement that reports IDN ridiculing assaults which convert URL into Unicode and punycode.


Author(s):  
Muhammad Uwais ◽  
Arpit Sharma ◽  
Akhil Kumar ◽  
Lakshya Singh

As we are living in the era of social media apps, from Facebook to WhatsApp which are using everywhere. All these apps are being used by everyone. Although this may seem to be a very good sign that we are moving to the new era of “THE DIGITAL WORLD” but it may have some consequences like spreading of artificial news, crack of personal information like credit card, debit card, passwords or digital wallets etc. The users believe that every message shared on social media might be true. So, to protect our internet users we have come up with an idea that provides the ability to discover homonym attack and malicious links which warns the user before they can access the site. The Social engineering attacks have stirred terribly removed from this like fraudulent attack within which we tend to completely rely upon our browser to present north American nation a warning. This situation may worry some computer users, but we generally do not think much about when we perform any action on our mobile phones. But all these so called to do steps are not the right way to deal with these situation .The primary commitments of this paper are understanding a working meaning of IDN satirizing assaults and how those IDN spaces are being introduced in the URL bar in some Internet programs, proposing a working arrangement that reports IDN ridiculing assaults which convert URL into Unicode and punycode.


2018 ◽  
Vol 16 (1-2) ◽  
pp. 41-64
Author(s):  
Maciej Preus

Along with the intensive dissemination of information and communication technologies, there has been a rapid increase in the availability of information, and even its excess. The specific way of informing on the Internet and social media has started to influence the behavior of its users and on the community and society as the number of Internet users is rapidly growing. With the help of ICT tools, one can create patterns of interpersonal contacts and civic awareness, which can potentially lead to mass surveillance, the use of social engineering for purposes contrary to the objectives of a given society or creating needs and lifestyles. Examples of such activities of the Russian Federation against Lithuania, Latvia and Estonia, although necessarily limited, indicate that the Kremlin's activity is intensifying, well-organized, with the use of both people and automatic communication. Moscow uses traditional and social media directly and indirectly, carefully choosing means of information war - propaganda, disinformation, falsification of reality and discrediting opponents. The message generated by the Kremlin-friendly media creates a new security environment characterized by information chaos, causing the inability to distinguish the truth from falsehood, uncertainty about the intentions of the authorities of their own countries and neighbors, uncertainty about the actual state of affairs. The long-term goal for the Baltic states is to create organizational and administrative chaos in societies and authorities at all levels who, by making decisions on false premises, will destabilize these countries in every aspect.


2015 ◽  
Vol 77 (19) ◽  
Author(s):  
Md. Nabil Ahmad Zawawi

Social media is playing an important role to most people these days. People are using it to be connected among peers, updated with the latest information and also for e-commerce purposes. However, apart from its benefits there are others who would use the information obtained from social media in a malicious way such as harvesting personal information for black mailing, information manipulation and tele-marketing. This threat coupled with unsafe social media practice could expose the social media users to being manipulate into sharing sensitive and revealing information about them. In this paper, a preliminary investigation to identify distinct characterizations of unsafe social media habits is presented. For this study, we focused on one particular social engineering attack known as gatekeeper friending. In this attack, a would--be attacker or manipulator of information could exploit information shared over a social network and how an unsafe social media habits could expose its users to such attacks and exploitation. By identifying this habits we hope that a more secure and cautious code of conduct could be established to prevent unwanted disclosure of private information for malicious intention.


Author(s):  
Arul E ◽  
Punidha A

The social media platforms for teens and genz are highly influential; 39% state that they will use’ buy buttons’ and 25% use smartphones for shopping images. In the meantime, 28 percent of US internet users between 18 and 55 years of age said their aim is to buy via social media during holidays. As these channels become more central to our everyday lives, social media platforms have now become a key vector of attack that businesses cannot neglect anymore. Social media Platforms provide up to 20% more options for delivering malware for consumers, such as advertising, social engineering, equities and plug-ins compare to eCommerce and corporate websites. The suggested version Supervised SD-LVQ used to detect malicious firmware on various social media sites. LVQ classifies the different service calls attacks associated with XML, HTML, JavaScript files and different forms of malicious attacks on social networks. The test results show that 98.70% is genuinely positive and 0.02% is falsely negative.


2021 ◽  
Vol 2 (1) ◽  
pp. 1-14
Author(s):  
Taurus Jackson

The focus of this research was to explore present control methods and solutions used throughout technology-based, healthcare-based, and manufacturing-based organizations in southwest Georgia to determine their effectiveness for reducing potential threats. Semi-structured interviews with open-ended questions are used to explore 30 information technology professionals' lived experiences with IT security policies and procedures. Two research questions guided the qualitative exploratory case study: How important is social engineering and enterprise security to the organization? and How are organizations evaluating and managing existing organizational solutions? Several themes emerged: (a) lack of education and inadequate information can affect the decision-making process, (b) response times from management is a key factor in reducing threats, (c) a sense of failure is always present, (d) failed IT policy management can increase organizational vulnerability, and (e) social engineering still has a negative stigma in the business environment. The findings suggest that although steps were made to change the perception of social engineering and enterprise security, additional work is needed to ensure employees are aware of how social engineering and enterprise security can affect their organization productivity. Key Words: Information systems, information technology, social engineering, enterprise security, control methods, policies, procedures, management


Sign in / Sign up

Export Citation Format

Share Document