SlideShare una empresa de Scribd logo
1 de 13
Huda Shaikh-42
Sheeba Siddiqui-53
 Expanding  Market Research
 Personal Touch
 Improve Your Reputation
 Low-Cost Marketing
 And much more….
A  social engineering attack is one in which
  the intended victim is somehow tricked into
  doing the attacker's bidding.
 Social engineering attacks are also often
  used to trick users into infecting their own
  systems –
 "Social networking sites are goldmines of
  information, and a social engineers dream.
  You don't even have to go dumpster diving
  anymore,"
 Worms
A   lack of security on social networking sites
  causes problems for business.
 Identity Theft
 Illegitimate third-party applications.
 False connection requests.
 Registering  an Account
 Use a strong password different from the
  passwords you use to access other sites.
 If you are asked to provide security questions, use
  information that others would not know about
  you.
 Consider not using your real name, especially your
  last name. Be aware that this may violate the
  terms of service of some social networks.
Review the privacy policy and terms of service
  before signing up for an account.

Be sure to keep strong antivirus and spyware
  protection on your computer

   Provide only information that is necessary or
    that you feel comfortable providing. Remember,
    you can always provide more information to a
    social network, but you can’t always remove
    information once it’s been posted.
 Become   familiar with the privacy settings
  available on any social network you use.
 Don’t share your birthday, age, or place of
  birth. This information could be useful to
  identity thieves and to data mining
  companies.
 Be very cautious of pop-up windows,
  especially any that state your security
  software is out of date or that security
  threats and/or viruses have been detected
  on your computer.
“The world is getting closer
 everyday and everyone wants to be
 connected and social networking
 helps in that ….But The real defense
 is to learn how not to fall victim to
 social engineering.”
Why social networking sites increased security due to s.e. attack

Más contenido relacionado

Más de أحلام انصارى

Más de أحلام انصارى (19)

Html5 offers 5 times better ways to hijack the website
Html5 offers 5 times better ways to hijack the website Html5 offers 5 times better ways to hijack the website
Html5 offers 5 times better ways to hijack the website
 
Honey pot in cloud computing
Honey pot in cloud computingHoney pot in cloud computing
Honey pot in cloud computing
 
grid authentication
grid authenticationgrid authentication
grid authentication
 
Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)Security As A Service In Cloud(SECaaS)
Security As A Service In Cloud(SECaaS)
 
Dos presentation by ahlam shakeel
Dos presentation by ahlam shakeelDos presentation by ahlam shakeel
Dos presentation by ahlam shakeel
 
Soa
SoaSoa
Soa
 
Rbac
RbacRbac
Rbac
 
Password craking techniques
Password craking techniques Password craking techniques
Password craking techniques
 
Operating system vulnerability and control
Operating system vulnerability and control Operating system vulnerability and control
Operating system vulnerability and control
 
Network ssecurity toolkit
Network ssecurity toolkitNetwork ssecurity toolkit
Network ssecurity toolkit
 
Image forgery and security
Image forgery and securityImage forgery and security
Image forgery and security
 
Image based authentication
Image based authenticationImage based authentication
Image based authentication
 
Dmz
Dmz Dmz
Dmz
 
Cryptography
Cryptography Cryptography
Cryptography
 
Website attack n defacement n its control measures
Website attack n defacement n its control measures Website attack n defacement n its control measures
Website attack n defacement n its control measures
 
public cloud security via ids
public cloud security via idspublic cloud security via ids
public cloud security via ids
 
Secure cloud mining By ahlam
Secure cloud mining  By ahlamSecure cloud mining  By ahlam
Secure cloud mining By ahlam
 
Grid computing by ahlam ansari
Grid computing by  ahlam ansariGrid computing by  ahlam ansari
Grid computing by ahlam ansari
 
Analysis of Algorithm
Analysis of AlgorithmAnalysis of Algorithm
Analysis of Algorithm
 

Why social networking sites increased security due to s.e. attack

  • 2.  Expanding Market Research  Personal Touch  Improve Your Reputation  Low-Cost Marketing  And much more….
  • 3. A social engineering attack is one in which the intended victim is somehow tricked into doing the attacker's bidding.  Social engineering attacks are also often used to trick users into infecting their own systems –  "Social networking sites are goldmines of information, and a social engineers dream. You don't even have to go dumpster diving anymore,"
  • 5.
  • 6.
  • 7. A lack of security on social networking sites causes problems for business.  Identity Theft  Illegitimate third-party applications.  False connection requests.
  • 8.  Registering an Account  Use a strong password different from the passwords you use to access other sites.  If you are asked to provide security questions, use information that others would not know about you.  Consider not using your real name, especially your last name. Be aware that this may violate the terms of service of some social networks.
  • 9.
  • 10. Review the privacy policy and terms of service before signing up for an account. Be sure to keep strong antivirus and spyware protection on your computer  Provide only information that is necessary or that you feel comfortable providing. Remember, you can always provide more information to a social network, but you can’t always remove information once it’s been posted.
  • 11.  Become familiar with the privacy settings available on any social network you use.  Don’t share your birthday, age, or place of birth. This information could be useful to identity thieves and to data mining companies.  Be very cautious of pop-up windows, especially any that state your security software is out of date or that security threats and/or viruses have been detected on your computer.
  • 12. “The world is getting closer everyday and everyone wants to be connected and social networking helps in that ….But The real defense is to learn how not to fall victim to social engineering.”