SlideShare una empresa de Scribd logo
1 de 31
UK6153 Cyber Law

Cyber Crime in the Social Network

Name
Matrick No.
Date
Lecturers

:
:
:
:

Punithemalar Hariaratnam
GP01285
27 July 2013 (Saturday)
Dr Rizal Rahman
Just what do we mean when we say,
Social Network?
A social network service focuses on building and reflecting of
social networks or social relations among people, e.g., who
share interests and/or activities
The process of building online communities, often
accomplished both through 'groups' and 'friends lists' that
allow greater interaction on websites.
Interactive communication in which participants in online
communities such as Facebook share thoughts, photos, etc.
with members of their own personal networks in a
controlled way
The Law
Communications and Multimedia Act 1998
Evidence Act 1950
Penal Code Act
Computer Crimes Act 1997
•
•
•
•
•
•
•
•

Facebook.com
MySpace.com
LinkedIn.com
Bebo.com
Friendster.com
hi5.com
Orkut.com
PerfSpot.com
A focus on building social
relationships among people.
Building online communities.
Interactive communication
among participants.
• Facebook claims that 50% of active users log into the site each day.
This would mean at least 175 million users every 24 hours
• Twitter now has 75 million user accounts (15 million active)
• LinkedIn has over 50 million members worldwide.
• Facebook currently has in excess of 350 million active users on
global basis. Six months ago, this was 250 million. This is over a
40% growth in less than 6 months.
• More than 35 million Facebook users update their status each day.
• Photo uploads to Facebook have increased by more than 100%.
(2.5 billion)
• More than 250 Facebook applications have over a Million
combined user seach month
Cyber Crime
• Crime committed using a computer and the internet
to steal a person’s identity or illegal imports or
malicious programs
• Computer used as object or subject of a crime
• Online activities are Vulnerable to crime and can
compromise personal safety just as common
everyday unless law makers, law enforcement and
individuals need to know how to protect themselves
and the persons for which they are responsible
The first recorded cyber crime took place in the
year 1820! That is not surprising considering
the fact that the abacus, which is thought to be
the earliest form of a computer, has been
around since 3500 B.C. in India, Japan and
China. The era of modern computers, however,
began with the analytical engine of Charles
Babbage.

The first spam email took place in 1978 where
it was sent over Arpanet (Advance research
projects agency network)
• With the rising popularity of the social
networking websites today, you'll find many
Cyber crimes where adults impersonate
children, becoming friendly, and then coaxing
children to meet face-to-face. This is aserious
problem today with youth as young as
• 13 years having sanctioned access to these
social media and networking sites.
Types of cyber crime
• Hacking
– Unauthorised access to computer
• Child pornography
– Paedophilia who are sexually attracted to children and use false identity
• Denial of service attack
– Flooring bandwidth of victim with spam mails
• Virus dissemination
– Malicious software ie; trojan horse etc
• Computer vandalism
– Damaging or destroying data
• Cyber Terrorism
– Hate email
• Software piracy
– Theft of software through illegal copying
• Credit Card Fraud
– Hack and misuse your card
•

•
•
•
•

•
•
•

Net extortion
– Copying confidential data and extort for huge amounts
Phishing
– Pulling our confidential info from banks or financial institutions
Spoofing
– Pretend to be in identity of another computer
Cyber Stalking
– Following victim by sending email, entering chatroom etc
Salami Sttack
– Insignificant changes, deducting small amount from individuals account
– Confidential info from banks or financial institutions
Spoofing
– Pretend to be in identity of another computer
Cyber Stalking
– Following victim by sending email, entering chatroom etc
Salami Sttack
– Insignificant changes, deducting small amount from individuals account
‘79 per cent of social media users
victims of cyber crime’

by Lee Ya Yun, April 6, 2013, Saturday
Why social media is the target!

• Booming social media popularity
• The obvious social media addiction/lure
• Social media becoming an ideal place for
crime
• The vast transition from emails to social
media Rising usage of social media over
smartphones -
Cybercriminals use social media not only to commit crime
online, but also for carrying out real world crime owing to
“over-sharing” across these social platforms.
• A survey of 2,000 home-owners stated that 35% users post
their vacation plans on social networking sites. Availability of
such authentic information helps the criminals achieve their
motives easily. Adding to these reasons, the money
associated with the malware market is also a motivation for
criminals to attack using social media.
• Although social media talks more about individual users, the
cyber criminals not only attack the user as an individual, but
they also use it as a channel to victimise businesses.
MURDERED BY A MAN SHE MET ONLINE
.

Ashleigh Hall was groomed by Peter Chapman
via Facebook after her claimed to be a teenager
A study by Cyberoam reveals that disclosures over social media highly affect
business. Here is the summary of disclosures in brief:
According to Sophos Security
Threat Report 2013, Malaysia is
the sixth most vulnerable to
cyber crime.
Listed among the 10 riskiest countries, Malaysia is
also reported to be highly exposed to Android PC and
devices malware attacks. Remember that in the event
of a cyber crime, victims can lodge a report with
CyberSecurity Malaysia.
Just like any other medium, social media can also become a
source of data leakage, intrusions, entry for malicious content,
loss of productivity and so on. A good balance between security
and social networking can help. How? Here are a few pointers
that will help:

• Establish an organizational policy for social networking and
regularly train them on the safety measures
• Monitor access of social networks in your organization
• Use strong passwords for your corporate profile on social
networking sites
• Upgrade IT Network Security with a solution that offers
multiple security features and scans HTTPS sites (most
social networking sites today are on HTTPS).

• When signing up for social media sites, ask employees to
avoid using official email address
• Caution employees on clicking the links wisely or when
installing plugins/pop-ups
• Ask them to keep a track on the personal information
they post
• Request them to avoid allowing social networking services to
scan their email address book
• Limit the number of persons authorized to blog or tweet on
behalf of the company
• Choose an official spokesperson for Twitter/Facebook
• Ensure that the authorized person knows what can be
communicated, and when?
• Keep a record of all public/employee disclosures
Scams
Criminals have been utilizing the scam for centuries. In the
Facebook world, scams are particularly effective at drawing
people in by simply enticing an individual to click on a link that
would interest almost anyone, such as an innocent-looking
notification that you’ve won a free prize like a gift card. Then, in
order to claim the prize, scammers require you to submit some
information, such as a credit card number or Social Security
number. This description may make it seem like scams are easy
to spot, but even the most savvy social media user has to be on
the lookout for illegitimate requests for information.
Robbery
It doesn’t take much for a thief to find out where
you live, go to school, work, or hang out if you make
that information readily available on Facebook. If
you use Facebook’s check-in or Google Maps
feature, then you could be in a heap of trouble if a
robber is paying attention. This person isn’t always a
complete stranger either; they may be an old
acquaintance or someone else you’d never expect to
come rob you.
Identity theft
With the large amount of personal information
swarming around Facebook these days, it has
become fairly easy for criminals to steal users’
identities. Hackers often break into users’ e-mails
and make fake Facebook accounts. From there they
can access personal and bank information and
cause havoc to your sense of security. Protect
yourself from identity theft on Facebook by keeping
your profile very secure and free of personal
information that a criminal would love to have.
Defamation
An individual commits the crime of defamation when
they communicate a false statement to a third party
that paints another individual or entity in a negative
light. Facebook makes communicating defamatory
statements frighteningly easy, and the exposure
Facebook provides makes it more likely that businesses
or individuals will be harmed by the defamatory
statement, and thus more likely to pursue legal
remedies. Be careful what you say on Facebook; you
may be committing a crime without even knowing it.
Harassment
Harassment happens all the time on Facebook. From
sexual harassment to assault threats, there has been
a significant increase in the number of harassment
cases happening on Facebook. It’s not uncommon for
sex offenders and sexual predators to prey on
unsuspecting victims on Facebook and even pose as a
teen or college student. Harassing messages,
inappropriate comments, and other persistent
behaviors should be reported to Facebook and your
local police station.
Cyberbullying
Cyberbullying is a common occurrence among
teenagers on Facebook and one that can result in
serious criminal charges if it goes far enough.
Cyberbullying on Facebook has contributed to the
deaths of several teens who either committed
suicide or were killed by a peer. Cyberbullying that
involves hacking or password and identity theft may
be punishable under state and federal law. When
adults engage in this kind of online behavior it is
called cyber-harassment or cyberstalking.
Stalking
The term “stalking” is thrown around a lot on
Facebook, and it is often meant as a joke for regularly
looking at someone’s profile. However, the actual act
of cyberstalking is a common crime on the social
networking site and can result in a serious offense.
Cyberstalking typically involves harassing a person
with messages, written threats, and other persistent
online behavior that endangers a person’s safety.
Although cyberstalking may seem like nothing more
than annoying behavior, it is a legitimate cause for
concern in many cases and can even lead to in-person
stalking or endangerment if not treated seriously.
A good balance between
security and productivity is the
need of the hour for
organisations facing similar
challenges due to their
presence over social media.
The End
thank you

Más contenido relacionado

La actualidad más candente

Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
Hem Pokhrel
 
Cyberstalking
CyberstalkingCyberstalking
Cyberstalking
Trevschic
 

La actualidad más candente (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
CYBER SAFETY PPT
 CYBER SAFETY PPT CYBER SAFETY PPT
CYBER SAFETY PPT
 
Cyberstalking
CyberstalkingCyberstalking
Cyberstalking
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber crime - What is and types.
Cyber crime - What is and types.Cyber crime - What is and types.
Cyber crime - What is and types.
 
Cybercrimes (Against Children)
Cybercrimes (Against Children)Cybercrimes (Against Children)
Cybercrimes (Against Children)
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cybercrime online presentation
Cybercrime online presentationCybercrime online presentation
Cybercrime online presentation
 

Destacado

Cyber Crime and Social Media
Cyber Crime and Social MediaCyber Crime and Social Media
Cyber Crime and Social Media
jen-morgan
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
MOE515253
 
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...
SlideShare
 

Destacado (8)

Cyber-Crime e Social Media
Cyber-Crime e Social MediaCyber-Crime e Social Media
Cyber-Crime e Social Media
 
Cyber Crime and Social Media
Cyber Crime and Social MediaCyber Crime and Social Media
Cyber Crime and Social Media
 
Cyber crime social media &; family
Cyber crime social media &; familyCyber crime social media &; family
Cyber crime social media &; family
 
Social Media & Crime
Social Media & CrimeSocial Media & Crime
Social Media & Crime
 
Cyber crime in a Smart Phone & Social Media Obsessed World
Cyber crime in a Smart Phone & Social Media Obsessed WorldCyber crime in a Smart Phone & Social Media Obsessed World
Cyber crime in a Smart Phone & Social Media Obsessed World
 
Instant Checkmate Background Check Glossary
Instant Checkmate Background Check GlossaryInstant Checkmate Background Check Glossary
Instant Checkmate Background Check Glossary
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...
 

Similar a Facebook

Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptx
DominicCaling
 
Pr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointPr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpoint
hmorrell1
 
Draft for prezi and poster
Draft for prezi and posterDraft for prezi and poster
Draft for prezi and poster
victoriahoo
 
Bullying, Online Predatory Action And Identity Theft
Bullying, Online Predatory Action And Identity TheftBullying, Online Predatory Action And Identity Theft
Bullying, Online Predatory Action And Identity Theft
Heather Dionne
 
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
vichu19891
 
Cyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to TechnologyCyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to Technology
ijtsrd
 
Lis 768 Privacy Presentation
Lis 768 Privacy PresentationLis 768 Privacy Presentation
Lis 768 Privacy Presentation
Julia Bryan-Diehl
 

Similar a Facebook (20)

Cyber Awareness.pptx
Cyber Awareness.pptxCyber Awareness.pptx
Cyber Awareness.pptx
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptx
 
Advantages & Disadvantages of Social Networking
Advantages & Disadvantages of Social NetworkingAdvantages & Disadvantages of Social Networking
Advantages & Disadvantages of Social Networking
 
Dangers of Social Media by Alex Berta
Dangers of Social Media by Alex BertaDangers of Social Media by Alex Berta
Dangers of Social Media by Alex Berta
 
Perimeter E-Security: Will Facebook Get You Hired or Fired?
Perimeter E-Security: Will Facebook Get You Hired or Fired?Perimeter E-Security: Will Facebook Get You Hired or Fired?
Perimeter E-Security: Will Facebook Get You Hired or Fired?
 
Pr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointPr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpoint
 
Draft for prezi and poster
Draft for prezi and posterDraft for prezi and poster
Draft for prezi and poster
 
Social networking boon or a bane
Social networking boon or a baneSocial networking boon or a bane
Social networking boon or a bane
 
CYBER SAFETY.pptx
CYBER SAFETY.pptxCYBER SAFETY.pptx
CYBER SAFETY.pptx
 
Bullying, Online Predatory Action And Identity Theft
Bullying, Online Predatory Action And Identity TheftBullying, Online Predatory Action And Identity Theft
Bullying, Online Predatory Action And Identity Theft
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
 
Cybercrime is a Phenomenon that Threatens Community Peace
Cybercrime is a Phenomenon that Threatens Community PeaceCybercrime is a Phenomenon that Threatens Community Peace
Cybercrime is a Phenomenon that Threatens Community Peace
 
EFFECTS OF SOCIAL MEDIA ON YOUTH
EFFECTS OF SOCIAL MEDIA ON YOUTHEFFECTS OF SOCIAL MEDIA ON YOUTH
EFFECTS OF SOCIAL MEDIA ON YOUTH
 
Cyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social DeclineCyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social Decline
 
Cyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to TechnologyCyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to Technology
 
IS 20090 Week 2 - Social Networks
IS 20090 Week 2 - Social NetworksIS 20090 Week 2 - Social Networks
IS 20090 Week 2 - Social Networks
 
Social media ict
Social media ictSocial media ict
Social media ict
 
Social media
Social media Social media
Social media
 
Lis 768 Privacy Presentation
Lis 768 Privacy PresentationLis 768 Privacy Presentation
Lis 768 Privacy Presentation
 

Último

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Último (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 

Facebook

  • 1. UK6153 Cyber Law Cyber Crime in the Social Network Name Matrick No. Date Lecturers : : : : Punithemalar Hariaratnam GP01285 27 July 2013 (Saturday) Dr Rizal Rahman
  • 2. Just what do we mean when we say, Social Network?
  • 3. A social network service focuses on building and reflecting of social networks or social relations among people, e.g., who share interests and/or activities The process of building online communities, often accomplished both through 'groups' and 'friends lists' that allow greater interaction on websites. Interactive communication in which participants in online communities such as Facebook share thoughts, photos, etc. with members of their own personal networks in a controlled way
  • 4. The Law Communications and Multimedia Act 1998 Evidence Act 1950 Penal Code Act Computer Crimes Act 1997
  • 6. A focus on building social relationships among people. Building online communities. Interactive communication among participants.
  • 7. • Facebook claims that 50% of active users log into the site each day. This would mean at least 175 million users every 24 hours • Twitter now has 75 million user accounts (15 million active) • LinkedIn has over 50 million members worldwide. • Facebook currently has in excess of 350 million active users on global basis. Six months ago, this was 250 million. This is over a 40% growth in less than 6 months. • More than 35 million Facebook users update their status each day. • Photo uploads to Facebook have increased by more than 100%. (2.5 billion) • More than 250 Facebook applications have over a Million combined user seach month
  • 8. Cyber Crime • Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs • Computer used as object or subject of a crime • Online activities are Vulnerable to crime and can compromise personal safety just as common everyday unless law makers, law enforcement and individuals need to know how to protect themselves and the persons for which they are responsible
  • 9. The first recorded cyber crime took place in the year 1820! That is not surprising considering the fact that the abacus, which is thought to be the earliest form of a computer, has been around since 3500 B.C. in India, Japan and China. The era of modern computers, however, began with the analytical engine of Charles Babbage. The first spam email took place in 1978 where it was sent over Arpanet (Advance research projects agency network)
  • 10. • With the rising popularity of the social networking websites today, you'll find many Cyber crimes where adults impersonate children, becoming friendly, and then coaxing children to meet face-to-face. This is aserious problem today with youth as young as • 13 years having sanctioned access to these social media and networking sites.
  • 11. Types of cyber crime • Hacking – Unauthorised access to computer • Child pornography – Paedophilia who are sexually attracted to children and use false identity • Denial of service attack – Flooring bandwidth of victim with spam mails • Virus dissemination – Malicious software ie; trojan horse etc • Computer vandalism – Damaging or destroying data • Cyber Terrorism – Hate email • Software piracy – Theft of software through illegal copying • Credit Card Fraud – Hack and misuse your card
  • 12. • • • • • • • • Net extortion – Copying confidential data and extort for huge amounts Phishing – Pulling our confidential info from banks or financial institutions Spoofing – Pretend to be in identity of another computer Cyber Stalking – Following victim by sending email, entering chatroom etc Salami Sttack – Insignificant changes, deducting small amount from individuals account – Confidential info from banks or financial institutions Spoofing – Pretend to be in identity of another computer Cyber Stalking – Following victim by sending email, entering chatroom etc Salami Sttack – Insignificant changes, deducting small amount from individuals account
  • 13.
  • 14. ‘79 per cent of social media users victims of cyber crime’ by Lee Ya Yun, April 6, 2013, Saturday
  • 15. Why social media is the target! • Booming social media popularity • The obvious social media addiction/lure • Social media becoming an ideal place for crime • The vast transition from emails to social media Rising usage of social media over smartphones -
  • 16. Cybercriminals use social media not only to commit crime online, but also for carrying out real world crime owing to “over-sharing” across these social platforms. • A survey of 2,000 home-owners stated that 35% users post their vacation plans on social networking sites. Availability of such authentic information helps the criminals achieve their motives easily. Adding to these reasons, the money associated with the malware market is also a motivation for criminals to attack using social media. • Although social media talks more about individual users, the cyber criminals not only attack the user as an individual, but they also use it as a channel to victimise businesses.
  • 17. MURDERED BY A MAN SHE MET ONLINE . Ashleigh Hall was groomed by Peter Chapman via Facebook after her claimed to be a teenager
  • 18. A study by Cyberoam reveals that disclosures over social media highly affect business. Here is the summary of disclosures in brief:
  • 19. According to Sophos Security Threat Report 2013, Malaysia is the sixth most vulnerable to cyber crime. Listed among the 10 riskiest countries, Malaysia is also reported to be highly exposed to Android PC and devices malware attacks. Remember that in the event of a cyber crime, victims can lodge a report with CyberSecurity Malaysia.
  • 20. Just like any other medium, social media can also become a source of data leakage, intrusions, entry for malicious content, loss of productivity and so on. A good balance between security and social networking can help. How? Here are a few pointers that will help: • Establish an organizational policy for social networking and regularly train them on the safety measures • Monitor access of social networks in your organization • Use strong passwords for your corporate profile on social networking sites
  • 21. • Upgrade IT Network Security with a solution that offers multiple security features and scans HTTPS sites (most social networking sites today are on HTTPS). • When signing up for social media sites, ask employees to avoid using official email address • Caution employees on clicking the links wisely or when installing plugins/pop-ups • Ask them to keep a track on the personal information they post
  • 22. • Request them to avoid allowing social networking services to scan their email address book • Limit the number of persons authorized to blog or tweet on behalf of the company • Choose an official spokesperson for Twitter/Facebook • Ensure that the authorized person knows what can be communicated, and when? • Keep a record of all public/employee disclosures
  • 23. Scams Criminals have been utilizing the scam for centuries. In the Facebook world, scams are particularly effective at drawing people in by simply enticing an individual to click on a link that would interest almost anyone, such as an innocent-looking notification that you’ve won a free prize like a gift card. Then, in order to claim the prize, scammers require you to submit some information, such as a credit card number or Social Security number. This description may make it seem like scams are easy to spot, but even the most savvy social media user has to be on the lookout for illegitimate requests for information.
  • 24. Robbery It doesn’t take much for a thief to find out where you live, go to school, work, or hang out if you make that information readily available on Facebook. If you use Facebook’s check-in or Google Maps feature, then you could be in a heap of trouble if a robber is paying attention. This person isn’t always a complete stranger either; they may be an old acquaintance or someone else you’d never expect to come rob you.
  • 25. Identity theft With the large amount of personal information swarming around Facebook these days, it has become fairly easy for criminals to steal users’ identities. Hackers often break into users’ e-mails and make fake Facebook accounts. From there they can access personal and bank information and cause havoc to your sense of security. Protect yourself from identity theft on Facebook by keeping your profile very secure and free of personal information that a criminal would love to have.
  • 26. Defamation An individual commits the crime of defamation when they communicate a false statement to a third party that paints another individual or entity in a negative light. Facebook makes communicating defamatory statements frighteningly easy, and the exposure Facebook provides makes it more likely that businesses or individuals will be harmed by the defamatory statement, and thus more likely to pursue legal remedies. Be careful what you say on Facebook; you may be committing a crime without even knowing it.
  • 27. Harassment Harassment happens all the time on Facebook. From sexual harassment to assault threats, there has been a significant increase in the number of harassment cases happening on Facebook. It’s not uncommon for sex offenders and sexual predators to prey on unsuspecting victims on Facebook and even pose as a teen or college student. Harassing messages, inappropriate comments, and other persistent behaviors should be reported to Facebook and your local police station.
  • 28. Cyberbullying Cyberbullying is a common occurrence among teenagers on Facebook and one that can result in serious criminal charges if it goes far enough. Cyberbullying on Facebook has contributed to the deaths of several teens who either committed suicide or were killed by a peer. Cyberbullying that involves hacking or password and identity theft may be punishable under state and federal law. When adults engage in this kind of online behavior it is called cyber-harassment or cyberstalking.
  • 29. Stalking The term “stalking” is thrown around a lot on Facebook, and it is often meant as a joke for regularly looking at someone’s profile. However, the actual act of cyberstalking is a common crime on the social networking site and can result in a serious offense. Cyberstalking typically involves harassing a person with messages, written threats, and other persistent online behavior that endangers a person’s safety. Although cyberstalking may seem like nothing more than annoying behavior, it is a legitimate cause for concern in many cases and can even lead to in-person stalking or endangerment if not treated seriously.
  • 30. A good balance between security and productivity is the need of the hour for organisations facing similar challenges due to their presence over social media.