Use of Social Media

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 61

Facebook

Billion plus users 1.19

Originally used for social rather than


professional networking
Users can upload status updates,
photos, videos, links etc

Gps allow conversations around


particular topics

INTRO PART - 1 PART - 2 PART - 3 PART - 4 CONCL 32


1
Twitter

Online social networking svc that enables


users to send and read short 140-
character msgs called "tweets“

Twitter has more than 500 million users

million are active users 302

INTRO PART - 1 PART - 2 PART - 3 PART - 4 CONCL 33


2
Linked - In

Linked-In is a social networking site


designed primarily for the business
community

A Linked-In member’s profile page is an


online CV

More than 364 million acquired users in


more than 200 countries and territories

INTRO PART - 1 PART - 2 PART - 3 PART - 4 CONCL 34


3
Skype

Skype is the widely used VoIP (Voice over


IP) software

Choice of masses for official and pte voice/


video comm

INTRO PART - 1 PART - 2 PART - 3 PART - 4 CONCL 35


4
VULN DIMENSIONS
Social Engineering

Human users are the most vuln link in any given


info security sys
Social engineering can be anything from an
authoritative phone call, to impersonating tech sp,
like mindedness or friendship

STUXNET, attk on Iranian nuc facility is a brilliant


example in recent past

INTRO PART - 1 PART - 2 PART - 3 PART - 4 CONCL 37


6
IP Address

IP address is short form of Internet Protocol (IP)


address

An IP address is an identifier for a cptr or device on


a TCP/IP network

IP by itself is something like the postal sys

INTRO PART - 1 PART - 2 PART - 3 PART - 4 CONCL 38


7
Geo-Tagging

Geo-tagging is the process of att loc info to content


such as a photograph or video

Adding geo-loc metadata to an image or social


media post using GPS, Wi-Fi and cell-tower
triangulation

Geo-coordinates are often also reported to apps


running on a cell phone

INTRO PART - 1 PART - 2 PART - 3 PART - 4 CONCL 39


8
Bio - Tagging

Tgt profiling - New heights of Biometric – Tagging

Smart phones with embedded front and back high


pixel value cameras

Present era smart phones have the inbuilt feature


of capturing bio details of the user’s incl facial,
voice, iris, skin texture, voice recognition,
fingerprint scanning and finger vein identification

INTRO PART - 1 PART - 2 PART - 3 PART - 4 CONCL 40


9
Hacking

Playing games, op bank accts and media usage with


off the shelf android apps can encourage hackers to
accomplish ID and data theft

INTRO PART - 1 PART - 2 PART - 3 PART - 4 CONCL 41


10
Remote OP

Certain apps associated with social media can enable


a media manipulator to use your device remotely

Can use one’s device to make calls, post e-mails,


listen and record sounds, op camera even once the
device is sw off

INTRO PART - 1 PART - 2 PART - 3 PART - 4 CONCL 42


11
Device Destruction

Social media apps having con over battery use and


charging are cap to destroy the part of device
using remote asst

INTRO PART - 1 PART - 2 PART - 3 PART - 4 CONCL 43


12
Baiting / Insider Threat

Someone gives you a USB drive or other elec media


that is preloaded with malware in the hope you will
use the device and enable them to hack your cptr

INTRO PART - 1 PART - 2 PART - 3 PART - 4 CONCL 44


13
Click Jacking

Concealing hyperlinks beneath legitimate clickable


content

Numerous click-jacking scams have employed “Like”


and “Share” buttons on social networking sites

INTRO PART - 1 PART - 2 PART - 3 PART - 4 CONCL 45


14
Cross Site Scripting (XSS)

Malicious code is injected into a benign or


trusted website

A malicious code is permanently stored on a


server; a computer is compromised when
requesting the stored data

INTRO PART - 1 PART - 2 PART - 3 PART - 4 CONCL 46


15
Doxing

Publicly releasing a person’s identifying information


including full name, date of birth, address, and pictures
typically retrieved from social networking site profiles

INTRO PART - 1 PART - 2 PART - 3 PART - 4 CONCL 47


16
Elicitation

The strategic use of conversation to extract info from


people without giving them the feeling they are being intr

INTRO PART - 1 PART


PART - 2- 2 PART - 3 PART - 4 CONCL 48
17
Pharming

Redirecting users from legitimate web sites to fraudulent


ones for the purpose of extracting confidential data e.g
mimicking bank websites

INTRO PART - 1 PART


PART - 2- 2 PART - 3 PART - 4 CONCL 49
18
Phishing

Usually an email that looks like it is from a legitimate


org or person, but is not and contains a link or file
with malware

INTRO PART - 1 PART


PART - 2- 2 PART - 3 PART - 4 CONCL 50
19
Spoofing

Deceiving cptrs or cptr users by hiding or faking one’s


identity

INTRO PART - 1 PART


PART - 2- 2 PART - 3 PART - 4 CONCL 51
20
Risk
Hackers,
Social business
networking competitors
sites may be and
used foreign
to state
design a actors
specific
Once information is posted to a social networking site, it is
troll
attacksocial
that networking
does
no longer private not comesites
bylooking
way of for
the info or
social people to
networking
target
site for exploitation

No control Constant Specialized


once posted Monitoring attacks

INTRO PART - 1 PART


PART - 2- 2 PART - 3 PART - 4 CONCL 52
21
EFFECTS ON PAKISTAN’S SOCIO –
PART-III MIL CULTURE AND MODELS AVAL
EFFECTS ON PAKISTAN’S SOCIO –
MIL CULTURE AND MODELS AVAL
Tgt Audience

Internet penetration has reached to 70% with 120


million mob users

INTRO PART - 1 PART - 2 PART - 3 PART - 4 CONCL 55


Youth and Literate Class

Affluent segment of society

Literate and intellectuals

Youth both literate, well off and


carefree, high value tgt for
manipulators

Ideologically motivated people op


in this segment

INTRO PART - 1 PART - 2 PART - 3 PART - 4 CONCL 56


Common Masses

Common public

Social media users mostly business


class and youth

Social media is being used by


street hawkers and beggars
A virtual heaven for terrorists and
crime mongers

INTRO PART - 1 PART - 2 PART - 3 PART - 4 CONCL 57


Decision Makers

INTRO PART - 1 PART - 2 PART - 3 PART - 4 CONCL 58


Mil Pers

INTRO PART - 1 PART - 2 PART - 3 PART - 4 CONCL 59


Politicians

INTRO PART - 1 PART - 2 PART - 3 PART - 4 CONCL 60


Journalists

INTRO PART - 1 PART - 2 PART - 3 PART - 4 CONCL 61


Advantages of Social Media

Social Skills

Independence and Self-expression

Digital Competence

Educational Development

Research

INTRO PART - 1 PART - 2 PART - 3 PART - 4 CONCL 62


Add Adv for Youth with Disabilities

Can express themselves freely, including their


thoughts and feelings

More willing to ask for help online than in


face-to-face situations

Young adults who experience difficulty with social


skills can socialize anonymously and can
experiment with different persons

INTRO PART - 1 PART - 2 PART - 3 PART - 4 CONCL 63


Disadvantages of Social Networking
Sharing Personal Info with the
Wrong Crowd

Bullying

The Permanency of Online Profiles

Disclosure

INTRO PART - 1 PART - 2 PART - 3 PART - 4 CONCL 64


Disadvantages of Social Networking

Addl Potential Risks for Youth with Disabilities

Social networking may further isolate those who


already feel isolated ultimately leading to
depression and loneliness

Unintended disclosure is possible by posting


pictures or becoming fans of disability support
groups

INTRO PART - 1 PART - 2 PART - 3 PART - 4 CONCL 65


Use of Social Media for Mil Purposes

Psy Op

Open Source Int

Cyber Espionage

Malicious Code

INTRO PART - 1 PART - 2 PART - 3 PART - 4 CONCL 66


Use of Social Media for Mil Purposes

Offn Purposes

AOI Assessment

Fading Op and Strat Deception

Mass Comm Media

INTRO PART - 1 PART - 2 PART - 3 PART - 4 CONCL 67


Models - US Model

Keep social media svcs aval to everyone in accordance


with spirit of freedom but within state con

INTRO PART - 1 PART - 2 PART - 3 PART - 4 CONCL 68


Adv

Keeps populace in step with global trends

Masses remain confident and dynamic

Gradual learning seeps well in human conscious

INTRO PART - 1 PART - 2 PART - 3 PART - 4 CONCL 69


DisAdv

State needs to be tech ahead to check human


ingenuity

Not feasible in absence of appropriate laws and


judicial sys

Needs proper accounting, tech distr and op strat

INTRO PART - 1 PART - 2 PART - 3 PART - 4 CONCL 70


Models - EU Model

Keep social media svcs aval to everyone, but under


con of social mechanism

INTRO PART - 1 PART - 2 PART - 3 PART - 4 CONCL 71


Adv
Integrates freely and usefully contributes to grow eco

Goes in offn mode for external audience

Consolidates spirit of EU

Vents people emotions and enables state to make


corrections

Spirit of society grows strong

INTRO PART - 1 PART - 2 PART - 3 PART - 4 CONCL 72


DisAdv

Spirit of peaceful states coexistence is req

Masses need to be well educated

Mature society is req

INTRO PART - 1 PART - 2 PART - 3 PART - 4 CONCL 73


Models - Chinese Model

No global social media svcs for masses, for domestic


consumption specifically tailored apps are aval

INTRO PART - 1 PART - 2 PART - 3 PART - 4 CONCL 74


Adv

Nearly complete cordoning of people mindset

Helps masses to use Chinese language based tech

Assists internal eco drive

INTRO PART - 1 PART - 2 PART - 3 PART - 4 CONCL 75


DisAdv

Masses lag behind global trends and dev

Gradually a depressive envmt sets in

A higher lvl of tech and int con is req

A communist or similar state is needed

INTRO PART - 1 PART - 2 PART - 3 PART - 4 CONCL 76


Recommended Model
Keeping in view the domestic envmt, founding
ideology and regional strat envmt of Pakistan, US
Model is recommended for exec

INTRO PART - 1 PART - 2 PART - 3 PART - 4 CONCL 77


Domestic Profile

The domestic profile and usage has caused a number of


problems in different segments of society
INTRO PART - 1 PART - 2 PART - 3 PART - 4 CONCL 78
Domestic Profile

Cyber laws are being outlined and formulated, but it


shall take time for gaining maturity and implementation
INTRO PART - 1 PART - 2 PART - 3 PART - 4 CONCL 79
Domestic Profile

Sorting of mobile SIMs and IP addresses have resolved


the security issue to some extent
INTRO PART - 1 PART - 2 PART - 3 PART - 4 CONCL 80
Domestic Profile

User of social media remains vuln and cyber def has to


be at indl lvl
INTRO PART - 1 PART - 2 PART - 3 PART - 4 CONCL 81
SUGGESTED REMEDIAL
PART-IV
MEASURES
Response

Concept of Def in depth must be built

Focus on defending what is really imp

By trying to defend everything, we defend nothing

INTRO PART - 1 PART - 2 PART - 3 PART - 4 CONCL 83


General
Avoid disclosing official entity while purchasing devices and avoid bulk
purchase from single vendor

Ensure min / no time in order placing and delivery

Smart phones should not be allowed in sensitive offices even if it is


switched off

Avoid sensitive chat on smart phone

Avoid sensitive discussion in the vicinity of smart phones

Do not save contacts or favourite lists with ranks/ appts even names be
stored in pers encrypted form
INTRO PART - 1 PART - 2 PART - 3 PART
PART -- 44 CONCL 84
General
Avoid using internet on pers mob. Use it on sec smart phone or use
licensed internet shield software if using only one smart phone

Avoid using public Wi-Fi networks/free hotspots

Remain restd to friends and family instead of going pub

Never post any info regarding an upcoming event or visit

Avoid on line banking, in case of unavoidable circumstances use secure


link

Preferably a smart phone used by imp person /sensitive appt should not
be sold, if no longer in use may be destroyed
INTRO PART - 1 PART - 2 PART - 3 PART
PART -- 44 CONCL 85
General
Disable option of external assistance

Defragment and scan your device frequently

Abide by cyber laws

Never use gifted USBs and other lucrative devices for official purposes

INTRO PART - 1 PART - 2 PART - 3 PART


PART -- 44 CONCL 86
Softwares / Apps
Free apps like WhatsApp, Viber, Facebook, Twitter and Linked-In may not
be used by Army pers and their families

Use strong passwords normally a combination of more than 8 alphas,


numeric and symbols

Disable GPS on devices to avoid disclosure of user loc

Avoid placing profile pictures on Facebook and other social media accts

Limit the amount of pers info on social networking sites

Ensure ctr checking of actual identity before adding a per to friend list
INTRO PART - 1 PART - 2 PART - 3 PART
PART -- 44 CONCL 87
Softwares / Apps
Do not share docus or any file

Do not use google or any other backup online storage

Keep op sys, apps and plugins updated (through actual sites)

Only use/ install licensed software. Avoid downloading progms from


untrusted internet resources

Ensure windows Firewall is enabled

Use web browsers which sp safe Browsing


INTRO PART - 1 PART - 2 PART - 3 PART
PART -- 44 CONCL 88
Softwares / Apps

Certain apps/ games etc ask for password, avoid such apps

Desktop version of WhatsApp appl because of an inbuilt flaw may not be


used by Army pers especially holding sensitive appts

INTRO PART - 1 PART - 2 PART - 3 PART


PART -- 44 CONCL 89
Hardware
Use strong password device security and ensure to change it frequently

Apply privacy settings on pers accts of children/ families

Devices camera should be blocked by pasting stickers when not in use

Avoid smart phone repair

Wipe all pers data before selling or giving away used smartphone of lower
precedence

Avoid storing / sharing sensitive pers data on smart phones / mob phones
running free apps
INTRO PART - 1 PART - 2 PART - 3 PART
PART -- 44 CONCL 90
Conclusion

INTRO PART - 1 PART - 2 PART - 3 PART - 4 CONCL


CONCL 91
Q
&
Questions

A Answers

You might also like