Professional Documents
Culture Documents
Darin L. Tate
CYB-110
Social Networking
Social Networking is the use of online websites and applications to stay in contact with friends,
family, coworkers, and customers. It can have either a social or business purpose or even both. In
the last few years, it has become a vast base for people to use to find customers for their
businesses.
Social Engineering – A tactic used by hackers and cybercriminals, where they take
information from individuals to make believable fake accounts that they can use to gain
information to gain access to servers or even get someone to create a backdoor into
system unknowingly.
Targeted Phishing attacks – Attacks that use fear and anxiety to get people to part with
their money
Fake accounts – When people make fake accounts and then sends out friend requests to
various people, hoping that someone will accept them. After getting a person to accept
their invite, they can find out different information that could be used to either gain the
Celebrity name misuse – Using the name of a famous person to spread misinformation
Avoid short links – Cybercriminals likes to hide suspicious links behind short links
because it is hard to determine whether or not the site behind them are legitimate or one
Verify – Before you give out any information, verify the person is who you are supposed
to talk to.
Training – Educate your employees to avoid common mistakes that could be made and to
E-Mails
Links – Links that can lead to malicious sites can be hidden in the body of e-mails or as
part of an attachment.
Attachments – Hackers love to hide things like ransomware, keyloggers and other forms
Social Engineering – Cybercriminals are always looking for ways to get their victims to
Have antivirus software scan any attachments before you open them.
Do not click on any short links. Type out links to make sure that you are going to a
legitimate website.
References:
Qing, L. Y. (2020). Top 5 social networking business threats. Retrieved from
https://www.zdnet.com/article/top-5-social-networking-business-threats/
solution-threat-simulation-2/