Professional Documents
Culture Documents
PAPER NAME
Irjet-v2i391.pdf
4 Pages 187.7KB
May 26, 2022 2:53 PM GMT+5:30 May 26, 2022 2:54 PM GMT+5:30
Summary
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Abstract - The growth of Internet is increasing day networks. According to cyber terms threat is generating
by day and users of internet are also increasing possible harm to security by exploiting vulnerability and
regularly. The tremendous growth of internet also attack is to get illegal access to depiction, demolish,
leads to increment in cyber attacks. Security threats immobilize, modify, and lift sensitive information.
and attacks are violating cyber rules and regulations.
International Telecommunication Union
It also affects data and information available on
Telecommunication (ITU-T) is a United Nations agency
internet and steals personal information of users who
which developed standards known as Open Systems
are locating their secret information online. The
Interconnection (OSI). The OSI protocol architecture
major problem is there when threats and attacks are
with RFC 2828 has been defined definition of Threat and
affecting to financial transaction performed by user
Attacks given bellow [1]:
online and secret information available online on
social media. The standard rules and regulation for 2
Threat (According to OSI RFC 2828)
internet and cyber security are there but not enough
to protect data online available on social media and it A potential for violation of security, which exists when
is also not useful to get defence from threats and there is a circumstance, capability, action, or event that
attacks by legitimate or unlawful users of social could breach security and cause harm. That is, a threat is
networking sites and applications. This leads to study a possible danger that might exploit vulnerability.
of threats and attacks of social media and approaches
to defend it from others. This paper presents depth Attack (According to OSI RFC 2828)
study of threats and attacks available on social media 2
webs and applications and various ways to defend it. An assault on system security that derives from an
The paper discusses characteristics of threats and intelligent threat. That is, an intelligent act that is a
attacks on social media and also discusses about deliberate attempt (especially in the sense of a method
vulnerable sites and applications. Paper is useful to or technique) to evade security services and violate the
protect their data and information to them who are security policy of a system.
providing their personal and secret data as well as
Threat based attack is a kind of attack which is using
information online via social media. This paper is also
different technique to penetrate user of cyber
discusses about the case study of threats and attacks
environment. The infected file which come from spam or
available on Facebook, largest popular site of social
anyway of an internet downloading also part of thread
media, and various way to defend it.
based attack. Generally, it tries to exploit various
Keywords Threats, Attacks, Social Media, Cyber vulnerabilities to come across with system. An attacker
can exploit multiple different points of entry with single
security, Cyber protection
attack by parallel multiple diverse attacks.
1
INTRODUCTION
THREATS AND ATTACKS OF SOCIAL MEDIA
The era of digital world, in which all economy, GENERALIZATION
governance and business routines depends on
information solution based on computer networks.
History of Cyber Threats & Attack
Threats and attacks are also increasing to destroy an 1
The history of cyber threats and attack is very
information solution available through computer
interesting and here we have drafted only those threats
3
© 2015, IRJET.NET- All Rights Reserved Page 708
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
cross sites is also kind of attack which can run hidden Embattled Phishing
and allow malware to get into your system.
Especially for stealing money or confidential information
The second is click jacking which is also known as UI this attacks are carried out. The case of Hydraq attacks,
redressing. This is coming into a picture when user in initial of 2010, compromised multinational companies’
relieves their personal information and apparently essential information. Using system vulnerability,
innocently clicks on web pages. This attack is uses attackers develop fright and unease instead of, to get
embedded code rather script which can execute without users to part with their money and this is very specific
knowledge of user. It is having some curious messages and targeted attack and its chances are more to get
also which attract users to click on web page like success.
“Beautiful girl is in party” and “Funny stories related to
condom”. When user will try to click on link it will spear Bogus Accounts
it across the friend profile within user’s account.
The most grave social media threats gets emphasized
The third one is survey rip-off which tries to install from when fake or bogus account has successful connection
the application which is used by user. The threat owner with so many people of various institutes, corporate and
and attackers are trying to get advantages of recently specially military, government and security firms. The
published news related topic such as the Indian Prime best example of this when In July 2010, Robin Sage – a
Minister Mr. Narendra Modi visited US, which leads you faked profile pressed request to people randomly and
to fake site of video and trying to get a survey. It is people were accepting without knowing.
another way for money making from users.
Exploitation of Celebrity Names
In various social networking sites the Facebook is the
largest risky site and according to the survey form users Today, this is most popular. This is the best way to
81% Facebook is risky and out of them 60% says that it spread rumours and misinformation as well as to attack
is a riskiest site where Twitter and MySpace received 8% followers which can spam. There have been various
for risk point of view and LinkedIn with 3%.[2] occurrences when hacker is creating account by using
name of celebrity. For example, Fan club of Angelina
TOPMOST SOCIAL MEDIA THREATS Jolie. Attacker is extracting individual’s personal
information to misuse it. There is no real authentication
According to general information available on internet or identity check to protect against such kind of threats.
82% of employees any organization are using Facebook,
62% and 46% are using blogs and micro blogs Conciliation of Websites
subsequently, 69% are using GTalk and 61% are using
messenger of yahoo. Compromises with any social networking site with some
malicious code in which any site visitor has been
Here, paper discusses methods of attacks and topmost attacked by attacker. Attacker or hacker have to find the
key social media threats: [3] way to insert such kind of malicious code into popup or
advertisements by through attacker can enter in users
Social Engineering Threat computer to get their personal information.
Presently, social engineering is very famous threat for Dissemination spam and Malware
cyber criminals. It allows attacker to find out personal
information of any individuals. Attackers are making this Most popular social networking sites include Facebook
happen by using information available online or from and Twitter is most popular to spread malware. The
company database, by using fake account and create shortened URLs have risen to various threats of social
trust over the time. After getting trust from user attacker media. By masking their links, cyber criminals with short
is staring to collect personal information of individual by URL, making tricky for user to identify difference
asking him/her. Information includes name of project between legitimate or malicious site. Various social
people are doing, name of server on which they are networking sites used to spread news and links within
working and go through website which drop a backdoor short period of time for which these kinds of threats are
to their computer. possible.
TOP SOURCES
The sources with the highest number of matches within the submission. Overlapping sources will not be
displayed.
coursehero.com
2 3%
Internet
Sources overview
Similarity Report ID: oid:30110:17663672
EXCLUDED SOURCES
irjet.net
94%
Internet
innovativeresearchpublication.com
88%
Internet
csi-india.org
32%
Internet
cmrtc.ac.in
29%
Internet
slideshare.net
6%
Internet
kipdf.com
4%
Internet
pdffox.com
4%
Internet
scribd.com
4%
Internet
ijert.org
3%
Internet
issuu.com
3%
Internet
irjet.net
3%
Internet
es.scribd.com
3%
Internet
kiarash.net
3%
Internet
cpesq8.com
3%
Internet
speakerdeck.com
3%
Internet
ebin.pub
3%
Internet
dokumen.pub
3%
Internet
1pdf.net
3%
Internet
medium.com
3%
Internet
tutorsonspot.com
3%
Internet
academicscope.com
3%
Internet
sharif.edu
3%
Internet
answer.theacademicessays.com
3%
Internet
ijret.net
3%
Internet
pdfs.semanticscholar.org
2%
Internet
mafiadoc.com
2%
Internet
ijraset.com
2%
Internet
atme.in
2%
Internet