7CS6-60.2 Cyber Security: Presented by
7CS6-60.2 Cyber Security: Presented by
7CS6-60.2 Cyber Security: Presented by
Lecture: 30
Social Media marketing: Security risks
and perils for organizations
Reference: 1. “Cyber Security: Understanding Cyber Crimes, Computer Forensics and Legal Perspectives”,
Nina Godbole and Sunil Belapure, Wiley INDIA.
2. “Cryptography, Network Security and Cyber Laws” by Bernard L.MENEZES and Ravinder
3. To reap other potential revenue benefits and to minimize advertising costs because social
media complements other marketing strategies such as a paid advertising campaign.
5. To collect potential customer profiles. Social media sites have information such as user
profile data, which can be used to target a specific set of users for advertising
Other Tools Used By Organizations
1. Twitter is used with higher priority to reach out to maximum marketers
in the technology space and monitor the space
2. Professional networking tool LinkedIn is used to connect with and create
a community of top executives from the Fortune 500.
3. Facebook as the social group or social community tool is used to drive
more traffic to Websense website and increase awareness about
Websense.
4.YouTube (the video capability tool to run demonstrations of
products/services, etc.) is used to increase the brand awareness and create
a presence for corporate videos.
5.Wikipedia is also used for brand building and driving traffic.
CASE STUDY
20. Cyber Crime : Case Study
Malicious Hacking- Organ Donation Database Deletion
• On 13 January 2010, Google announced that operators, from within China, had hacked into their Google
China operation, stealing intellectual property, trade secrets and, in particular, accessing the email
accounts of human rights activists.
• The attack was thought to have been part of a more widespread cyber attack on companies within China
which has become known as Operation Aurora.
• There was speculation that "insiders" had been involved in the attack, so apparently some Google China
employees were denied access to the company's internal networks after the company's announcement.
• In February 2010, computer experts from the U.S. National Security Agency claimed that the attacks on
Google probably originated from two Chinese universities associated with expertise in computer
science, Shanghai Jiao Tong University and the Shandong Lanxiang Vocational School, the latter having
close links to the Chinese military.
Other Speculations:
• Some commentators speculated as to whether the attack was part of what is thought to be a concerted Chinese
industrial espionage operation aimed at getting “high-tech information to jump-start China's economy”.
• Critics pointed to what was alleged to be a lax attitude to the intellectual property of foreign businesses in
China, letting them operate but then seeking to copy their technology for the benefit of Chinese “national
champions”.
• In Google's case, they may have been concerned about the possible misappropriation of source code or other
technology for the benefit of Chinese rival Baidu.
The Outcome:
In March 2010 Google subsequently decided to cease offering censored results in
China, leading to the closing of its Chinese operation.
22. Cyber security case study on Indian Banks
Lose Million of Rupees
• We all know that cyber crimes in India are increasing and Indian government id loosing
more money day by day because of this.
• Here is a case from India’s Cosmos Bank in Mumbai which happened on August 14.
• In this, the cyber criminals hacked the system of the bank and off nearly 944 Million
rupees ($13.5 Million) through simultaneous withdrawals across 28 countries over a
weekend.
• The cooperative banks told that hackers stole customer information through malware
attack on it’s ATM withdrawal 805 million rupees in approx. 15000 transactions in just
two hours on August 11.
• Apart from this, hackers transferred 139 million rupees to a Hong Kong- based
company’s account.
• The platform they used for this was SWIFT global payments.