7CS6-60.2 Cyber Security: Presented by

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 15

SWAMI KESHVANAND INSTITUTE OF TECHNOLOGY,

MANAGEMENT & GRAMOTHAN

Department of Electronics and Communication Engineering


VIIth Semester

7CS6-60.2 Cyber Security


Presented by:
Gloria Joseph
Assistant Professor
Department of Electronics and Communication Engineering
UNIT-5 PLAN
L-26 Unit -5: Cyber security: Organizational Implications
Introduction,
L-27 Cost of cybercrimes and IPR issues
L-28 Web threats for Organizations,
L-29 Security and privacy Implications
L-30 Social Media marketing: Security risks and perils for
organizations
L-31 Social computing and the associated challenges for
organizations
UNIT 5
CYBER SECURITY: ORGANIZATIONAL IMPLICATIONS

Lecture: 30
Social Media marketing: Security risks
and perils for organizations
Reference: 1. “Cyber Security: Understanding Cyber Crimes, Computer Forensics and Legal Perspectives”,
Nina Godbole and Sunil Belapure, Wiley INDIA.
2. “Cryptography, Network Security and Cyber Laws” by Bernard L.MENEZES and Ravinder

Kumar, Published by : CENGAGE


Social Media Marketing: Security Risks and Perils for
Organizations

• Social media marketing has become dominant in the industry.


According to fall 2009 survey by marketing professionals, usage of
social media sites by large business-to-business (B2B) organizations
shows the following:
1. Facebook is used by 37% of the organizations.
2. LinkedIn is used by 36% of the organizations.
3. Twitter is used by 36% of the organizations.
4. YouTube is used by 22% of the organizations.
5. My Space is used by 6% of the organizations.
Social Media Marketing: Security Risks and Perils for
Organizations

• Although the use of social media marketing site is rampant, there is a


problem related to “social computing” or “social media marketing” –
the problem of privacy threats.
• Exposures to sensitive PI and confidential business information are
possible if due care is not taken by organizations while using the
mode of “social media marketing.”
Social Media - Online Tools.
Understanding Social Media Marketing

• Most professionals today use social technologies for business


purposes.
• Most common usage include: marketing, internal collaboration and
learning, customer service and support, sales, human resources,
strategic planning, product development.
Reasons: organizations use social media marketing: Promote their products and services

1. To be able to reach to a larger target audience in a more spontaneous and instantaneous


manner without paying large advertising fees.
2. To increase traffic to their website coming from other social media websites by using Blogs
and social and business-networking. Companies believe that this, in turn, may increase their
“page rank” resulting in increased traffic from leading search engines.

3. To reap other potential revenue benefits and to minimize advertising costs because social
media complements other marketing strategies such as a paid advertising campaign.

4. To build credibility by participating in relevant product promotion forums and responding


to potential customers’ questions immediately

5. To collect potential customer profiles. Social media sites have information such as user
profile data, which can be used to target a specific set of users for advertising
Other Tools Used By Organizations
1. Twitter is used with higher priority to reach out to maximum marketers
in the technology space and monitor the space
2. Professional networking tool LinkedIn is used to connect with and create
a community of top executives from the Fortune 500.
3. Facebook as the social group or social community tool is used to drive
more traffic to Websense website and increase awareness about
Websense.
4.YouTube (the video capability tool to run demonstrations of
products/services, etc.) is used to increase the brand awareness and create
a presence for corporate videos.
5.Wikipedia is also used for brand building and driving traffic.
CASE STUDY
20. Cyber Crime : Case Study
Malicious Hacking- Organ Donation Database Deletion

1. An organ donation center in Houston ,TEXAS named as LifeGift Organ


Donation Center suffered a huge loss in October 2005 due to malicious hacking
activity done by an employee of the center.
2. Life Gift Organ Donation Center is an organ donation center that coordinates
the newly donated organs with possible recipients in more than 200 hospitals
throughout the southwest regions of the United States.
3. An employee, named Danielle Duann, who was Director of Information
. Technology there, revoked all her administrative rights and passwords into the
system’s network.
• Then, she issued commands to delete numerous database files that contained
organ and their donors and recipients information
• As a result of intrusion, Life Gift incurred a loss of more than $90,000.
• The case was investigated by the FBI ( Federal Bureau of Investigation)
and was being jointly prosecuted by the U.S. Attorney’s Office in Houston
and U.S. Department of Justice’s Copublished in 2008-2009, when the
investigation was still going on.
• According to journals be convicted , then she hasto face 10 years of
imprisonment and/or fine of $250,000.
21. Google and Operation Aurora

• On 13 January 2010, Google announced that operators, from within China, had hacked into their Google
China operation, stealing intellectual property, trade secrets and, in particular, accessing the email
accounts of human rights activists.

• The attack was thought to have been part of a more widespread cyber attack on companies within China
which has become known as Operation Aurora.

• The Intruders were thought of exploiting a weakness in the Microsoft Internet Explorer browser, the


malware used being a modification of the trojan "Hydraq".

• There was speculation that "insiders" had been involved in the attack, so apparently some Google China
employees were denied access to the company's internal networks after the company's announcement.

• In February 2010, computer experts from the U.S. National Security Agency claimed that the attacks on
Google probably originated from two Chinese universities associated with expertise in computer
science, Shanghai Jiao Tong University and the Shandong Lanxiang Vocational School, the latter having
close links to the Chinese military.
Other Speculations:
• Some commentators speculated as to whether the attack was part of what is thought to be a concerted Chinese
industrial espionage operation aimed at getting “high-tech information to jump-start China's economy”.

• Critics pointed to what was alleged to be a lax attitude to the intellectual property of foreign businesses in
China, letting them operate but then seeking to copy their technology for the benefit of Chinese “national
champions”.

• In Google's case, they may have been concerned about the possible misappropriation of source code or other
technology for the benefit of Chinese rival Baidu.

The Outcome:
In March 2010 Google subsequently decided to cease offering censored results in
China, leading to the closing of its Chinese operation.
22. Cyber security case study on Indian Banks
Lose Million of Rupees
• We all know that cyber crimes in India are increasing and Indian government id loosing
more money day by day because of this.
• Here is a case from India’s Cosmos Bank in Mumbai which happened on August 14.
• In this, the cyber criminals hacked the system of the bank and off nearly 944 Million
rupees ($13.5 Million) through simultaneous withdrawals across 28 countries over a
weekend.
• The cooperative banks told that hackers stole customer information through malware
attack on it’s ATM withdrawal 805 million rupees in approx. 15000 transactions in just
two hours on August 11.
• Apart from this, hackers transferred 139 million rupees to a Hong Kong- based
company’s account.
• The platform they used for this was SWIFT global payments.

You might also like