SlideShare uma empresa Scribd logo
1 de 31
UK6153 Cyber Law

Cyber Crime in the Social Network

Name
Matrick No.
Date
Lecturers

:
:
:
:

Punithemalar Hariaratnam
GP01285
27 July 2013 (Saturday)
Dr Rizal Rahman
Just what do we mean when we say,
Social Network?
A social network service focuses on building and reflecting of
social networks or social relations among people, e.g., who
share interests and/or activities
The process of building online communities, often
accomplished both through 'groups' and 'friends lists' that
allow greater interaction on websites.
Interactive communication in which participants in online
communities such as Facebook share thoughts, photos, etc.
with members of their own personal networks in a
controlled way
The Law
Communications and Multimedia Act 1998
Evidence Act 1950
Penal Code Act
Computer Crimes Act 1997
•
•
•
•
•
•
•
•

Facebook.com
MySpace.com
LinkedIn.com
Bebo.com
Friendster.com
hi5.com
Orkut.com
PerfSpot.com
A focus on building social
relationships among people.
Building online communities.
Interactive communication
among participants.
• Facebook claims that 50% of active users log into the site each day.
This would mean at least 175 million users every 24 hours
• Twitter now has 75 million user accounts (15 million active)
• LinkedIn has over 50 million members worldwide.
• Facebook currently has in excess of 350 million active users on
global basis. Six months ago, this was 250 million. This is over a
40% growth in less than 6 months.
• More than 35 million Facebook users update their status each day.
• Photo uploads to Facebook have increased by more than 100%.
(2.5 billion)
• More than 250 Facebook applications have over a Million
combined user seach month
Cyber Crime
• Crime committed using a computer and the internet
to steal a person’s identity or illegal imports or
malicious programs
• Computer used as object or subject of a crime
• Online activities are Vulnerable to crime and can
compromise personal safety just as common
everyday unless law makers, law enforcement and
individuals need to know how to protect themselves
and the persons for which they are responsible
The first recorded cyber crime took place in the
year 1820! That is not surprising considering
the fact that the abacus, which is thought to be
the earliest form of a computer, has been
around since 3500 B.C. in India, Japan and
China. The era of modern computers, however,
began with the analytical engine of Charles
Babbage.

The first spam email took place in 1978 where
it was sent over Arpanet (Advance research
projects agency network)
• With the rising popularity of the social
networking websites today, you'll find many
Cyber crimes where adults impersonate
children, becoming friendly, and then coaxing
children to meet face-to-face. This is aserious
problem today with youth as young as
• 13 years having sanctioned access to these
social media and networking sites.
Types of cyber crime
• Hacking
– Unauthorised access to computer
• Child pornography
– Paedophilia who are sexually attracted to children and use false identity
• Denial of service attack
– Flooring bandwidth of victim with spam mails
• Virus dissemination
– Malicious software ie; trojan horse etc
• Computer vandalism
– Damaging or destroying data
• Cyber Terrorism
– Hate email
• Software piracy
– Theft of software through illegal copying
• Credit Card Fraud
– Hack and misuse your card
•

•
•
•
•

•
•
•

Net extortion
– Copying confidential data and extort for huge amounts
Phishing
– Pulling our confidential info from banks or financial institutions
Spoofing
– Pretend to be in identity of another computer
Cyber Stalking
– Following victim by sending email, entering chatroom etc
Salami Sttack
– Insignificant changes, deducting small amount from individuals account
– Confidential info from banks or financial institutions
Spoofing
– Pretend to be in identity of another computer
Cyber Stalking
– Following victim by sending email, entering chatroom etc
Salami Sttack
– Insignificant changes, deducting small amount from individuals account
‘79 per cent of social media users
victims of cyber crime’

by Lee Ya Yun, April 6, 2013, Saturday
Why social media is the target!

• Booming social media popularity
• The obvious social media addiction/lure
• Social media becoming an ideal place for
crime
• The vast transition from emails to social
media Rising usage of social media over
smartphones -
Cybercriminals use social media not only to commit crime
online, but also for carrying out real world crime owing to
“over-sharing” across these social platforms.
• A survey of 2,000 home-owners stated that 35% users post
their vacation plans on social networking sites. Availability of
such authentic information helps the criminals achieve their
motives easily. Adding to these reasons, the money
associated with the malware market is also a motivation for
criminals to attack using social media.
• Although social media talks more about individual users, the
cyber criminals not only attack the user as an individual, but
they also use it as a channel to victimise businesses.
MURDERED BY A MAN SHE MET ONLINE
.

Ashleigh Hall was groomed by Peter Chapman
via Facebook after her claimed to be a teenager
A study by Cyberoam reveals that disclosures over social media highly affect
business. Here is the summary of disclosures in brief:
According to Sophos Security
Threat Report 2013, Malaysia is
the sixth most vulnerable to
cyber crime.
Listed among the 10 riskiest countries, Malaysia is
also reported to be highly exposed to Android PC and
devices malware attacks. Remember that in the event
of a cyber crime, victims can lodge a report with
CyberSecurity Malaysia.
Just like any other medium, social media can also become a
source of data leakage, intrusions, entry for malicious content,
loss of productivity and so on. A good balance between security
and social networking can help. How? Here are a few pointers
that will help:

• Establish an organizational policy for social networking and
regularly train them on the safety measures
• Monitor access of social networks in your organization
• Use strong passwords for your corporate profile on social
networking sites
• Upgrade IT Network Security with a solution that offers
multiple security features and scans HTTPS sites (most
social networking sites today are on HTTPS).

• When signing up for social media sites, ask employees to
avoid using official email address
• Caution employees on clicking the links wisely or when
installing plugins/pop-ups
• Ask them to keep a track on the personal information
they post
• Request them to avoid allowing social networking services to
scan their email address book
• Limit the number of persons authorized to blog or tweet on
behalf of the company
• Choose an official spokesperson for Twitter/Facebook
• Ensure that the authorized person knows what can be
communicated, and when?
• Keep a record of all public/employee disclosures
Scams
Criminals have been utilizing the scam for centuries. In the
Facebook world, scams are particularly effective at drawing
people in by simply enticing an individual to click on a link that
would interest almost anyone, such as an innocent-looking
notification that you’ve won a free prize like a gift card. Then, in
order to claim the prize, scammers require you to submit some
information, such as a credit card number or Social Security
number. This description may make it seem like scams are easy
to spot, but even the most savvy social media user has to be on
the lookout for illegitimate requests for information.
Robbery
It doesn’t take much for a thief to find out where
you live, go to school, work, or hang out if you make
that information readily available on Facebook. If
you use Facebook’s check-in or Google Maps
feature, then you could be in a heap of trouble if a
robber is paying attention. This person isn’t always a
complete stranger either; they may be an old
acquaintance or someone else you’d never expect to
come rob you.
Identity theft
With the large amount of personal information
swarming around Facebook these days, it has
become fairly easy for criminals to steal users’
identities. Hackers often break into users’ e-mails
and make fake Facebook accounts. From there they
can access personal and bank information and
cause havoc to your sense of security. Protect
yourself from identity theft on Facebook by keeping
your profile very secure and free of personal
information that a criminal would love to have.
Defamation
An individual commits the crime of defamation when
they communicate a false statement to a third party
that paints another individual or entity in a negative
light. Facebook makes communicating defamatory
statements frighteningly easy, and the exposure
Facebook provides makes it more likely that businesses
or individuals will be harmed by the defamatory
statement, and thus more likely to pursue legal
remedies. Be careful what you say on Facebook; you
may be committing a crime without even knowing it.
Harassment
Harassment happens all the time on Facebook. From
sexual harassment to assault threats, there has been
a significant increase in the number of harassment
cases happening on Facebook. It’s not uncommon for
sex offenders and sexual predators to prey on
unsuspecting victims on Facebook and even pose as a
teen or college student. Harassing messages,
inappropriate comments, and other persistent
behaviors should be reported to Facebook and your
local police station.
Cyberbullying
Cyberbullying is a common occurrence among
teenagers on Facebook and one that can result in
serious criminal charges if it goes far enough.
Cyberbullying on Facebook has contributed to the
deaths of several teens who either committed
suicide or were killed by a peer. Cyberbullying that
involves hacking or password and identity theft may
be punishable under state and federal law. When
adults engage in this kind of online behavior it is
called cyber-harassment or cyberstalking.
Stalking
The term “stalking” is thrown around a lot on
Facebook, and it is often meant as a joke for regularly
looking at someone’s profile. However, the actual act
of cyberstalking is a common crime on the social
networking site and can result in a serious offense.
Cyberstalking typically involves harassing a person
with messages, written threats, and other persistent
online behavior that endangers a person’s safety.
Although cyberstalking may seem like nothing more
than annoying behavior, it is a legitimate cause for
concern in many cases and can even lead to in-person
stalking or endangerment if not treated seriously.
A good balance between
security and productivity is the
need of the hour for
organisations facing similar
challenges due to their
presence over social media.
The End
thank you

Mais conteúdo relacionado

Mais procurados

Social media privacy and safety
Social media privacy and safetySocial media privacy and safety
Social media privacy and safetySarah K Miller
 
Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Mohammad Ahmed
 
Social media and the future of social networking
Social media and the future of social networkingSocial media and the future of social networking
Social media and the future of social networkingRussetanSc
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignmentRini Mahade
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media SecurityDel Belcher
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapanTapan Khilar
 
Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingDepartment of Defense
 
Cfadw Presentation
Cfadw PresentationCfadw Presentation
Cfadw Presentationguest09025b
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityDipesh Waghela
 
Cyber security
Cyber securityCyber security
Cyber securitymanoj duli
 
Cybercrime
CybercrimeCybercrime
CybercrimeSERCOD
 
Social networking PPT
Social networking PPTSocial networking PPT
Social networking PPTvarun0912
 
Presentation -- CYBERBULLYING
Presentation  -- CYBERBULLYINGPresentation  -- CYBERBULLYING
Presentation -- CYBERBULLYINGRene Ge
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threatANKUR BAROT
 
impact of social media on youth m.com ppt
impact of social media on youth m.com ppt impact of social media on youth m.com ppt
impact of social media on youth m.com ppt Sudhanshu Sandhir
 

Mais procurados (20)

Social media privacy and safety
Social media privacy and safetySocial media privacy and safety
Social media privacy and safety
 
Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Social media and the future of social networking
Social media and the future of social networkingSocial media and the future of social networking
Social media and the future of social networking
 
Data privacy & social media
Data privacy & social mediaData privacy & social media
Data privacy & social media
 
Cyber law assignment
Cyber law assignmentCyber law assignment
Cyber law assignment
 
Social_Networking_Project
Social_Networking_ProjectSocial_Networking_Project
Social_Networking_Project
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media Security
 
Phishing
PhishingPhishing
Phishing
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
 
Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness Briefing
 
Cfadw Presentation
Cfadw PresentationCfadw Presentation
Cfadw Presentation
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Social networking PPT
Social networking PPTSocial networking PPT
Social networking PPT
 
Presentation -- CYBERBULLYING
Presentation  -- CYBERBULLYINGPresentation  -- CYBERBULLYING
Presentation -- CYBERBULLYING
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threat
 
impact of social media on youth m.com ppt
impact of social media on youth m.com ppt impact of social media on youth m.com ppt
impact of social media on youth m.com ppt
 

Destaque

Cyber-Crime e Social Media
Cyber-Crime e Social MediaCyber-Crime e Social Media
Cyber-Crime e Social MediaManager.it
 
Cyber Crime and Social Media
Cyber Crime and Social MediaCyber Crime and Social Media
Cyber Crime and Social Mediajen-morgan
 
Cyber crime social media &; family
Cyber crime social media &; familyCyber crime social media &; family
Cyber crime social media &; familyDr.Keshav Sathaye
 
Cyber crime in a Smart Phone & Social Media Obsessed World
Cyber crime in a Smart Phone & Social Media Obsessed WorldCyber crime in a Smart Phone & Social Media Obsessed World
Cyber crime in a Smart Phone & Social Media Obsessed WorldJohn Palfreyman
 
Instant Checkmate Background Check Glossary
Instant Checkmate Background Check GlossaryInstant Checkmate Background Check Glossary
Instant Checkmate Background Check GlossaryInstant Checkmate
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...SlideShare
 

Destaque (8)

Cyber-Crime e Social Media
Cyber-Crime e Social MediaCyber-Crime e Social Media
Cyber-Crime e Social Media
 
Cyber Crime and Social Media
Cyber Crime and Social MediaCyber Crime and Social Media
Cyber Crime and Social Media
 
Cyber crime social media &; family
Cyber crime social media &; familyCyber crime social media &; family
Cyber crime social media &; family
 
Social Media & Crime
Social Media & CrimeSocial Media & Crime
Social Media & Crime
 
Cyber crime in a Smart Phone & Social Media Obsessed World
Cyber crime in a Smart Phone & Social Media Obsessed WorldCyber crime in a Smart Phone & Social Media Obsessed World
Cyber crime in a Smart Phone & Social Media Obsessed World
 
Instant Checkmate Background Check Glossary
Instant Checkmate Background Check GlossaryInstant Checkmate Background Check Glossary
Instant Checkmate Background Check Glossary
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...
 

Semelhante a Cyber Crime in Social Media

Cyber Awareness.pptx
Cyber Awareness.pptxCyber Awareness.pptx
Cyber Awareness.pptxadblue2017
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxDominicCaling
 
Advantages & Disadvantages of Social Networking
Advantages & Disadvantages of Social NetworkingAdvantages & Disadvantages of Social Networking
Advantages & Disadvantages of Social NetworkingSofia Naznim
 
Dangers of Social Media by Alex Berta
Dangers of Social Media by Alex BertaDangers of Social Media by Alex Berta
Dangers of Social Media by Alex BertaAlexander Berta
 
Perimeter E-Security: Will Facebook Get You Hired or Fired?
Perimeter E-Security: Will Facebook Get You Hired or Fired?Perimeter E-Security: Will Facebook Get You Hired or Fired?
Perimeter E-Security: Will Facebook Get You Hired or Fired?Taylor Van Sickle
 
Pr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointPr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointhmorrell1
 
Draft for prezi and poster
Draft for prezi and posterDraft for prezi and poster
Draft for prezi and postervictoriahoo
 
Social networking boon or a bane
Social networking boon or a baneSocial networking boon or a bane
Social networking boon or a baneAbhishek Sharma
 
Bullying, Online Predatory Action And Identity Theft
Bullying, Online Predatory Action And Identity TheftBullying, Online Predatory Action And Identity Theft
Bullying, Online Predatory Action And Identity TheftHeather Dionne
 
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfvichu19891
 
Cybercrime is a Phenomenon that Threatens Community Peace
Cybercrime is a Phenomenon that Threatens Community PeaceCybercrime is a Phenomenon that Threatens Community Peace
Cybercrime is a Phenomenon that Threatens Community PeaceMubarak Al Hadadi
 
EFFECTS OF SOCIAL MEDIA ON YOUTH
EFFECTS OF SOCIAL MEDIA ON YOUTHEFFECTS OF SOCIAL MEDIA ON YOUTH
EFFECTS OF SOCIAL MEDIA ON YOUTHYaman Singhania
 
Cyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social DeclineCyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social DeclineIRJET Journal
 
Cyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to TechnologyCyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to Technologyijtsrd
 
IS 20090 Week 2 - Social Networks
IS 20090 Week 2 - Social NetworksIS 20090 Week 2 - Social Networks
IS 20090 Week 2 - Social Networksis20090
 
Lis 768 Privacy Presentation
Lis 768 Privacy PresentationLis 768 Privacy Presentation
Lis 768 Privacy PresentationJulia Bryan-Diehl
 

Semelhante a Cyber Crime in Social Media (20)

Cyber Awareness.pptx
Cyber Awareness.pptxCyber Awareness.pptx
Cyber Awareness.pptx
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptx
 
Advantages & Disadvantages of Social Networking
Advantages & Disadvantages of Social NetworkingAdvantages & Disadvantages of Social Networking
Advantages & Disadvantages of Social Networking
 
Dangers of Social Media by Alex Berta
Dangers of Social Media by Alex BertaDangers of Social Media by Alex Berta
Dangers of Social Media by Alex Berta
 
Perimeter E-Security: Will Facebook Get You Hired or Fired?
Perimeter E-Security: Will Facebook Get You Hired or Fired?Perimeter E-Security: Will Facebook Get You Hired or Fired?
Perimeter E-Security: Will Facebook Get You Hired or Fired?
 
Pr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpointPr cyberbullying campaign powerpoint
Pr cyberbullying campaign powerpoint
 
Draft for prezi and poster
Draft for prezi and posterDraft for prezi and poster
Draft for prezi and poster
 
Social networking boon or a bane
Social networking boon or a baneSocial networking boon or a bane
Social networking boon or a bane
 
CYBER SAFETY.pptx
CYBER SAFETY.pptxCYBER SAFETY.pptx
CYBER SAFETY.pptx
 
Bullying, Online Predatory Action And Identity Theft
Bullying, Online Predatory Action And Identity TheftBullying, Online Predatory Action And Identity Theft
Bullying, Online Predatory Action And Identity Theft
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
 
Cybercrime is a Phenomenon that Threatens Community Peace
Cybercrime is a Phenomenon that Threatens Community PeaceCybercrime is a Phenomenon that Threatens Community Peace
Cybercrime is a Phenomenon that Threatens Community Peace
 
EFFECTS OF SOCIAL MEDIA ON YOUTH
EFFECTS OF SOCIAL MEDIA ON YOUTHEFFECTS OF SOCIAL MEDIA ON YOUTH
EFFECTS OF SOCIAL MEDIA ON YOUTH
 
Cyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social DeclineCyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social Decline
 
Cyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to TechnologyCyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to Technology
 
IS 20090 Week 2 - Social Networks
IS 20090 Week 2 - Social NetworksIS 20090 Week 2 - Social Networks
IS 20090 Week 2 - Social Networks
 
Social media ict
Social media ictSocial media ict
Social media ict
 
Social media
Social media Social media
Social media
 
Lis 768 Privacy Presentation
Lis 768 Privacy PresentationLis 768 Privacy Presentation
Lis 768 Privacy Presentation
 

Último

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Último (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

Cyber Crime in Social Media

  • 1. UK6153 Cyber Law Cyber Crime in the Social Network Name Matrick No. Date Lecturers : : : : Punithemalar Hariaratnam GP01285 27 July 2013 (Saturday) Dr Rizal Rahman
  • 2. Just what do we mean when we say, Social Network?
  • 3. A social network service focuses on building and reflecting of social networks or social relations among people, e.g., who share interests and/or activities The process of building online communities, often accomplished both through 'groups' and 'friends lists' that allow greater interaction on websites. Interactive communication in which participants in online communities such as Facebook share thoughts, photos, etc. with members of their own personal networks in a controlled way
  • 4. The Law Communications and Multimedia Act 1998 Evidence Act 1950 Penal Code Act Computer Crimes Act 1997
  • 6. A focus on building social relationships among people. Building online communities. Interactive communication among participants.
  • 7. • Facebook claims that 50% of active users log into the site each day. This would mean at least 175 million users every 24 hours • Twitter now has 75 million user accounts (15 million active) • LinkedIn has over 50 million members worldwide. • Facebook currently has in excess of 350 million active users on global basis. Six months ago, this was 250 million. This is over a 40% growth in less than 6 months. • More than 35 million Facebook users update their status each day. • Photo uploads to Facebook have increased by more than 100%. (2.5 billion) • More than 250 Facebook applications have over a Million combined user seach month
  • 8. Cyber Crime • Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs • Computer used as object or subject of a crime • Online activities are Vulnerable to crime and can compromise personal safety just as common everyday unless law makers, law enforcement and individuals need to know how to protect themselves and the persons for which they are responsible
  • 9. The first recorded cyber crime took place in the year 1820! That is not surprising considering the fact that the abacus, which is thought to be the earliest form of a computer, has been around since 3500 B.C. in India, Japan and China. The era of modern computers, however, began with the analytical engine of Charles Babbage. The first spam email took place in 1978 where it was sent over Arpanet (Advance research projects agency network)
  • 10. • With the rising popularity of the social networking websites today, you'll find many Cyber crimes where adults impersonate children, becoming friendly, and then coaxing children to meet face-to-face. This is aserious problem today with youth as young as • 13 years having sanctioned access to these social media and networking sites.
  • 11. Types of cyber crime • Hacking – Unauthorised access to computer • Child pornography – Paedophilia who are sexually attracted to children and use false identity • Denial of service attack – Flooring bandwidth of victim with spam mails • Virus dissemination – Malicious software ie; trojan horse etc • Computer vandalism – Damaging or destroying data • Cyber Terrorism – Hate email • Software piracy – Theft of software through illegal copying • Credit Card Fraud – Hack and misuse your card
  • 12. • • • • • • • • Net extortion – Copying confidential data and extort for huge amounts Phishing – Pulling our confidential info from banks or financial institutions Spoofing – Pretend to be in identity of another computer Cyber Stalking – Following victim by sending email, entering chatroom etc Salami Sttack – Insignificant changes, deducting small amount from individuals account – Confidential info from banks or financial institutions Spoofing – Pretend to be in identity of another computer Cyber Stalking – Following victim by sending email, entering chatroom etc Salami Sttack – Insignificant changes, deducting small amount from individuals account
  • 13.
  • 14. ‘79 per cent of social media users victims of cyber crime’ by Lee Ya Yun, April 6, 2013, Saturday
  • 15. Why social media is the target! • Booming social media popularity • The obvious social media addiction/lure • Social media becoming an ideal place for crime • The vast transition from emails to social media Rising usage of social media over smartphones -
  • 16. Cybercriminals use social media not only to commit crime online, but also for carrying out real world crime owing to “over-sharing” across these social platforms. • A survey of 2,000 home-owners stated that 35% users post their vacation plans on social networking sites. Availability of such authentic information helps the criminals achieve their motives easily. Adding to these reasons, the money associated with the malware market is also a motivation for criminals to attack using social media. • Although social media talks more about individual users, the cyber criminals not only attack the user as an individual, but they also use it as a channel to victimise businesses.
  • 17. MURDERED BY A MAN SHE MET ONLINE . Ashleigh Hall was groomed by Peter Chapman via Facebook after her claimed to be a teenager
  • 18. A study by Cyberoam reveals that disclosures over social media highly affect business. Here is the summary of disclosures in brief:
  • 19. According to Sophos Security Threat Report 2013, Malaysia is the sixth most vulnerable to cyber crime. Listed among the 10 riskiest countries, Malaysia is also reported to be highly exposed to Android PC and devices malware attacks. Remember that in the event of a cyber crime, victims can lodge a report with CyberSecurity Malaysia.
  • 20. Just like any other medium, social media can also become a source of data leakage, intrusions, entry for malicious content, loss of productivity and so on. A good balance between security and social networking can help. How? Here are a few pointers that will help: • Establish an organizational policy for social networking and regularly train them on the safety measures • Monitor access of social networks in your organization • Use strong passwords for your corporate profile on social networking sites
  • 21. • Upgrade IT Network Security with a solution that offers multiple security features and scans HTTPS sites (most social networking sites today are on HTTPS). • When signing up for social media sites, ask employees to avoid using official email address • Caution employees on clicking the links wisely or when installing plugins/pop-ups • Ask them to keep a track on the personal information they post
  • 22. • Request them to avoid allowing social networking services to scan their email address book • Limit the number of persons authorized to blog or tweet on behalf of the company • Choose an official spokesperson for Twitter/Facebook • Ensure that the authorized person knows what can be communicated, and when? • Keep a record of all public/employee disclosures
  • 23. Scams Criminals have been utilizing the scam for centuries. In the Facebook world, scams are particularly effective at drawing people in by simply enticing an individual to click on a link that would interest almost anyone, such as an innocent-looking notification that you’ve won a free prize like a gift card. Then, in order to claim the prize, scammers require you to submit some information, such as a credit card number or Social Security number. This description may make it seem like scams are easy to spot, but even the most savvy social media user has to be on the lookout for illegitimate requests for information.
  • 24. Robbery It doesn’t take much for a thief to find out where you live, go to school, work, or hang out if you make that information readily available on Facebook. If you use Facebook’s check-in or Google Maps feature, then you could be in a heap of trouble if a robber is paying attention. This person isn’t always a complete stranger either; they may be an old acquaintance or someone else you’d never expect to come rob you.
  • 25. Identity theft With the large amount of personal information swarming around Facebook these days, it has become fairly easy for criminals to steal users’ identities. Hackers often break into users’ e-mails and make fake Facebook accounts. From there they can access personal and bank information and cause havoc to your sense of security. Protect yourself from identity theft on Facebook by keeping your profile very secure and free of personal information that a criminal would love to have.
  • 26. Defamation An individual commits the crime of defamation when they communicate a false statement to a third party that paints another individual or entity in a negative light. Facebook makes communicating defamatory statements frighteningly easy, and the exposure Facebook provides makes it more likely that businesses or individuals will be harmed by the defamatory statement, and thus more likely to pursue legal remedies. Be careful what you say on Facebook; you may be committing a crime without even knowing it.
  • 27. Harassment Harassment happens all the time on Facebook. From sexual harassment to assault threats, there has been a significant increase in the number of harassment cases happening on Facebook. It’s not uncommon for sex offenders and sexual predators to prey on unsuspecting victims on Facebook and even pose as a teen or college student. Harassing messages, inappropriate comments, and other persistent behaviors should be reported to Facebook and your local police station.
  • 28. Cyberbullying Cyberbullying is a common occurrence among teenagers on Facebook and one that can result in serious criminal charges if it goes far enough. Cyberbullying on Facebook has contributed to the deaths of several teens who either committed suicide or were killed by a peer. Cyberbullying that involves hacking or password and identity theft may be punishable under state and federal law. When adults engage in this kind of online behavior it is called cyber-harassment or cyberstalking.
  • 29. Stalking The term “stalking” is thrown around a lot on Facebook, and it is often meant as a joke for regularly looking at someone’s profile. However, the actual act of cyberstalking is a common crime on the social networking site and can result in a serious offense. Cyberstalking typically involves harassing a person with messages, written threats, and other persistent online behavior that endangers a person’s safety. Although cyberstalking may seem like nothing more than annoying behavior, it is a legitimate cause for concern in many cases and can even lead to in-person stalking or endangerment if not treated seriously.
  • 30. A good balance between security and productivity is the need of the hour for organisations facing similar challenges due to their presence over social media.