main social media

Upload: tanyasharma

Post on 01-Jun-2018

217 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/9/2019 Main Social Media

    1/18

    Crimes on social media

    Good content always has an objective; its created with intent. It therefore carries triggers to

    action.

    The best way to define social media is to break it down. edia is an instr!ment on

    comm!nication" like a news#a#er or a radio" so social media wo!ld be a social instr!ment of

    comm!nication. $ocial edia was created by the #!r#ose of having a common interest and

    brining those #eo#le of different comm!nities together to share their interest on a #latform"

    $ocial networking has enco!raged new ways to comm!nicate and share information. $!ch

    %eb sites are !sed by millions of #eo#le every day.

    &ltho!gh having different social media sites the !sage may also differ in many contrasting

    ways"

    It being %eb' based #rovides a variety of ways for !sers to interact" s!ch as e'mail and

    instant messaging services which enables !sers to #rovide them with their basic information

    which they share and let #eo#le e(cess their acco!nts .any of the sites have comm!nities or

    s!bgro!#s that may be based on a #artic!lar interest.

    )ere are some e(am#les of social media websites*

    + $ocial ,ookmarking* -el.icio.!s" ,linklist" $im#y/ Interact by tagging websites and

    searching thro!gh websites bookmarked by other #eo#le.

    + $ocial 0ews* -igg" 1ro#eller" 2eddit/ Interact by voting for articles and commenting on

    them.

    + $ocial 0etworking*-3acebook" )i4" 5ast.3/ Interact by adding friends" commenting on

    #rofiles" joining gro!#s and having disc!ssions.

    + $ocial 1hoto and 6ideo $haring* -7o!T!be" 3lickr/ Interact by sharing #hotos orvideos and

    commenting on !ser s!bmissions.

    + %ikis. -%iki#edia" %ikia/ Interact by adding articles and editing e(isting articles. 8

    1 Article by Daneial Nations

  • 8/9/2019 Main Social Media

    2/18

    oreover" with the #o#!lation growth and the #revailing !se of these sites also has a

    dangero!s side towards them. $ome of the #roblems which occ!r while !sing the social

    networking sites are mainly*

    8. 9nco!raging #oor grammar" !sage" and s#elling

    :. &llowing the s#read of misinformation that may be #erceived as fact even in light of

    evidence to the contrary

    .9(#osing children to online #redators

  • 8/9/2019 Main Social Media

    3/18

    commenting"

    #hotogra'#hy related

    networking"

    worldwide

    older

    Google ,!DD General @#en

    )i4 General. 1o#!lar in

    India" 1ort!gal"

    ongolia" Thailand"

    2omania" Eamaica"

    Central &frica and

    5atin &merica. 0ot

    #o#!lar in the B$&.

    @#en to #eo#le 8 and

    older. 0o children

    allowed

    5inkedIn ,!siness and

    #rofessional

    networking

    @#en to #eo#le 8A and

    older

    o!th$h!t.com $ocial 0etwork" social

    media" cons!mer

    reviews

    @#en

    y @#era ,logging" mobile

    blogging" sharing#hotos" connecting

    with friends. Global

    @#en

    y$#ace General. )T5 based

    site.

    @#en to ages 8 and

    !#.

    0etlog General. 1o#!lar in

    9!ro#e" T!rkey" the

    &rab %orld and

    CanadaFs !Hbec

    #rov'ince. 3ormerly

    known as 3acebo( and

    2edbo(.

    @#en to #eo#le 8 and

    older

    @rk!t General. @wned by

    Google Inc. 1o#!lar in

    ,raDil and

    decreasingly" in India.

    @#en to #eo#le 8A and

    older" -Google login/

    Tagged General. $!bject to @#en

  • 8/9/2019 Main Social Media

    4/18

    !ite some contro'

    versy abo!t its e'mail

    marketing and #rivacy

    #olicy

    Twitter General. icro'

    blogging" 2$$"

    !#dates

    @#en

    %&70 Travel and lifestyle @#en to #eo#le 8A and

    older

    These are some #o#!lar sites de#icting the vario!s social media sites giving the general view

    and age limit which are re!ired to be #art of these sites.

    INDIAN YOUTH ABOUT THE SOCIAL NETWORKING SITES

    The Indian yo!th have immediately taken to social net'working sites" m!ch in the same way

    they took !# internet as a technology. )arnessing the #ower of Internet" abo!t >4 #ercent of

    IndiaFs yo!th #refers social media over #hone calls to comm!nicate" with more st!dents !sing

    the 0et for school'related tasks. Tata Cons!ltancy $ervices -TC$/ Gen'7 s!rvey :J8:'8"

    revealed that todayFs yo!th are collaborating thro!gh social networking tools and b!ilding

    virt!al comm!nities aided by affordable bandwidth and smart device. The e(ha!stive st!dy

    by IndiaFs largest software services e(#orter covered nearly 8>"4JJ high'school st!dents

    across 8< Indian cities and claimed to have cond!cted the first s!ch s!rvey in India.

  • 8/9/2019 Main Social Media

    5/18

    %ith the rise of social media" b!rglars have easier access to s#ecific information regarding

    homeowners than ever before. Twitter and 3acebook are most #rone sites to s!ch ha##enings

    as they let #eo#le share their #ersonal belongings so o#enly on these sites that all the #ersonal

    st!ff is easily accessible to almost to everyone. The basic where abo!t of any individ!al are

    #resent on these sites which lets these b!rglars access easily. &ccording to the s!rvey" a thief

    steals an average of M from a home on a single visit and this all ha##ened beca!se of the

    #ersons #osting constant !#dates abo!t himself 4. @ther social networking a##lications" s!ch

    as fo!rs!are and Go walla are #rimarily location'based networks which also add to this tally.

    2. S!"al E#g"#$$r"#g % &'"('"#g

    $ocial engineering which refers to refers to the social mani#!lation of large gro!#s of #eo#le

    to meet #olitical or economic ends. This is a ty#e of confidence trick for the #!r#ose of

    information gathering" fra!d" or com#!ter system access. It differs from traditional cons in

    that often the attack is often a mere ste# in a more com#le( fra!d=

    1hishing is the act of attem#ting to ac!ire information s!ch as !sernames" #asswords" and

    credit card details -and sometimes" indirectly" money/ by mas!erading as a tr!stworthy

    entity in an electronic comm!nication. 1hishing is an e(am#le of social engineering

    techni!es !sed to deceive !sers" and e(#loits the #oor !sability of c!rrent web sec!rity

    technologies.>

    ). Mal*ar$

    alware related scams involving social networking sites are seen !ite fre!ently these days.

    any incidents have come to the forefront in the last few months" and the #roblem seem

    rising every day. This #roves that how malware writers foc!s on the web as their #rimary

    target" and it has shown the v!lnerability of social networking sites as well. This is the reason

    why sites like Twitter and 3acebook have taken ste#s to enhance their sec!rity from e(#licit

    links and #o#'!#s. $ome #ercentages" 3acebook* =JN y$#ace* 8AN. Twitter* 8>N

    5inkedIn*

  • 8/9/2019 Main Social Media

    6/18

    +. I,$#-"-y T'$-

    2ecent research reveals that identity theft affects millions of #eo#le a year" costing victims

    co!ntless ho!rs and money in identity recovery and re#air. It is act!ally a combination of

    factors like lack of cons!mer knowledge regarding #rotecting yo!r identity online" growing

    comfort with" and tr!st in" social #latform #roviders" the need for social #latforms to generate

    reven!e" and a lack of standards or #olicing of these standards. &ltho!gh this iss!e is not yet

    in the mainstream conscio!sness" it likely will be sooner rather than later.LIn :J8J" statistics

    of cyberstalking victimiDation com#iled by %ho showed that harassment most often

    originated thro!gh emails" com#rising

  • 8/9/2019 Main Social Media

    7/18

    CASE STUDIES

    Ca($ 1 F"r(- !#3"!-"# "# I#,"a12

    & com#laint was filed in by $ony India 1rivate 5td" which r!ns a website called sony'

    sambandh.com" targeting 0on 2esident Indians. The website enables 02Is to send $ony

    #rod!cts to their friends and relatives in India after they #ay for it online. The com#any

    !ndertakes to deliver the #rod!cts to the concerned reci#ients. In ay :JJ:" someone logged

    onto the website !nder the identity of ,arbara Cam#a and ordered a $ony Colo!r Television

    set and a cordless head #hone. & lady gave her credit card n!mber for #ayment and re!ested

    that the #rod!cts be delivered

    to &rif &Dim in 0oida. The #ayment was d!ly cleared by the credit card agency and the

    transaction #rocessed. &fter following the relevant #roced!res of d!e diligence and checking"

    the com#any delivered the items to &rif &Dim.

    &t the time of delivery" the com#any took digital #hotogra#hs showing the delivery being

    acce#ted by &rif &Dim.

    The transaction closed at that" b!t after one and a half months the credit card agency

    informed the com#any that this was an !na!thoriDed transaction as the real owner had denied

    having made the #!rchase. The com#any lodged a com#laint for online cheating at the

    Central ,!rea! of Investigation which registered a case !nder $ection

  • 8/9/2019 Main Social Media

    8/18

  • 8/9/2019 Main Social Media

    9/18

    The same was taken on file in C.C.0@.

  • 8/9/2019 Main Social Media

    10/18

    one year rigoro!s im#risonment and im#osing a fine of 2s. 8J"JJJ !nder $ection

  • 8/9/2019 Main Social Media

    11/18

    associates ' $aravanan" 6ijayan and &sir G!nasingh. The E!dge while awarding life term to

    1rakash observed that considering the gravity of the offences committed by the main acc!sed"

    ma(im!m #!nishment !nder the Immoral Trafficking &ct -life im#risonment/ sho!ld be

    given to him and no leniency sho!ld be shown. The E!dge sentenced 1rakash !nder the

    Immoral Trafficking &ct" I1C" &rms &ct and Indecent 2e#resentation of %omen -1revention/

    &ct among others.

    Ca($ 9 :u3$#"l$ u#, gu"l-y r ($#,"#g -'r$a-$#"#g $6a"l.

    & 8= year old st!dent from &hmadabad who threatened to blow !# &ndheri 2ailway station

    in an email message was fo!nd g!ilty by the E!venile co!rt in !mbai. & #rivate news

    channel received an email on 8A arch :JJA claiming sender as awood Ibrahim gang

    saying a bomb wo!ld be #lanted on an !ns#ecified train to blow it !#.

    The case was registered in &ndheri 1olice station !nder section 4J= of I1C and transferred to

    cyber crime investigation cell. !ring Investigation CCIC traced the cyber cafe from which

    the email acco!nt was created and threatening email was sent. Cafe owner told #olice abo!t

    friends which had come that day to s!rf the net. 1olice $!mmoned them and fo!nd that the

    system which was !sed to send email was accessed by only one c!stomer. @n ::nd arch

    JA" #olice arrested the boy a Class QII science st!dent who d!ring interrogation said that he

    sent the

    email for f!n of having his #rank flashed as breaking news on television.

    $e#arate cases now*

    T'r$$ 8$8l$ '$l, gu"l-y "# # l"#$ !r$,"- !ar, (!a6

    C!stomers credit card details were mis!sed thro!gh online means for booking air'tickets.

    These c!l#rits were ca!ght by the city Cyber Crime Investigation Cell in #!ne. It is fo!nd

    that details mis!sed were belonging to 8JJ #eo#le.

    r. 1arvesh Cha!han" ICICI 1r!dential 5ife Ins!rance officer had com#lained on behalf of

    one of his c!stomer. In this regard r. $anjeet ahavir $ingh 5!kkad" harmendra ,hika

    ale and &hmead $ikandar $haikh were arrested. 5!kkad being em#loyeed at a #rivate

    instit!tion" ale was his friend. $haiklh was em#loyed in one of the branches of $tate ,ank

    of India .

  • 8/9/2019 Main Social Media

    12/18

    &ccording to the information #rovided by the #olice" one of the c!stomer received a $$

    based alert for #!rchasing of the ticket even when the credit card was being held by him.

    C!stomer was alert and came to know something was fishy; he en!ired and came to know

    abo!t the mis!se. )e contacted the ,ank in this regards. 1olice observed involvement of

    many ,ankFs in this reference.

    The tickets were book thro!gh online means. 1olice re!ested for the log details and got the

    information of the 1rivate Instit!tion. Investigation revealed that the details were obtained

    from $tate ,ank of India . $haikh was working in the credit card de#artment; d!e to this he

    had access to credit card details of some c!stomers. )e gave that information to ale. ale in

    ret!rn #assed this information to his friend 5!kkad. Bsing the information obtained from

    ale 5!kkad booked tickets. )e !sed to sell these tickets to c!stomers and get money for the

    same. )e had given few tickets to vario!s other instit!tions.

    Cyber Cell head C1 $!nil 1!lhari and 1I ohan ohadikar &.1.I ate were involved in

    eight days of investigation and finally ca!ght the c!l#rits. In this regards vario!s ,anks have

    been contacted; also fo!r air'line ind!stries were contacted. C1 $!nil 1!lhari has re!ested

    c!stomers who have fallen in to this tra# to inform #olice a!thorities on :=8:'

  • 8/9/2019 Main Social Media

    13/18

  • 8/9/2019 Main Social Media

    14/18

    Technology &ct" :JJJ contents the #rovisions regarding j!risdiction. $ection 8-/" - Ca($!bio!s tactics of a #rominent b!sinessman from &ndhra

    1radesh was e(#osed after officials of the de#artment got hold of com#!ters !sed by the

    acc!sed #erson. The owner of a #lastics firm was arrested and 2s :: crore cash was

    recovered from his ho!se by sle!ths of the 6igilance e#artment. They so!ght an e(#lanation

    from him regarding the !nacco!nted cash within 8J days. The acc!sed #erson s!bmitted

    ="JJJ vo!chers to #rove the legitimacy of trade and tho!ght his offence wo!ld go !ndetected

    b!t after caref!l scr!tiny of vo!chers and contents of his com#!ters it revealed that all of

    them were made after the raids were cond!cted. It later revealed that the acc!sed was

    r!nning five b!sinesses !nder the g!ise of one com#any and !sed fake and com#!terised

    vo!chers to show sales records and save ta(.

    &ARLIAMENT ATTACK CASE

    ,!rea! of 1olice 2esearch and evelo#ment at )yderabad had handled some of the to#

    cyber cases" incl!ding analysing and retrieving information from the la#to# recovered fromterrorist" who 1arliament. The la#to# which was seiDed from the two terrorists" who were

    g!nned down when 1arliament was !nder siege on ecember 8 :JJ8" was sent to Com#!ter

    3orensics ivision of ,12 after com#!ter e(#erts at elhi failed to trace m!ch o!t of its

    contents.

    The la#to# contained several evidences that confirmed of the two terrorists motives" namely

    the sticker of the inistry of )ome that they had made on the la#to# and #asted on their

    ambassador car to gain entry into 1arliament )o!se and the the fake I card that one of the

    two terrorists was carrying with a Government of India emblem and seal. The emblems -of

    the three lions/ were caref!lly scanned and the seal was also craftly made along with

    residential address of Eamm! and ashmir. ,!t caref!l detection #roved that it was all forged

    and made on the la#to#.

    Baa?$$.!6 !a($* C9@ of ,aaDee.com was arrested in ecember :JJ< beca!se a C with

    objectionable material was being sold on the website. The C was also being sold in the

    markets in elhi. The !mbai city #olice and the elhi 1olice got into action. The C9@ was

  • 8/9/2019 Main Social Media

    15/18

    later released on bail. This o#ened !# the !estion as to what kind of distinction do we draw

    between Internet $ervice 1rovider and Content 1rovider. The b!rden rests on the acc!sed that

    he was the $ervice 1rovider and not the Content 1rovider. It also raises a lot of iss!es

    regarding how the #olice sho!ld handle the cyber crime cases and a lot of ed!cation is

    re!ired.

    &REVENTIONAL TI&S

    9ach social media site offers ti#s on how to !se their service and still maintain a high level of

    sec!rity. 5isted below are their #olicies by following their sec!rity g!idelines and ado#t

    their best #ractices.

    Fa!$0There is a com#rehensive hel# #age on 3acebook where yo! can find details on

    #rotecting yo!r acco!nt against hacking and other sec!rity threats. Check it fre!ently to

    make s!re yo!r #ractices and settings are !# to date. C09T also offers #ractical advice s!ch

    as being s!re to block yo!r e( and caref!lly manage who has viewing access.

    Fur(@uar$* 3or a better !nderstanding of who can see information associated with yo!r

    3o!rs!are acco!nt" visit the )el# Center. This #age e(#lains methods for creating sec!rity

    settings for every acco!nt scenario. 9ns!re yo!r check'ins are safe and sec!re by !tiliDing

    these five ti#s from CI@.

    I#(-agra6If yo! have an Instagram acco!nt" read their official #age for ways to kee# yo!r

    acco!nt safe.

    L"#$,I#6isit 5inkedInFs )el# Center for a wide range of acco!nt sec!rity articles. & few

    of the to#ics covered on the #age incl!de methods for #rotecting yo!r #rivacy" yo!r identity

    and yo!r acco!nt. They also offer ti#s for dealing with #hishing" s#am and malware. If yo!r

    5inkedIn acco!nt is associated with a b!siness" )ow 0ot to )ave 7o!r &cco!nt )acked

    #rovides ways to kee# #asswords safe even if several #eo#le have access to the acco!nt.

    &"#-$r$(-To kee# yo!r 1interest acco!nt sec!re" yo! will need to access two main sections

    on the site* #rivacy settings and acco!nt sec!rity. If yo!r acco!nt has been hacked or #laced

    in a $afe mode by 1interest" yo! will !se the acco!nt sec!rity section to resolve the iss!e.

    )owever" most likely yo! will only need to !se the the #rivacy settings section. This is where

    yo! control what others can view and the degree of #ersonaliDation desired. $cams are one

    iss!e the site has dealt with in the #ast.

  • 8/9/2019 Main Social Media

    16/18

    Tu60lrIf yo! !se T!mblr" one of the best ways to im#rove sec!rity is to !tiliDe the recently

    im#lemented two'factor a!thentication. 3or all yo!r settings" tho!gh" access the siteFs sec!rity

    settings #age. )ere yo! can learn how to revoke third'#arty a##lication #ermissions as well

    as how to remove s#am from yo!r blog. 3or increased sec!rity" according to 9ntre#rene!r

    magaDine" yo! may want to refrain from !sing free themes.

    T*"--$r6isit TwitterFs )el# Center to learn best #ractices for yo!r Tweets or if yo! want to

    know how to connect with or revoke third'#arty a##lications. &lso visit this #age to discover

    methods for controlling acco!nt settings so yo! can get the level of sec!rity yo! want.

    YuTu0$Ggl$If yo! have a 7o!T!be and?or GoogleS acco!nt" bookmark GoogleFs

    ee#ing 7o!r &cco!nt $ec!re #age. This #age is great so!rce to learn abo!t their two'ste#

    verification #rocess" malware and vir!s iss!es" general information abo!t yo!r acco!nt

    settings and best #ractices for #rotecting yo!r #rivacy and identity.

    entioned below are some #racse which can be followed

    0ever" ever give o!t yo!r social sec!rity n!mber or drivers license n!mbers.

    Consider !ni!e !ser names and #asswords for each #rofile.

    6ary yo!r #asswords and change them reg!larly.

    ont give o!t yo!r !sername and #assword to third #arties -even if it hel#s yo!

    connect to others and b!ild yo!r network/.

    &ss!ming yo! #lan to be active in social media" minimiDe the !se

    of #ersonal information on yo!r #rofiles that may be !sed for #assword verification

    or #hishing attacks.

    &void listing the following information #!blicly* date of birth" hometown" home

    address" year of high school or college grad!ation" #rimary e'mail address. @nly invite #eo#le to yo!r network that yo! know or have met" as o##osed to friends

    of friends and strangers.

    3or #assword sec!rity verification !estions" !s a #assword for all answers -rather

    than the answer to the s#ecific !estion" like %hat is yo!r mothers maiden

    name/.

  • 8/9/2019 Main Social Media

    17/18

    %hen age'shifting to #rotect yo!r real birthday" kee# the date close; otherwise" yo!

    may e(#ose yo!rself to age discrimination.8