Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Countering Social Engineering Through Social Media: An Enterprise Security Perspective

  • Conference paper
  • First Online:
Computational Collective Intelligence

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 9330))

Abstract

The increasing threat of social engineers targeting social media channels to advance their attack effectiveness on company data has seen many organizations introducing initiatives to better understand these vulnerabilities. This paper examines concerns of social engineering through social media within the enterprise and explores countermeasures undertaken to stem ensuing risk. Also included is an analysis of existing social media security policies and guidelines within the public and private sectors.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  • Almeida, F.: Web 2.0 technologies and social networking security fears in enterprises (2012). arXiv preprint arXiv:1204.1824

    Google Scholar 

  • Amigorena, F.: The threat from within: how to start taking internal security more seriously. Computer Fraud & Security 2014(7), 5–7 (2014)

    Article  Google Scholar 

  • Arachchilage, N.A.G., Love, S.: Security awareness of computer users: A phishing threat avoidance perspective. Computers in Human Behavior 38, 304–312 (2014)

    Article  Google Scholar 

  • Bada, M., Sasse, A.: Cyber Security Awareness Campaigns Why do they fail to change behaviour? (2014)

    Google Scholar 

  • Bell, J.: Clearing the AIR. Communication World 27(1), 27–30 (2010)

    Google Scholar 

  • Boudreaux, C.: Social media policies. In: The Social Media Management Handbook, pp. 274–285

    Google Scholar 

  • CERT-Australia: 2012 Cybercrime and Security Survey. Report from CERT-Australia. Australian Government, Attorney General’s Department (2012)

    Google Scholar 

  • Colwill, C.: Human factors in information security: The insider threat–Who can you trust these days? Information Security Technical Report 14(4), 186–196 (2009)

    Article  Google Scholar 

  • Foreshew, J.: Companies should develop their own social media policies, The Australian online (2012)

    Google Scholar 

  • Franchi, E., Poggi, A., Tomaiuolo, M.: Information Attacks on Online Social Networks. Journal of Information Technology Research (JITR) 7(3), 54–71 (2014)

    Article  Google Scholar 

  • Furnell, S.: End User Security Culture – A Lesson That Will Never Be Learnt? Computer Fraud & Security, 6–9, April 2008

    Google Scholar 

  • GovLoop: Knowledge Network for Government. Website (2014)

    Google Scholar 

  • He, W.: A review of social media security risks and mitigation techniques. Journal of Systems and Information Technology 14(2), 171–180 (2012)

    Article  Google Scholar 

  • Ikhalia, E.J.: A New Social Media Security Model (SMSM)

    Google Scholar 

  • King, P.: Cyber Crooks Target Social Networking Sites. Point for Credit Research & Advice, 9, January 1, 2008

    Google Scholar 

  • Luxford, H.: UK Lauches New Cybersecurity Initiative. Plans to work with infrastructure providers to create a safer business environment. Article from Datacenter Dynamics (2014)

    Google Scholar 

  • Meister, J.C., Willyerd, K.: The 2020 workplace. HarperCollins, New York (2010)

    Google Scholar 

  • Mitnick, K.D., Simon, W.L.: The art of deception: Controlling the human element of security. John Wiley & Sons (2001)

    Google Scholar 

  • Nayak, D., Prince, S., Robinson, R.: Information privacy risk assessment of facebook graph search. In: Science and Information Conference (SAI), pp. 1005–1006. IEEE, August 2014

    Google Scholar 

  • Oxley, A.: A best practices guide for mitigating risk in the use of social media. IBM Center for The Business of Government (2011)

    Google Scholar 

  • PriceWaterhouseCoopers: The Global State of Information Security Survey. Price Waterhouse Coopers (2014)

    Google Scholar 

  • Rudman, R.J.: Framework to identify and manage risks in Web 2.0 applications. African Journal of Business Management 4(13), 3251–3264 (2010)

    Google Scholar 

  • Slonka, K.J.: Awareness of malicious social engineering among facebook users (Doctoral dissertation, Robert Morris University) (2014)

    Google Scholar 

  • Symantec: Social Media Protection Flash Poll Global Results. Powerpoint Presentation (2011)

    Google Scholar 

  • VMIA: Risk Insight. Social Media: What’s the risk? Report from VMIA Risk Roundtable (2010)

    Google Scholar 

  • Wilcox, H., Bhattacharya, M., Islam, R: Social engineering through social media: an investigation on enterprise security. In: ATIS 2014, CCIS 490, pp. 243–255 (2014) (in press)

    Google Scholar 

  • Wong, K., Wong, A., Yeung, A., Fan, W., Tang, S.K.: Trust and Privacy Exploitation in Online Social Networks. IT Professional 16(5), 28–33 (2014)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Heidi Wilcox .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Wilcox, H., Bhattacharya, M. (2015). Countering Social Engineering Through Social Media: An Enterprise Security Perspective. In: Núñez, M., Nguyen, N., Camacho, D., Trawiński, B. (eds) Computational Collective Intelligence. Lecture Notes in Computer Science(), vol 9330. Springer, Cham. https://doi.org/10.1007/978-3-319-24306-1_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-24306-1_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-24305-4

  • Online ISBN: 978-3-319-24306-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics