24
SECURITY THREATS IN BUISNESS USING SNS Submitted To- Submitted By- Prof. Sanchita Ghatak. Tasheen Sheikh- JL13PGDM119 JAIPURIA INSTITUTE OF MANAGEMENT, LUCKNOW

Security Threats In Business Using Social Networking Sites

Embed Size (px)

DESCRIPTION

Security Threats In Business Using Social Networking Sites.

Citation preview

Page 1: Security Threats In Business Using Social Networking Sites

SECURITY THREATS IN BUISNESS USING SNS

Submitted To- Submitted By-

Prof. Sanchita Ghatak.

Tasheen Sheikh-JL13PGDM119

Tulika Chopra-JL13PGDM120

Varsha Debnath-JL13PGDM121

Vasvee Gupta-JL13PGDM122

Vidhi Chauhan-JL13PGDM123

Yamini Baghel-JL13PGDM124

JAIPURIA INSTITUTE OF MANAGEMENT, LUCKNOW

Page 2: Security Threats In Business Using Social Networking Sites

ContentsACKNOWLEDGEMENT...........................................................................................................................2

INTRODUCTION.....................................................................................................................................3

Social Networking Sites in Organizations:..............................................................................................5

Customer Support (Connecting The Customer With The Right Resource).........................................6

Ease-Post-Acquisition-Integration.....................................................................................................6

Providing the Whole Product............................................................................................................7

Customer and Member Relationship Development..........................................................................7

Apple,Inc Using LinkedIn for Buisness related Purposes:......................................................................8

THREATS FACED BY APPLE WHILE USING LINKEDIN............................................................................10

Human error, leading to leaked corporate data..............................................................................10

Phishing...........................................................................................................................................10

Spread of false information.............................................................................................................10

Network breaches...........................................................................................................................11

Leakage of sensitive information.....................................................................................................11

Trust as part of culture....................................................................................................................11

May effect Reputation.....................................................................................................................11

Malware..........................................................................................................................................11

Spam................................................................................................................................................11

How Apple can Avoid Social Media Threats........................................................................................13

Implement a Social Media Policy.....................................................................................................13

Make Sure Network Security and Firewalls Are In Place.................................................................13

Regularly Update Your Network Security Tools...............................................................................13

Establish a Social Media Crisis Plan..................................................................................................14

Educate Your Employees.................................................................................................................14

Keeping the employees updated on the latest threats....................................................................14

Keeping track of where the employees are visiting while surfing....................................................14

Type of Business not Preferable for SNS..............................................................................................15

Bibliography.........................................................................................................................................16

Page 3: Security Threats In Business Using Social Networking Sites

ACKNOWLEDGEMENT

Any assignment puts to litmus test of an individual’s knowledge, credibility or

experience and thus sole efforts of an individual are not sufficient to accomplish the

desired work. Successful implementation of a project involves interests and efforts of

many people and so this becomes obligatory on our part to record. Our team thanks those

who helped us out in the successful completion of our project.

We would like to gratefully thank to our esteemed Director Dr. S.R Mussana whose

kind and benediction and his immense help in providing us the facilities of the Jaipuria

Institute of Management, which were necessary for the completion of the study.

We would like to express our deep sense of gratitude and sincere thanks to Prof.

Sanchita Ghatak our faculty member for providing us with the interesting topic

“Security Threats In Business using SNS” and helping us in the completion of the

Project and her immense support throughout the study of the topic.

We would also like to express my special gratitude to all the members of our group for

providing co-operation throughout the completion of this project.

And last but not the least, I express my heartiest gratitude to Almighty for providing me

the favourable environment and support.

Page 4: Security Threats In Business Using Social Networking Sites

INTRODUCTION

Apple, Inc. is an electronics and software company based in California, USA. Originally

known as Apple Computer, the company is familiar to most people as innovators of the

personal computer as it is known today. Apple Computer had introduced many of the now-

commonplace features of personal computers, including the GUI, the mouse, the floppy disk

drive, and colour graphics. Apple Computer's Macintosh line of PC's had brought numerous

software and hardware components within reach of the average home consumer, often in a

stylish case and with an emphasis on usability. The restructured company, now called simply

Apple, designs, markets, and sells not only personal computers but also consumer electronics

in the form of portable media players and smart phones. Apple also sells intangible goods in

the form of software, music, and video. The Apple Store chain operates over 150 branches

worldwide, where the devices and software and sold and serviced.

Although Apple does distribute software for the Microsoft Windows operating system,

this is limited to its QuickTime media player and iTunes connectivity suite for the iPod. Most

of Apple's software revenue comes in the form of optional software for the OS-X operating

system, exclusive to Apple's own Macintosh computers. However, software and even

computer sales are now only a small part of Apple's operations. The iPod media player is

today Apple's main source of revenue, including sales of the player itself and of music and

video downloads via the iTunes music store. The recently introduced iPhone is expected to

outsell it's production quota, thus making the device both exclusive and expensive. Apple

TV, introduced in March 2007, is a controversial device that is not expected to bring much

income to Apple, rather, to help secure Apple's foothold in the content distribution market.

Other Apple hardware devices, such as the Xserve web- and file-server and the Apple

Cinema display, are not intended for home use and make up a negligible portion of Apple's

income.

Apple Computer first introduced its products at a local computer club in early 1976.

Within half a year the company had grown to having 10 retail outlets selling it's Apple

computer kits. The following year, Apple Computer released the Apple II, it's first fully-

Page 5: Security Threats In Business Using Social Networking Sites

assembled machine. With color graphics, audio capabilities, and fully-documented hardware

specs that encouraged third-party accessories, the Apple II became the most popular

computer of all time, selling for over 15 years. During this time, the Lisa and Macintosh were

introduced, the later which would supersede the Apple II and become the basis for the first

Apple laptop. After several years of technical failures and unsuccessful products, the late

1990's saw Apple reinventing itself with new company goals. The company settled it's

outstanding lawsuits with Microsoft, and in 1998 Apple Computer launched the iMac, a

throwback to the Apple II both in design and application. The iPod media player was

introduced in late 2001, with the iTunes music service following in early 2002. The release of

these two products is now seen as a critical turning point in the history of Apple Computer,

marking a return to high profits and brand recognition. The iPod line was expanded to include

ever tinier models, including the iPod Mini, the flash-based iPod Nano, and eventually the

screen less iPod Shuffle. The iPod inspired interest in Apple Computer's merchandise led to

the company restructuring itself once again, dropping the word "computer" from its name to

reflect its new focus on consumer electronics and media distribution. The Apple TV and

iPhone devices are direct fruits of the new company focus.

Page 6: Security Threats In Business Using Social Networking Sites

Social Networking Sites in Organizations:

-

There’s no stopping social media. A recent Nielsen survey found that 80 per cent of active

Internet users spend time – a lot of time – on social networking sites. In fact, use of social

media and blogs accounts for 23 per cent of all time online, three times the amount of time

spent using email (7.6%).

Use of social media is not confined to off-hours, however. As Ponemon has noted, 60 per

cent of social media users of visit sites such as Facebook and Twitter for non-business

purposes at least 30 minutes per day while at work.

Of course, the use of social media in the workplace has its benefits. Organizations have

embraced social media for tasks such as marketing, product design, and recruiting. Many

have found that social media can increase productivity, spark innovation, and create a more

collaborative corporate community.

Outside of the workplace, social networking can help a business reach and engage customers,

improve the customer experience, help develop new products and services, and polish the

brand image of the business. Many businesses today patrol sites such as Twitter and

Facebook to listen in on the chatter about their products and services. Should the

Page 7: Security Threats In Business Using Social Networking Sites

conversation turn negative, the company can use the same medium to respond and move the

discussion in the right direction.

Consider Whole Foods, the grocery store chain that is the most-followed brand on Twitter

and has an active Facebook presence, with more than 750,000 fans. The company’s Twitter

feed presents an engaging, friendly voice and sends out dozens of tweets to its 2 million

followers daily, offering recipes, shopping specials, customer service, and more. Recently, a

vegan follower reported that he had discovered a human fingernail in his Whole Foods vegan

breakfast burrito. What could have been a public relations disaster was almost instantly

defused by a quick Twitter exchange. The public conversation ended with the customer

reporting that the store had delivered “great service very quickly.”

Some ways that businesses, associations and organizations can use social

networking in the professional sphere.

Customer Support (Connecting The Customer With The Right Resource)

Successful customer support achieves a number of goals. Basic customer service includes, of

course, assisting customers when they have problems or questions about an organization’s

products. However, online networks enable exceptional customer support that goes beyond

the basics, which allows customers to connect with experts in an organization who have deep

knowledge in a particular area. Similarly, a strong online network enables experts within an

organization to be alerted when a problem that requires their knowledge comes into the

customer support queue, and facilitates the creation of strong communities in the form of

valuable user groups and member networks.

Ease-Post-Acquisition-IntegrationEven though acquisitions are on the upswing, a majority of mergers and acquisitions fail

within three years of inception. The most common cause of failure is lack of alignment and

understanding between individuals in the acquiring and acquired organizations. Online social

networks, giving a view to the “real” individuals within the organizations, aid in the creation

of understanding between both parties by allowing members of both organizations to view

each other as a collection of individuals, rather than an amorphous “them”.

Page 8: Security Threats In Business Using Social Networking Sites

Providing the Whole ProductIt is rare that a single organization can provide all the pieces needed to meet a customer’s

entire need. For example, even though a real estate agent aids in the process of buying a

home, an entire network of other service providers, such as title company, bank, insurance

agents, contractors, and others, is required in order to fully meet the customer’s need. By

creating a strong network of complementary providers with similar philosophies and business

practices, a single service provider can provide a much greater proposition to a prospective

customer than an individual working without the benefit of the network.

Customer and Member Relationship DevelopmentCustomer satisfaction is at an all-time low, perhaps as a result reduced business focus on

actual relationships, and an increased business focus on “customer relationship management”

systems emphasizing management of data rather than personal connections. Online social

networks allow a prospective customer or prospective member to easily facilitate a real,

human-level connection with individuals within an organization. This enables genuine

business relationships to form and puts an authentic human face on the interaction, changing

the external perception of an organization from a sterile, faceless behemoth into a collection

of individuals who are ready to help.

Page 9: Security Threats In Business Using Social Networking Sites

Apple,Inc Using LinkedIn for Buisness related Purposes:

LinkedIn  is indeed a great tool for Apple. It offers tremendous opportunities for networking

and information sharing.  However, Apple cannot be successful just by joining LinkedIn. In

other words Apple should know how to effectively use LinkedIn. They mostly focus on the

direct sales and marketing tactics on LinkedIn.

LinkedIn is a business-related networking tool. Having a personal profile is not useful

for business purpose. Apple makes a company page for his business. Add all the

important things related to his business and specific and accurate in describing

products and services.

Apple uses his employee as a vehicle for brand promotion- Every now and then if

anyone looks up a company's profile on LinkedIn.  And then, of course, they can't

resist checking out some of the company employees' profiles. One may argue that

most LinkedIn profiles are not available to most users. But, tell you what, you never

know who might be in your network.

We just searched for the company (Apple) and saw had 4 second-degree connections inside

Apple:

Apple Prepare for Coming Demographic Changes in Business although online social

networks are relatively new to business, By the time these individuals enter the

workforce, LinkedIn with simply be a part of the fabric of business, and the

organizations that have determined how to best integrate them into their operations

will be the ones that are most successful.

Page 10: Security Threats In Business Using Social Networking Sites

As you can see by the profile screen shots below, Apple has LinkedIn Company

Profiles Pages.  Apple has tens of thousands of followers and includes a list of

employees currently featuring their individual profiles on LinkedIn.

As shown in the screenshots above, Apple have completed the “Overview” tab of

their company pages by adding a brief description of the company and by providing a

synopsis of specialties their company is known for.  Apple have also completed the

”Careers” tab of their company profile allowing potential hires to see what positions

are currently open and available.

The LinkedIn app for iPhone and iPad, Redesigned with you in mind! The new

iPhone app makes it even easier to connect and grow your network, engage with

professional content and gain insights right from the stream. The new intelligent

navigation is personalized just for you based on how you use LinkedIn every day.

Features:

•Connect with more than 238 million members worldwide

•Stay up to date with people in your network

•Search for people, jobs, companies and groups

•Follow Influencers to get insights and original content from industry leaders in your

stream*

•Update your profile from within the app*

•View and save recommended jobs*

•Read the latest industry news

•Follow and learn more about companies

•Keep up with your favourite groups

•Purchase and upgrade your account to a LinkedIn Premium Subscription from within

the app.

Page 11: Security Threats In Business Using Social Networking Sites

THREATS FACED BY APPLE WHILE USING LINKEDIN

LinkedIn is a powerful medium that enables apple to access unfiltered consumer feedback

and engage with customers and potential customers and provide valuable information. But

there are several threats faced by the company while using LinkedIn. Some of them are as

follows:

Human error, leading to leaked corporate data 

Some employees are also unwittingly posting confidential information about their job and

company on LinkedIn, believing this information to be safe.

"Such information about current projects, financial situation or future plans can prove to be

invaluable for competitors,”

The corporate LinkedIn site account is usually managed by people with good communication

skills, not IT skills.

"The lack of IT security education and strong [user] policies can lead to such an account

being compromised, which will badly damage the image of Apple,”

Phishing Cyber attackers are using LinkedIn to launch attacks that aim to lure victims to a malicious

and fake login page to obtain the user's personal login details.

"Phishing attackers send a message to a victim's LinkedIn inbox, as well as an e-mail

notification with the subject 'Hello' or 'Hi'," he explained. "The e-mail appears to have come

from the victim's friend and includes text asking the user to visit a malicious and fake

LinkedIn login page, where the attacker will then steal the user's login credentials to launch

future attacks."

Once an attacker breaks into a victim's account, it becomes easy to leverage the victim's

social network and harvest information from other users. This information could be used for

various cyber-criminal activities, such as breaking into the users' online banking accounts or

enterprise accounts.

Spread of false informationThere have been several incidents over the past year where false information transmitted on

the internet has had serious consequences, according to the report. 

Page 12: Security Threats In Business Using Social Networking Sites

Network breaches A data breach is an incident in which sensitive, protected or confidential data has potentially

been viewed, stolen or used by an individual unauthorized to do so. The most common

concept of a data breach is an attacker hacking into a corporate network to steal sensitive

data.

Leakage of sensitive informationWorking through social networking sites may lead to leakage of sensitive information which

may cause harm to the business.

Trust as part of cultureIn order for employees to use social media in a successful way for the company, trust is a

prerequisite. Not having that trust as part of the organizational culture can present a risk when

it comes to social media.

May effect ReputationHackers, disgruntled employees, or anyone else can stain reputation more easily, costing the

company time and money. Legal issues may perhaps arise if a company gives an

inappropriate comment about another company on a social media platform for instance.

Malware "Social networking sites are vehicles for malicious attacks to spread malware,"

The leading infection methods are drive-by-download, which hijack legitimate Web sites or

route visitors to infected servers, as well as LinkedIn infections, where spam is sent to a

victim's "friends list" carrying links to infected servers.

Applications on LinkedIn increase a hacker's surface attacks because most people would run

applications on such sites without thinking twice. Malicious code could also be added to

advertisements and banners.

SpamSpammers registered their own accounts and send unsolicited messages through the social

networking site. The site would then send an e-mail notification to users about the new

message. However, as the messages are sent to users from an unknown person so spammers

are now using a newer technique.

There is a rise in newer technique of social networking site abuse. A sender's account is

hijacked and sends messages to everyone who is "connected" to the sender. When the

Page 13: Security Threats In Business Using Social Networking Sites

receiver navigates to the message in the message, malware will try to load. "This example

serves as a good reminder to all social networking site users that the message may not be

from a friend, even if it is from a friend,"

Page 14: Security Threats In Business Using Social Networking Sites

How Apple can Avoid Social Media Threats

Best practices that can be implemented to mitigate and eliminate the threats can be

summarised as follows:

Implement a Social Media PolicyAll the employees, including executives, should be trained in the basics of good and bad

social media communications, particularly in the areas that can have legal and financial

implications for the business. 

Make Sure Network Security and Firewalls Are In PlaceApple IT administrators should be using the latest in firewall technology to manage and limit

certain social media apps to those that should have it or limit unproductive

applications. Apple need to be able to control applications in order to ensure its networks,

applications and data are safe, and also ensure employees are productive.

Regularly Update Your Network Security Tools

It’s important to make sure that Apple has the latest software protection and updates in

place.  Bad people and hackers spend countless hours every day finding ways to work

their way into systems, create malicious viruses and general mayhem for people they

don’t even know.  They are up to date with the latest and greatest techniques and

methods so you need to make sure your systems are adequately armed to stop them. 

Network security and firewall specialists invest countless hours combating viruses and

thwarting hacker efforts.  Apple should Work with their IT department to ensure there is a

process to make sure this happens regularly.

Establish a Social Media Crisis PlanPages and profiles necessary to address issues and the communication strategy of how to

respond if the need arises.  The best position Apple can be in is poised and ready to react and

respond when appropriate through the channels where the discussion is taking place.  Recent

interviews of social media strategists at Apple, among other companies, found that 76% of

the social media crises they experienced could have been averted either with more

preparation or a better response to the problem.

Page 15: Security Threats In Business Using Social Networking Sites

Educate Your EmployeesFinally, all of the policy guidelines Apple created and crisis planning that have done will be

meaningless if Apple do not take the time and make it a priority to educate his employees. 

That means every single employee from the C-level execs all the way down to the

mailroom. Social media education doesn’t have to be a full production, but it does require

some diligence on your part to make sure that each person has been made of aware of

policies, procedures and expectations.

Keeping the employees updated on the latest threatsEducating the employees about the threats posed by social media malware has to be an on-

going process. This will keep them informed of the latest threats they should look out for.

Keeping track of where the employees are visiting while surfingCorporate controls can be used to maintain some visibility of the sites so as to block access to

dangerous sites.

Page 16: Security Threats In Business Using Social Networking Sites
Page 17: Security Threats In Business Using Social Networking Sites

Type of Business not Preferable for SNS

“You are looking at social media the same way people looked at the very first personal

computers, phones, or email…who would want to use that and how could that possibly help

business?”

Following are the Businesses that are not preferable for SNS-

Wine Business- The importance of culture, the world of business, for most of us, has

shifted more than we even fully understand yet. It’s still shifting. The thing most

people can agree on is that business as usual isn’t working as well as it once did, In

India as the Advertisement and promotion is already banned from Media so it’s not

preferred to display it on Social media as it can Influence the upcoming generation so

the thinking.

Arms Business- People want access and they want access to everything, and in a

Industry like Arms after many incidents that occur in US attacks by the civilians there

is been a threat going on society regarding the Arms and so socially deliverance of it

if will not benefit using SNS in this industry.

Page 18: Security Threats In Business Using Social Networking Sites

Bibliography. Google, www.google.com.

Bullas, J. http://www.jeffbullas.com/.

Daniel Ayoub. https://www.brighttalk.com.

LinkedIn. www.LinkedIn.com.

Apple.www.apple.com