1,858
19
Essay, 3 pages (650 words)

Account compromise and malicious activity on online social networks

Online general system, such as Facebook and Tweeter, has become one of main media to stay in make get in touch with the rest of the world. The famous people use them to speak with their fan base, corporations take advantage of them to promote brands and have a straight link to consumers, while news agencies leverage public network to deal out breaking news. Regular users make pervasive use of common network too, to wait in contact with friends or classmates as well as split satisfied so as to they find attractive.

Over time, shared system users build belief relationships with the financial account they track. This hope can expand for a collection of reason. For example, the user force identifies the title-holder of the trust account in being or the relation might be operated by an entity commonly considered as trust worthy, such as a popular news agency.

Unfortunately, should the control over an account fall into the hands of a cyber-illegal, he can easily exploit this trust to further his own malicious agenda. Previous researches showed that using compromised accounts to spread malicious content is advantageous to cyber criminals, since shared system users are more likely to react to messages coming from financial records they trust.

This positive probability of achievement very draws the notice of fake criminal. On one occasion an enemy compromises a social network account he can use it for disreputable purposes such as distribution spam mail or link to malware and phishing web sites. Such traditional attacks are best carried out through a large population of compromised accounts belonging to regular social network relation users. Recent incidents, however, demonstrate that enemy can cause havoc and interference even by compromising individual, but high-profile accounts. These accounts (e. g., newspaper or popular brand name accounts) have large social circles (i. e., followers) and status suggests trust worthiness to many common system users. Recent attacks show that compromise these high profile accounts can be leveraged to distribute false news alerts, or messages that tarnish a company’s reputation.

Moreover, the effects of an account compromise can extend well beyond the status of a group. Designed intended designed for case, the distribution of an mistaken Associated Press in sequence explanation about a bomb exploding in the fair residence in 2013 led to a 1% drop in the Standard & Poor’s 500 index, temporarily wiping out US$ 136B . Compromises of high profile accounts usually get cleaned up quickly after they are detected. Unfortunately, since detection is still exclusively a manual endeavor, this is often too late to mitigate the negative impacts of explanation compromises. For example, the above mentioned AP message was shared by over 3, 000 users before the compromise was detected and the offending message removed. Similarly, a message sent as a consequence of a compromise of the Skype Twitter account happening during a national holiday remained accessible for over a day. These incidents show that it is critical for a social network to be able to reliably detect and block messages that have not been authored by an account’s legitimate owner.

Material goods of study are future in the last years to detect malicious activity on online social networks. Most of these systems, however, focus on detecting false financial records specially shaped to increase malicious satisfied, as an alternative of look for rightful accounts that have been

compromised . These systems are inadequate to notice compromised accounts, since legitimate, yet compromised accounts have considerably unlike individuality than false ones. additional lessening technique contain an extra universal range, and also detect hateful financial statement by grouping together similar messages or by looking at the presence of suspicious URLs in social network messages These systems can detect post that are sent by compromise public system financial records, in case cybercriminals utilize many economic details to send similar messages, or the letters are second-hand to their mesh page point to malware or phishing.

Thank's for Your Vote!
Account compromise and malicious activity on online social networks. Page 1
Account compromise and malicious activity on online social networks. Page 2
Account compromise and malicious activity on online social networks. Page 3
Account compromise and malicious activity on online social networks. Page 4

This work, titled "Account compromise and malicious activity on online social networks" was written and willingly shared by a fellow student. This sample can be utilized as a research and reference resource to aid in the writing of your own work. Any use of the work that does not include an appropriate citation is banned.

If you are the owner of this work and don’t want it to be published on AssignBuster, request its removal.

Request Removal
Cite this Essay

References

AssignBuster. (2021) 'Account compromise and malicious activity on online social networks'. 15 November.

Reference

AssignBuster. (2021, November 15). Account compromise and malicious activity on online social networks. Retrieved from https://assignbuster.com/account-compromise-and-malicious-activity-on-online-social-networks/

References

AssignBuster. 2021. "Account compromise and malicious activity on online social networks." November 15, 2021. https://assignbuster.com/account-compromise-and-malicious-activity-on-online-social-networks/.

1. AssignBuster. "Account compromise and malicious activity on online social networks." November 15, 2021. https://assignbuster.com/account-compromise-and-malicious-activity-on-online-social-networks/.


Bibliography


AssignBuster. "Account compromise and malicious activity on online social networks." November 15, 2021. https://assignbuster.com/account-compromise-and-malicious-activity-on-online-social-networks/.

Work Cited

"Account compromise and malicious activity on online social networks." AssignBuster, 15 Nov. 2021, assignbuster.com/account-compromise-and-malicious-activity-on-online-social-networks/.

Get in Touch

Please, let us know if you have any ideas on improving Account compromise and malicious activity on online social networks, or our service. We will be happy to hear what you think: [email protected]