Countering Social Engineering Through Social Media: An Enterprise Security Perspective

The increasing threat of social engineers targeting social media channels to advance their attack effectiveness on company data has seen many organizations introducing initiatives to better understand these vulnerabilities. This paper examines concerns of social engineering through social media within the enterprise and explores countermeasures undertaken to stem ensuing risk. Also included is an analysis of existing social media security policies and guidelines within the public and private sectors.

[1]  Steve Love,et al.  Security awareness of computer users: A phishing threat avoidance perspective , 2014, Comput. Hum. Behav..

[2]  François Amigorena The threat from within: how to start taking internal security more seriously , 2014 .

[3]  S. Furnell End-user security culture: A lesson that will never be learnt? , 2008 .

[4]  Maumita Bhattacharya,et al.  Social Engineering through Social Media: An Investigation on Enterprise Security , 2014 .

[5]  M. Pitesky,et al.  Clearing the Air: Livestock's Contribution to Climate Change , 2009 .

[6]  Melissa Mrachek,et al.  Clearing the air , 1992, The Lancet.

[7]  Wei Fan,et al.  Trust and Privacy Exploitation in Online Social Networks , 2014, IT Professional.

[8]  Ehinome Ikhalia A New Social Media Security Model (SMSM) , 2013 .

[9]  Kevin J. Slonka Awareness of malicious social engineering among facebook users , 2014 .

[10]  William L. Simon,et al.  The Art of Deception: Controlling the Human Element of Security , 2001 .

[11]  Fernando Almeida Web 2.0 Technologies and Social Networking Security Fears in Enterprises , 2012, ArXiv.

[12]  Deveeshree Nayak,et al.  Information privacy risk assessment of Facebook Graph Search , 2014, 2014 Science and Information Conference.

[13]  Wu He,et al.  A review of social media security risks and mitigation techniques , 2012, J. Syst. Inf. Technol..

[14]  Carl Colwill,et al.  Human factors in information security: The insider threat - Who can you trust these days? , 2009, Inf. Secur. Tech. Rep..

[15]  Agostino Poggi,et al.  Information Attacks on Online Social Networks , 2014, J. Inf. Technol. Res..

[16]  Riaan J. Rudman Framework to identify and manage risks in Web 2.0 applications , 2010 .