Cyber Law
Cyber Law
Because of the above reasons, cyber security has become an important part of
the business and the focus now is on developing appropriate response plans that
minimize the damage in the event of a cyber attack.
But, an organization or an individual can develop a proper response plan only
when he has a good grip on cyber security fundamentals.
Issues and challenges of cyber security
Cyber security faces numerous issues and challenges due to the ever-evolving
nature of technology and the increasing sophistication of cyber threats.
Some of the key issues and challenges in cyber security include:
1. Cyber Attacks: The constant threat of cyber attacks from various actors,
including hackers, cybercriminals, nation-states, and hacktivists, is a significant
challenge. These attacks can take various forms, such as malware, ransomware,
phishing, and distributed denial of service (DDoS) attacks.
2. Data Breaches: Data breaches can have severe consequences for
organizations and individuals. The theft or exposure of sensitive data, such as
personal information, financial records, or intellectual property, can lead to
financial losses, reputational damage, and legal liabilities.
3. Security Vulnerabilities: Software and hardware vulnerabilities are
exploited by attackers to gain unauthorized access or control over systems.
Identifying and patching these vulnerabilities in a timely manner is a constant
challenge.
4. Insider Threats: Insider threats, where individuals within an organization
misuse their access and privileges, can be particularly challenging to detect and
prevent. This includes employees, contractors, or partners who intentionally or
unintentionally compromise security.
5. Lack of Cyber security Awareness: Many individuals and employees lack
awareness of cyber security best practices, making them susceptible to social
engineering attacks and other cyber threats.
6. Resource Constraints: Smaller organizations and even some larger ones
may lack the resources and expertise needed to implement robust cybersecurity
measures. This can leave them vulnerable to attacks.
7. Ransomware: Ransomware attacks have surged in recent years, with
cybercriminals encrypting data and demanding a ransom for decryption keys.
These attacks can disrupt critical operations and result in significant financial
losses.
Cyber security Fundamentals –
▪ Cybersecurity is the practice of protecting computer systems, networks, and
data from theft, damage, or unauthorized access.
▪ It encompasses a wide range of technologies, processes, and practices
designed to safeguard digital information and ensure the confidentiality,
integrity, and availability of data.
CIA Triad : The CIA Triad is actually a security model that has been
developed to help people think about various parts of IT security.
CIA triad broken down:
i. Confidentiality:
Confidentiality is about preventing the disclosure of data to unauthorized
parties.
This principle focuses on ensuring that sensitive information is only
accessible to authorized individuals or systems. It involves encryption,
access controls, and data classification to prevent unauthorized access or
disclosure.
Standard measures to establish confidentiality include:
• Data encryption
• Two-factor authentication
• Biometric verification
• Security tokens
ii. Integrity
Integrity refers to protecting information from being modified by
unauthorized parties.
• Cryptographic checksums
• Using file permissions
• Uninterrupted power supplies
• Data backups
• Digital signature
iii. Availability
Availability is making sure that authorized parties are able to access the
information when needed.
Standard measures to guarantee availability include:
g. Dictionary attacks
This type of attack stored the list of a commonly used password and
validated them to get original password.
h. URL Interpretation
It is a type of attack where we can change the certain parts of a URL, and
one can make a web server to deliver web pages for which he is not
authorized to browse.
i. File Inclusion attacks
It is a type of attack that allows an attacker to access unauthorized or
essential files which is available on the web server or to execute
malicious files on the web server by making use of the include
functionality.
j. Man in the middle attacks
It is a type of attack that allows an attacker to intercepts the connection
between client and server and acts as a bridge between them. Due to this,
an attacker will be able to read, insert and modify the data in the
intercepted connection.
System-based attacks
These are the attacks which are intended to compromise a computer or a
computer network.
Some of the important system-based attacks are as follows
1. Virus
It is a type of malicious software program that spread throughout the
computer files without the knowledge of a user. It is a self-replicating
malicious computer program that replicates by inserting copies of itself
into other computer programs when executed. It can also execute
instructions that cause harm to the system.
2. Worm
It is a type of malware whose primary function is to replicate itself to
spread to uninfected computers. It works same as the computer virus.
Worms often originate from email attachments that appear to be from
trusted senders.
3. Trojan horse
It is a malicious program that occurs unexpected changes to computer
setting and unusual activity, even when the computer should be idle. It
misleads the user of its true intent. It appears to be a normal application
but when opened/executed some malicious code will run in the
background.
4. Backdoors
It is a method that bypasses the normal authentication process. A
developer may create a backdoor so that an application or operating
system can be accessed for troubleshooting or other purposes.
5. Bots
A bot (short for "robot") is an automated process that interacts with other
network services.
Some bots program run automatically, while others only execute
commands when they receive specific input. Common examples of bots
program are the crawler, chatroom bots, and malicious bots.
Layers of Cyber Security
The 7 layers of cyber security should center on the mission critical assets you
are seeking to protect.
1: Mission Critical Assets – This is the data you need to protect
2: Data Security – Data security controls protect the storage and transfer of
data.
3: Application Security – Applications security controls protect access to an
application, an application’s access to your mission critical assets, and the
internal security of the application.
4: Endpoint Security – Endpoint security controls protect the connection
between devices and the network.
5: Network Security – Network security controls protect an organization’s
network and prevent unauthorized access of the network.
6: Perimeter Security – Perimeter security controls include both the physical
and digital security methodologies that protect the business overall.
7: The Human Layer – Humans are the weakest link in any cyber security
posture. Human security controls include phishing simulations and access
management controls that protect mission critical assets from a wide variety of
human threats, including cyber criminals, malicious insiders, and negligent
users.
Vulnerability, threat, Harmful acts
As the recent epidemic of data breaches illustrates, no system is immune to
attacks. Any company that manages, transmits, stores, or otherwise handles data
has to institute and enforce mechanisms to monitor their cyber environment,
identify vulnerabilities, and close up security holes as quickly as possible.
Before identifying specific dangers to modern data systems, it is crucial to
understand the distinction between cyber threats and vulnerabilities.
Cyber Threat Cyber Attack
A Threat by definition is a condition / An Attack by definition is an
circumstance which can cause intended action to cause damage to
damage to the system/asset. system/asset.
Threats can be intentional like The attack is a deliberate action. An
human negligence or unintentional attacker has a motive and plan the
like natural disasters. attack accordingly.
A Threat may or may not malicious. An Attack is always malicious.
Chance to damage or information The chance to damage or
alteration varies from low to very information alternation is very high.
high.
• Credit Card Fraud: As the name suggests, this is a fraud that happens
by the use of a credit card. This generally happens if someone gets to
know the card number or the card gets stolen.
• Intellectual Property crimes: These include Software piracy: Illegal
copying of programs, distribution of copies of software. Copyright
infringement: Using copyrighted material without proper permission.
Trademarks violations: Using trademarks and associated rights without
permission of the actual holder. Theft of computer source code: Stealing,
destroying or misusing the source code of a computer.
• Internet time theft: This happens by the usage of the Internet hours by
an unauthorized person which is actually paid by another person.
• Forgery: Currency notes, revenue stamps, mark sheets etc. can be forged
using computers and high quality scanners and printers.
• Cyber Terrorism: Use of computer resources to intimidate or coerce
people and carry out the activities of terrorism.
• Web Jacking: Hackers gain access and control over the website of
another, even they change the content of website for fulfilling political
objective or for money.
Here are some common types of cybercrimes that target computers and mobiles:
1. Malware Attacks: Malicious software (malware) is designed to infect
computers and mobile devices. This includes viruses, worms, Trojans,
ransomware, spyware, and adware. Malware can steal data, damage
systems, or hold data hostage for a ransom.
2. Phishing: Phishing attacks involve tricking individuals into revealing
sensitive information like passwords, credit card numbers, or personal
details by posing as a legitimate entity through email, text messages, or
fake websites.
3. Identity Theft: Cybercriminals can steal personal information, such as
Social Security numbers and financial data, to commit fraud, open
accounts in victims' names, or access their financial resources.
4. Online Scams: Various online scams target individuals, such as
advance-fee fraud, lottery scams, and romance scams. These scams
deceive people into sending money or personal information to fraudsters.
5. DDoS Attacks: Distributed Denial of Service (DDoS) attacks
overwhelm a target's computer or network with traffic, making it
unavailable to users. These attacks are often used to disrupt services or
extort money.
6. Data Breaches: Cybercriminals infiltrate organizations to steal
sensitive data like customer information, trade secrets, or financial
records. These breaches can result in significant financial losses and
reputational damage.
7. Cyberbullying: Cyberbullying involves the use of technology to
harass, threaten, or intimidate individuals. It can take place through social
media, messaging apps, or email.
8. Mobile Device Theft and Hacking: Criminals can steal mobile
devices for resale or hack into them to access personal data, financial
information, or install malware.
9. Cyber Extortion: Criminals may threaten to release sensitive or
embarrassing information unless a victim pays a ransom. This can
involve sextortion (threatening to expose explicit content) or other forms
of extortion.
10. Insider Threats: Employees or individuals with insider access to
computer systems and data may misuse their privileges to steal or
manipulate information.
11. Crypto jacking: Cybercriminals use a victim's computer or mobile
device to mine crypto currency without their consent, which can slow
down the device and increase energy consumption.
To protect against cybercrime targeting computers and mobiles, individuals and
organizations should implement robust cyber security measures, regularly
update software, use strong passwords, be cautious when clicking on links or
downloading files, and stay informed about the latest cyber threats and best
practices.
6. Cyber crime against women and children
Cybercrimes against women and children are particularly concerning because
they often involve harassment, exploitation, or abuse of vulnerable
individuals. Here are some common types of cybercrimes targeted at women
and children:
a. Cyberbullying: Both women and children can be victims of
cyberbullying, which includes online harassment, threats, and
intimidation. Perpetrators may use social media, messaging apps, or other
digital platforms to target their victims.
b. Online Harassment: This includes sending unsolicited, offensive, or
threatening messages, images, or videos to women or children. It can be a
form of cyberbullying and may have severe emotional and psychological
effects.
c. Revenge Porn: Perpetrators may share explicit or intimate images or
videos of women without their consent, often as an act of revenge. This is
a violation of privacy and can cause significant harm to victims.
d. Sexting Exploitation: In cases involving children, sexting can lead to
exploitation when someone coerces or blackmails minors into sharing
explicit images or videos. This can have legal and psychological
consequences for the child involved.
e. Online Grooming: Predators may use online platforms to groom
children for sexual exploitation. They build trust with the child and
gradually manipulate them into sharing personal information or engaging
in inappropriate activities.
f. Child Pornography: The distribution, possession, or creation of child
pornography is illegal and exploits children. Criminals often use the
internet to share such material.
g. Online Trafficking: Human traffickers may use the internet to lure
and exploit women and children, including for purposes of forced labor or
sexual exploitation. Online platforms can be used to recruit victims.
h. Cyber stalking: This involves persistent and unwanted online
attention, often leading to fear or emotional distress. Women and children
can be targeted by cyber stalkers who may threaten or harass them
through digital means.
i. Financial Fraud: Women can also be victims of financial fraud,
including online scams targeting personal finances or online dating scams
where perpetrators exploit emotional connections for financial gain.
j. Privacy Violations: Privacy breaches can occur when personal
information or photographs are shared without consent, affecting both
women and children. This can lead to identity theft or other forms of
cybercrime.
To combat cybercrimes against women and children, various organizations
and governments have implemented laws and initiatives aimed at raising
awareness, providing support to victims, and prosecuting offenders.
Financial frauds
▪ Financial frauds can have devastating consequences for individuals and
the economy as a whole. While digital payments have made life
convenient and easy In India, they have also made us prone to all kinds of
financial frauds.
▪ Ponzi Schemes: A Mirage of False Promises
• Ponzi schemes lure investors with promises of unusually high returns in
a short period. The fraudsters use funds from new investors to pay off
earlier investors, creating a false illusion of profitability.
Identity fraud
• Identity fraud is common on Internet. Criminals have a few options
when it comes to stealing your sensitive information.
• They might target you with a phishing attack where they email, call, or
text pretending to be from your bank. Or, they could target you with a
cyber attack to get you to install malware on your devices that steals your
logins and passwords.
• How do you know you're being targeted?
Fraudulent charities
• Scammers use philanthropy as fraud, too. Charity fraud entails creating
a fake charity and collecting “donations” that disappear along with the
thief
• How does charity fraud happen?
b. Session replay:
c. Message modification:
e. Denial-of-service (DDoS):
Passive Attacks:
Passive attacks are relatively scarce from a classification perspective, but can be
carried out with relative ease, particularly if the traffic is not encrypted.
Types of Active attacks:
a. Eavesdropping (tapping):
b. Traffic analysis:
Basic checklist, privacy and security settings for popular social media
platforms
Privacy and security settings on social media platforms are essential to
safeguard your personal information and control who can access your data.
Here's a basic checklist for privacy and security settings on some popular social
media platforms:
Facebook:
1. Profile Privacy:
Set your profile visibility to "Friends" to limit who can see your
posts and personal information.
2. Timeline and Tagging:
Review and customize who can post on your timeline and who can
tag you in posts and photos.
3. Friend Requests:
Adjust settings to control who can send you friend requests.
4. Apps and Websites:
Regularly review and remove third-party apps that have access to
your Facebook account.
5. Security and Login:
Enable two-factor authentication for an extra layer of security.
Review active sessions to monitor where your account is being
accessed.
6. Notifications:
Customize notification settings to stay informed about account
activities.
Instagram:
1. Account Privacy:
Set your account to private to control who can see your posts and
stories.
2. Story Controls:
Adjust settings for who can reply to your stories and who can share
them.
3. Tagging and Mentions:
Manage settings for who can tag you in photos and videos.
4. Comments:
Control who can comment on your posts and filter out offensive
comments.
5. Two-Factor Authentication:
Enable two-factor authentication for enhanced security.
6. Linked Accounts:
Review and manage linked accounts for cross-posting.
Twitter:
1. Tweet Privacy:
Adjust tweet privacy settings to control who can see your tweets.
2. Account Security:
Enable two-factor authentication for added security.
3. Discoverability:
Control whether your account can be found by email address or
phone number.
4. Tweet Tagging:
Manage who can tag you in photos.
5. Data and Permissions:
Review and manage third-party apps with access to your Twitter
account.
LinkedIn:
1. Profile Privacy:
Customize who can see your connections, activities, and
endorsements.
2. Connection Requests:
Manage settings for who can send you connection requests.
3. Profile Viewing Options:
Adjust settings to control what others can see when you view their
profiles.
4. Data Sharing with Third-Party Apps:
Review and manage apps that have access to your LinkedIn data.
5. Two-Factor Authentication:
Enable two-factor authentication for additional security.
Snapchat:
1. Privacy Settings:
Customize who can send you snaps and view your stories.
2. Discoverability:
Manage settings to control who can find you using your phone
number.
3. Snap Map:
Choose who can see your location on the Snap Map.
4. Memories:
Set privacy options for saving and sharing snaps.
5. Login Verification:
Enable two-factor authentication for enhanced security.
Cyber Space
Architecture of cyberspace
There isn't a single, specific architecture for cyberspace, as it encompasses a
wide range of technologies, protocols, and platforms. Some key components
and concepts related to the architecture of cyberspace are:
Internet society
Internet Society (ISOC) A professional membership society that promotes
the use and future development of the Internet. It has individual and
organization members all over the world and is governed by an elected
board of trustees. ISOC coordinates various groups responsible for Internet
infrastructure.
▪These include-
1. The Internet Engineering Task Force (IETF)- The IETF develops technical
standards for the Internet.
2. The Internet Architecture Board (IAB) - The IAB has overall responsibility
for the architecture and adjudicates on disputes about standards.
3. The Internet Engineering Steering Group (IESG): The IESG, along with the
IAB, reviews standards proposed by the IETF
Regulation of cyberspace
▪Cyberspace spans worldwide, but it has no formal framework. The lack of
formal framework makes cyberspace nobody's domain
▪No single individual, entity, or government owns or controls cyberspace.
▪Regulation in cyberspace is an emerging challenge
▪The default in cyberspace is anonymity. Anonymity encourages and enhances
the exercise of freedom. A child too shy to express himself in physical space
can feign to be somebody else in virtual space, and express himself freely.
▪Crimes of global repercussion are also committed with the use of the internet.
Trafficking of persons, child pornography, kidnapping for ransom, and
terrorism are perpetrated with the use of cyberspace. Freedom thus in
cyberspace should not be exercised without the concomitant responsibility of
its users.
▪Practical Problems in Extending the Traditional Laws to Cyberspace
1. Multiple Jurisdictions-Because of anonymity of the Internet user, absence of
geographical boundaries in the cyberspace, and the cross border effect of
Internet transactions, all legal systems face legal uncertainty.
2. Problem of Policing-The lack of technical knowledge, non-co-operation among
different police organization etc., make the problem too difficult to be solved.
3. Expensive Process- Training of law enforcement officers to solve the issue of
cybercrime is very expensive.
4. Obtaining Digital Evidence- Another instance where the policing of
cybercrime becomes difficult is with regard to obtaining the digital evidence.
Cyber Threat
• A Cyber threat is any malicious act that attempts to gain access to a computer
network without authorization or permission from the owners.
• It refers to the wide range of malicious activities that can damage or disrupt a
computer system, a network or the information it contain.
Cyber Threat Cyber Attack
A Threat by definition is a condition / An Attack by definition is an intended
circumstance which can cause damage action to cause damage to system/asset.
to the system/asset.
Threats can be intentional like human The attack is a deliberate action. An
negligence or unintentional like natural attacker has a motive and plan the
disasters. attack accordingly.
A Threat may or may not malicious. An Attack is always malicious.
Chance to damage or information The chance to damage or information
alteration varies from low to very high. alternation is very high.
Social media comes in various forms, each with its unique features and purposes.
Here are some types-
1. Social networking sites
• Social networking sites allow people to connect with each other through a
shared online space.
• Users can like, share, comment on posts and follow other users and
businesses.
• Examples: Facebook, LinkedIn, Instagram, Twitter, TikTok and Snapchat
2. Media Sharing Networks
▪ Media sharing types of Social Media are used to find and share photographs,
live video, video and other kinds of media on the web.
▪ They are also going to help you in brand building, lead generation, targeting
and so on.
▪ Examples: Instagram, Snapchat, YouTube
3. Discussion Forums
▪ Discussion forums encourage people to answer each other's questions and
share ideas and news.
▪ Discussion forums are very essential because they allow users to ask questions
and get answers from different people.
▪ Examples: Quora, Reddit, Digg
4. Blogs and community platforms
▪ These social media networks give you a place to publish your thoughts on
your job, current events, hobbies and more.
▪ Blogs are a great way for businesses and marketers to reach and provide
credible information to their target audience.
▪ Examples: WordPress, Tumblr, Medium
Social networking is also a significant opportunity for marketers seeking to
engage customers.Facebook remains the largest and most popular social
network, with 2 billion people using the platform daily, as of Feb 1, 2023.1
Other popular platforms in the U.S. are Instagram, X, WhatsApp, TikTok,
and Pinterest.
5. Bookmarking networks
▪ Bookmarking networks are platforms where users save different ideas, articles,
posts and other content for later use.
▪ Many people also share links to lists of online resources.
▪ The purpose of these websites is to discover new content based on shared
interests and to discuss trends.
▪ Examples: Feedly, Flipboard,Pocket,StumbleUpon, Pinterest
6. Consumer Review Networks
▪ Using Customer Review networks will help you find out, share and review
different information about a variety of products, services or brands.
▪ When a business has positive reviews on these networks, their claims turn
more credible because reviews on these networks act as Social Proof.
▪ Examples: Yelp, Zomato, TripAdvisor
7. Social shopping networks
▪ These networks help people spot trends, share great finds, make purchases and
follow their favourite brands. They focus on e-commerce, and the social
element makes it engaging and entertaining.
▪ Examples: Polyvore, Etsy, Fancy
These categories often overlap, and many social media platforms offer a
combination of functionalities to meet user needs and preferences.
Hashtag
▪ When it comes to social media, the hashtag is used to draw attention, organize,
promote, and connect.
▪ Hashtags refer to the usage of the pound or number symbol, "#," to mark a
keyword or topic on social media.
▪ It's used within a post on social media to help those who may be interested in
your topic to be able to find it when they search for a keyword or particular
hashtag
▪ It helps to draw attention to your posts and encourage interaction.
▪ The hashtag's use in social media is closely associated with microblogging site
Twitter.
▪ Hashtags can be a fun way to enhance communication and connect yourself to
others discussing the same topic. They offer a shorthand way of referring to a
topic, providing context, or simply adding humor or sarcasm to a message.
Viral content
1. Privacy Settings: Review and adjust your privacy settings regularly on each
platform. Limit who can see your posts, personal information, and contact
details.
2. Strong Passwords: Use strong, unique passwords for each social media
account. Consider using a password manager to generate and store complex
passwords securely.
3. Two-Factor Authentication (2FA): Enable 2FA wherever possible. This adds
an extra layer of security by requiring a second form of verification, such as a
text code or authentication app.
4. Be Mindful of Sharing: Think before posting. Avoid sharing sensitive personal
information, like your address or phone number, publicly. Be cautious about
sharing location-based information.
5. Regularly Review Permissions: Periodically review and revoke access for
third-party apps that are connected to your social media accounts. Some apps
may have access to more of your data than necessary.
6. Customize Audience: Use platform features that allow you to customize the
audience for each post. Not everything needs to be visible to everyone on your
friend list.
7. Limit Tagging and Geo-Tagging: Disable automatic tagging and geotagging
features. This prevents others from tagging you in posts without your approval
and sharing your location.
8. Update Privacy Policies: Stay informed about platform privacy policies and
adjust settings accordingly when policies change.
9. Regularly Audit Your Profile: Review your profile periodically to remove old
posts, photos, or information that you no longer want to be public.
10. Educate Yourself: Keep yourself updated on common privacy threats and
tactics used by scammers or hackers. Awareness goes a long way in protecting
yourself.
▪ Remember, while social media is a fantastic tool for connecting and sharing, it's
crucial to balance sharing with safeguarding your privacy and security.
▪ Challenges:
1. Privacy Concerns: Users often share personal information, leading to
privacy breaches, identity theft, and data misuse.
2. Cyberbullying and Harassment: Online platforms can become breeding
grounds for cyberbullying and harassment, affecting mental health and well-
being.
3. Fake News and Misinformation: Social networks propagate false
information rapidly, influencing opinions and behaviors.
4. Addiction and Mental Health: Excessive use of social media can lead to
addiction, affecting mental health, self-esteem, and real-life relationships.
5. Filter Bubbles and Echo Chambers: Algorithms personalize content,
creating isolated echo chambers where users are exposed only to viewpoints
similar to their own, limiting diverse perspectives.
6. Online Disinformation Campaigns: Social networks are susceptible to
coordinated disinformation efforts that can manipulate public opinion,
influence elections, and sow societal discord.
7. Security Threats: Cyberattacks, phishing, and scams can exploit
vulnerabilities within networks, compromising user data and security.
▪ Opportunities:
1. Global Connectivity: Social networks enable people worldwide to connect,
communicate, and share ideas effortlessly.
2. Business and Marketing: Platforms offer businesses a vast audience for
advertising, customer engagement, and market research.
3. Information Dissemination: Social media facilitates the rapid spread of
information, raising awareness about various issues and causes.
4. Community Building: Users can find like-minded individuals, create
communities, and mobilize for social change.
5. Education and Learning: Social networks serve as platforms for
educational content, fostering learning communities and sharing knowledge.
6. Career Networking: Professional networks assist in career growth, job
hunting, and industry connections.
▪Pitfalls:
1. Over-reliance on Algorithms: Algorithms can reinforce biases, limit
exposure to diverse perspectives, and prioritize sensational content over
quality information.
2. Dependence on Engagement Metrics: Platforms often prioritize
engagement metrics (likes, shares) over content accuracy or depth,
encouraging clickbait and shallow content.
3. Lack of Regulation: The absence of robust regulations can lead to
unchecked spread of harmful content, misinformation, and exploitation of
user data.
4. Monetization vs. User Well-being: Business models focused on ad revenue
may conflict with user well-being, as platforms aim to maximize user
engagement.
5. Digital Divide: Not everyone has equal access to social networks due to
socioeconomic factors, creating a digital divide.
To mitigate these risks, users should regularly review and adjust privacy
settings, use strong and unique passwords, be cautious about sharing personal
information, verify sources before sharing news, and remain vigilant against
suspicious activities.
Flagging and reporting of inappropriate content
▪ Flagging and reporting inappropriate content on social media platforms is crucial
for maintaining a safe and respectful online environment.
1. Hate Speech and Discrimination: Many countries have laws against hate
speech, which includes content that promotes violence or discrimination against
individuals or groups based on characteristics like race, religion, ethnicity,
gender, sexual orientation, or disability.
In India, there are laws and regulations that address the posting of inappropriate
content on social media platforms.
Case studies.
Security Case Studies:
1. Facebook-Cambridge Analytica Scandal (2018): Cambridge Analytica
harvested data from millions of Facebook profiles without users' consent. This
breach raised concerns about data privacy and led to investigations, changes in
Facebook's policies, and CEO Mark Zuckerberg's testimony in front of
Congress.
2. Twitter Hacks (2020): Several high-profile Twitter accounts, including those
of Barack Obama, Elon Musk, and Bill Gates, were compromised in a Bit coin
scam. Hackers gained access to accounts through social engineering attacks on
employees, highlighting the need for robust internal security protocols.
3. LinkedIn Data Breach (2021): Personal data of around 500 million LinkedIn
users, including email addresses and phone numbers, was scraped and put for
sale online. It raised concerns about data scraping and the vulnerability of
personal information on professional networking sites.
4. TikTok's Privacy Concerns: TikTok faced scrutiny over its data collection
practices, especially given its Chinese ownership. Concerns were raised about
the potential misuse of user data and its handling, leading to investigations and
debates regarding national security risks.
5. WhatsApp Privacy Policy Update (2021): WhatsApp faced backlash after
announcing changes to its privacy policy, allowing greater data sharing with its
parent company, Facebook. This led to widespread concern over user privacy
and data sharing practices.
Security Measures:
▪ Two-Factor Authentication (2FA): Adding an extra layer of security to
accounts.
▪ Privacy Settings Review: Regularly reviewing and adjusting privacy settings.
▪ Strong Passwords: Using complex and unique passwords for different
platforms.
▪ Regular Updates and Patches: Ensuring apps and devices are updated with the
latest security patches.
▪ Awareness and Education: Educating users about potential threats and best
practices for staying secure online.