Visible to the public A theoretical review of social media usage by cyber-criminals

TitleA theoretical review of social media usage by cyber-criminals
Publication TypeConference Paper
Year of Publication2017
AuthorsPatel, P., Kannoorpatti, K., Shanmugam, B., Azam, S., Yeo, K. C.
Conference Name2017 International Conference on Computer Communication and Informatics (ICCCI)
Date PublishedJan. 2017
PublisherIEEE
ISBN Number978-1-4673-8855-9
Keywordsclick-jacking prevention, Computer crime, Cross Site Scripting, Cross Site Scripting (XSS), cyber-criminals, cybercriminal, Electronic mail, Facebook, Human Behavior, human factor, human factors, identity theft, invasive software, Malware, online social networking sites, phishing, pubcrawl, resilience, Resiliency, Scalability, Social Engineering Attacks, social media, social media usage, social networking (online), spam, stalking, threats, Tools
Abstract

Social media plays an integral part in individual's everyday lives as well as for companies. Social media brings numerous benefits in people's lives such as to keep in touch with close ones and specially with relatives who are overseas, to make new friends, buy products, share information and much more. Unfortunately, several threats also accompany the countless advantages of social media. The rapid growth of the online social networking sites provides more scope for criminals and cyber-criminals to carry out their illegal activities. Hackers have found different ways of exploiting these platform for their malicious gains. This research englobes some of the common threats on social media such as spam, malware, Trojan horse, cross-site scripting, industry espionage, cyber-bullying, cyber-stalking, social engineering attacks. The main purpose of the study to elaborates on phishing, malware and click-jacking attacks. The main purpose of the research, there is no particular research available on the forensic investigation for Facebook. There is no particular forensic investigation methodology and forensic tools available which can follow on the Facebook. There are several tools available to extract digital data but it's not properly tested for Facebook. Forensics investigation tool is used to extract evidence to determine what, when, where, who is responsible. This information is required to ensure that the sufficient evidence to take legal action against criminals.

URLhttp://ieeexplore.ieee.org/document/8117694/
DOI10.1109/ICCCI.2017.8117694
Citation Keypatel_theoretical_2017