Design Thinking for Cyber Security in Social Media Bulling.pptx
KamakshiMB1
35 views
28 slides
May 31, 2024
Slide 1 of 28
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
About This Presentation
Design Thinkung for Cyber Security
Size: 303.26 KB
Language: en
Added: May 31, 2024
Slides: 28 pages
Slide Content
RV COLLEGE OF ENGINEERING ® (Autonomous Institution Affiliated to VTU, Belagavi) Department of Telecommunication Engineering (2019-2020) Assignment Presentation DESIGN THINKING FOR CYBERSECURITY AND SOCIAL MEDIA BULLYING For The Course Intellectual Property Rights And Entrepreneurship(16HSI51) Presented By R. PRUTHU (1RV17TE038) SHASHANK SHRIVASTAVA(1RV17TE046) VELURI SAITEJA (1RV17TE059)
Certified that the Assignment topic titled “DESIGN THINKING FOR CYBERSECURITY AND SOCIAL MEDIA BULLYING” is carried out by SHASHANK SHRIVASTAVA(1RV17TE046), R.PRUTHU(1RV17TE038), VELURI SAITEJA(1RV17TE059) who are bonafide students of RV College of Engineering, Bengaluru in partial fulfilment for the V semester of Bachelor of Engineering during the academic year 2019-20 in “Intellectual Property Rights and Entrepreneurship”. It is certified that all corrections/ suggestions indicated for the internal assessment have been incorporated in the report. The assignment report has been approved as it satisfies the academic requirement in respect of the work prescribed by the institution for the said course. CERTIFICATE
INDEX INTRODUCTION TO DESIGN THINKING DESIGN THINKING PHASES NEED FOR DESIGN THINKING PROBLEM STATEMENT CASE STUDIES SOLUTION FOR THE PROBLEM
What is Design Thinking? Design Thinking is an iterative process in which we seek to understand the user, , and redefine problems in an attempt to identify alternative strategies and solutions that might not be instantly apparent with our initial level of understanding. At the same time, Design Thinking provides a solution-based approach to solving problems. It is a way of thinking and working as well as a collection of hands-on methods. Design Thinking revolves around a deep interest in developing an understanding of the people for whom we’re designing the products or services. It helps us observe and develop with the target user. Design Thinking also involves ongoing experimentation: , prototyping, testing, and trying out concepts and ideas.
Design Thinking Phases There are many variants of the Design Thinking process in use today, and they have from three to seven phases, stages, or modes. The five phases of Design Thinking, according to d.school, are as follows: Empathise – with your users Define – your users’ needs, their problem, and your insights Ideate – by challenging assumptions and creating ideas for innovative solutions Prototype – to start creating solutions Test – solutions
Understanding is the primary period of the plan thinking process. Amid this stage, learners inundate themselves in learning .They converse with specialists and direct research. The objective is to create foundation learning through these encounters. They utilize their creating understandings as a springboard as they address design challenges. 2. OBSERVE In this stage, One can turn into sharp individuals in the perception period of the design thinking process. They observe how individuals carry on and connect and they find physical spaces and places. They converse with individuals about what they are doing, make inquiries and ponder what they see. The comprehension and perception periods of design thinking enable learners to build up a feeling of empathy. 1.EMPATHISE
3. DEFINE This states a proposal about how to roll out improvements that will affect people groups’ encounters. This stage needs to do with prototyping to encourage the development procedure. The thoughts from the last couple of steps are presently put into a physical frame. This is a decent method to advance and research thoughts to limit to a particular idea. 4. IDEATE Ideating is a fundamental part of design thinking. Learners are tested to conceptualize a heap of thoughts and to suspend judgment. No thought is too implausible, and nobody’s thoughts are rejected. Ideating is about imagination and fun. In the ideation stage, the amount is supported. Learners might be requested to create a hundred thoughts in a single session.
5. PROTOTYPE Prototyping is a harsh and quick part of the planning procedure. A prototype can be a draw, demonstrate, or a cardboard box. It is an approach to pass on a thought rapidly. Learners discover that it is smarter to flop early and frequently as they make prototypes. 6. TEST Testing is a part of an iterative procedure that gives learners criticism. The reason for testing is to realize what works and what doesn’t, and afterward emphasize. This implies returning to your model and changing it in view of criticism. Testing guarantees that learners realize what works and what doesn’t work for their clients.
PROBLEM STATEMENT Computer Information Systems , Infrastructures, Computer Networks or Personal computer devices could get targeted with any type of offensive action using various methods to steal , alter or destroy date or systems , this is called as a Cyber Attack. Why do Cyber Attacks happen? Cyber attacks are usually either criminally or politically motivated, although some hackers enjoy bringing down computer systems a thrill or sense of achievement. Cyber attacks can also lead to data breaches – where large amounts of information are leaked online and then used by criminals to commit financial fraud. Type of Cyber attacks: Denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks Man-in-the-middle (MitM) attack Phishing and spear phishing attacks Drive-by attack Password attack Malware attack
Top 10 of the world's largest cyber attacks Adobe Sony Target Alteryx Equifax Adult Friend Finder exposed. Marriott hotels
WHY SYSTEMS ARE VULNERABLE When large amounts of data are stored in electronic form, they are vulnerable to many more kinds of threats than when they existed in manual form. Through communications networks, information systems in different locations are interconnected. The potential for unauthorized access, abuse, or fraud is not limited to a single location but can occur at any access point in the network.
MALICIOUS SOFTWARE: VIRUSES, WORMS, TROJAN HORSES, AND SPYWARE A computer virus is a rogue software program that attaches itself to other software programs or data files in order to be executed, usually without user knowledge or permission. Most recent attacks have come from worms, which are independent computer programs that copy themselves from one computer to other computers over a network. A Trojan horse is a software program that appears to be benign but then does something other than expected. The Trojan horse is not itself a virus because it does not replicate, but it is often a way for viruses or other malicious code to be introduced into a computer system.
Spoofing:- Spoofing also may involve redirecting a weblink to an address different from the intended one, with the site masquerading as the intended destination. For example, if hackers redirect customers to a fake website that looks almost exactly like the true site, they can then collect and process orders, effectively stealing business as well as sensitive customer information from the true site. One increasingly popular tactic is a form of spoofing called phishing. Phishing involves setting up fake Web sites or sending e-mail messages that look like those of legitimate businesses to ask users for confidential personal data.
The e-mail message instructs recipients to update or confirm records by providing social security numbers, bank and credit card information, and other confidential data either by responding to the e-mail message, by entering the information at a bogus website, or by calling a telephone number. EBay, PayPal, Amazon, Walmart, and a variety of banks are among the top spoofed companies. In a more targeted form of phishing called spear phishing, messages appear to come from a trusted source, such as an individual within the recipient's own company or a friend.
Sniffing:- A sniffer is a type of eavesdropping program that monitors information traveling over a network. When used legitimately, sniffers help identify potential network trouble spots or criminal activity on networks, but when used for criminal purposes, they can be damaging and very difficult to detect. Sniffers enable hackers to steal proprietary information from anywhere on a network, including e-mail messages, company files, and confidential reports.
Denial-of-Service Attacks In a denial-of-service (DoS) attack, hackers flood a network server or Web server with many thousands of false communications or requests for services to crash the network. The network receives so many queries that it cannot keep up with them and is thus unavailable to service legitimate requests. A distributed denial-of-service (DDoS) attack uses numerous computers to inundate and overwhelm the network from numerous launch points.
CASE STUDY FOR CYBERSECURITY Last week, a hacker broke into the database of Zomato, India’s largest online restaurant guide, and accessed five vital details – names, emails, numeric user IDs, user names and password hashes – of around 17 million users. The hacker then offered up the details for sale on the darknet before entering into negotiations with the company. The incident set alarm bells ringing in the country’s cyber security network as internet users often use the same passwords for multiple accounts, including social network sites, mailbox services and banking applications.
CASE STUDY FOR CYBERSECURITY Adobe announced in October 2013 the massive hacking of its IT infrastructure. Personal information of 2.9 million accounts was stolen (logins, passwords, names, credit card numbers and expiration dates). Another file discovered on the internet later brought the number of accounts affected by the attack to 150 million (only 38 million active accounts). To access this information, the hackers took advantage of a security breach at the publisher, specifically related to security practices around passwords. The stolen passwords had been encrypted instead of being chopped as recommended. The company was attacked not only for its customer information, but also for its product data. Indeed, the most worrying problem for Adobe was the theft of over 40GB of source code. For instance, the entire source code for the ColdFusion product was stolen as well as parts of the source codes for Acrobat Reader and Photoshop.
The Facts On Social Media Bullying: In 2011, 95% of all teens 12-17 years of age were online, and 80% of them were on social media sites. There were 5 million kids 10 years and younger who had a Facebook account, and the majority of those are not being supervised. Approximately 43% of teenagers report being bullied during their lifetime. Percent that are bullied: Whites 18.6% Hispanics 13.6% Blacks 8.9% Girls 22.1% Boys 10.8%
The Different Reasons Someone Might Be Bullied For: Appearance 61% Intelligence 25% Race 17% Sexuality 15% Financial Status 15% Religion 11% Other Reasons 20%
Top 20 social media platform are: Facebook Twitter Google+ YouTube Instagram Pinterest WhatsApp Snapchat
Ways to Approach There are some ways to combat cyberbullying that have been mentioned previously. Those are: Become knowledgeable about what platforms your students are using and the features involved with them (this will change from year to year). Educating the parents about cyberbullying and ways they can help their child.
Staying Safe from Cyber Bullying Remember that people on the internet lie about who they are. Keep personal information private, so that people can’t use it against you. Be careful that you’re not acting like a bully. Don’t go to sites where people treat you badly. If You’re Cyber Bullied Think, don’t react! Reacting hurts you and gives bullies what they want. Remember you have a Cyber Bullying plan. Figure out what’s best to do. Tell a trusted adult if you think it’s best or if your plan isn’t working out. Save the evidence. Solution for Social media bullying
Solution for Social media bullying Cyber Bullying Plan Stop the activity or ignore the bully. Tell the bully to stop. Don’t be a bully or make threats when you do this. Tell a trusted adult. Block the bully. If you know the bully, send copies of the bullying to his/her parents. Politely ask them to stop it. Contact your service provider. Notify the police, especially if the bullying is making serious threats. Help Your Friends When you see posts bullying someone, tell the bully to stop. Remind them that bullying isn’t cool. Offer your friendship and support to people who are bullied. If the bullying doesn’t stop, tell a trusted adult before it gets our of hand.
BUG BOUNTY PROGRAMME A bug bounty programme, also known as a vulnerability reward programme, is a deal offered by some websites and software developers under which individuals can receive remuneration, in cash or kind or in terms of recognition, for reporting bugs. While many companies, including Google , Microsoft and Facebook , have invested millions in bug bounty programmes, government and security agencies in some countries, too, have been experimenting with these over the past years.
REFERENCES:- Smith, Peter K.; Mahdavi, Jess; Carvalho, Manuel; Fisher, Sonja; Russell, Shanette; Tippett, Neil (2008). "Cyberbullying: its nature and impact in secondary school pupils". The Journal of Child Psychology and Psychiatry. 49 (4): 376–385. doi : 10.1111/j.1469-7610.2007.01846.x . PMID 18363945 . Jump up to: a b Cyberbullying – Law and Legal Definitions US Legal Jump up to: a b An Educator's Guide to Cyberbullying Brown Senate.gov, archived from the original on 10 April 2011 Jump up to: a b c d e f Hinduja, S.; Patchin, J. W. (2009). Bullying beyond the schoolyard: Preventing and responding to cyberbullying. Thousand Oaks, CA: Corwin Press. ISBN 978-1-4129-6689-4 .
Hu, Winnie (October 1, 2010). "Legal Debate Swirls Over Charges in a Student's Suicide" . New York Times. Nate Schweber. Retrieved December 1, 2016. Jump up to: Chapin, John (August 17, 2014). "Adolescents and Cyber Bullying: The Precaution Adoption Process Model". Education and Information Technologies. 21 (4): 719–728. doi : 10.1007/s10639-014-9349-1 . ISSN 1360-2357 . Jump up to: Gregorie, Trudy. "Cyberstalking: dangers on the information superhighway" (PDF). Jump up to: Hinduja, S.; Patchin, J. W. (2008). "Cyberbullying: An Exploratory Analysis of Factors Related to Offending and Victimization". Deviant Behavior. 29 (2): 129–156. doi : 10.1080/01639620701457816 . O'Keeffe, Gwenn Schurgin; Clarke-Pearson, Kathleen; Media, Council on Communications and (April 1, 2011). "The Impact of Social Media on Children, Adolescents, and Families" . Pediatrics. 127 (4): 800–804. doi : 10.1542/peds.2011-0054 . ISSN 0031-4005 . PMID 21444588 . Ramasubbu, Suren (May 26, 2015). "Influence of Social Media on Teenagers" . Huffington Post. Retrieved November 30, 2017.