Page 56 - Sayuru 40 full set
P. 56
54 Sayurusara 2019 December
platforms with a lot of infected URLs that point as an active component in a botnet infrastructure.
to compromised sites. When users click on those Though social media is also a resource to preserve
links, proposed for example through a platform from attacks, its military use inevitably leads to a
message, he is redirected to a compromised site widening of the attack surface. Quite differently
used to exploit a vulnerability in his browser and from other domains, the military has to deal
allow malware downloading on the victim’s PC. with an area without perimeter that is difficult to
protect.
Conclusions
Rapid technological evolution makes surveillance
Social media platforms have assumed a systems obsolete in a short time. It is necessary
fundamental role in our society. Every day, billions to spend a greater effort for the establishment of
of people share information, documents and any early warning and security intelligence systems
kind of content through these platforms. It is to identify cyber threats, but other improvements
natural that they have become an object of interest must take place first. The military needs an
for cyber criminals and intelligence agencies. opening to social media, but it has to be consciously
made. Military personnel and their families must
Undoubtedly, social media is of strategic be instructed on how to manage their exposure
importance for military sectors, as they offer a to social platforms. Social media platforms are
mine of information that could be analyzed using powerful resources that can carry with them an
different axes of analysis providing efficient and incredible number of threats, so it’s best to never
reliable instruments for the study of realities of let your guard down.
interest. Both defense and offense could take
advantage of social media introduction. Social
media could be, in fact, used as powerful tool for A/Sub Lieutenant (S) MAM AYAZ
information gathering, cyber espionage and also NRS 4024
SLNS Thambapanni
51 msgqfjka''' lfvd,dk mrsir moaO;sh
05' u,a lfvd,a (Bruguiera Sexangula)
óg¾ 4-6 la olajd Wi jk fuu Ydl úfYaIh o m÷re fndfyda úg fhdod .ks' c,h iu. ks;ru .efgñka
wdldrhg j¾Okh fjhs' mqIamfha we;=,; iqÿ ñY% fld< mj;sk yn,a, Tre mdre md,ï wdos ud`M w,a,k
meye;s jk w;r îcho fld, meyefhka hqla;j fiñ Wmlrk iEoSfïoS o nyq,j fuu oej fhod .kS'
6-9 la ;rï os.h' fuu u, fya;=fjka fuu Ydlhgo by< jákd lula we;s oej j¾.hls' ;jo T!Iëh
u,a lfvd,a hk ku Ndú;d flf¾' YS% ,xldfõ iq,N jákdlula we;s Ydlhla jk w;r fuu Ydlfha u,a
lfvd,a úfYaIhla jk fuh mq;a;,u l,mqj y,dj; ó ueis md,kh i|ydo WmldÍ fjhs' M,fha hqI
^mïn,& l,mqj /lj l,mqj hk m%foaYj,os yuqfõ' weia wudrej iy msksjdi boslsÍfï§ jglre i|ydo jegj,a ilia lsÍfïos Ndú;d lrhs' j¾Okh jk l,,h iy M,h msiSfuka
fuu Ydlfha m%Odk l| Ndú;d lrkq ,nhs' .Dy NdKav wdydrhgo tlalr .ks' mq¾K c,dnq;djho wkqj¾;k
md,ï myqre i|yd iy isú,sï .eiSfï os fuu oej f,i mj;s' ^fmd; m; weiqßka ilia l, w;r ;j;a
fldgila B,. l,dmfhka n,dfmdfrd;a;= jkak&
wd¾ta ùrisxy" hqtiams
fldudKav¾ ^wd¾tkawd¾&
wd¾tkawd¾ 9113
fldudKav¾ kdúl fjr< wdjrK n,ldh
platforms with a lot of infected URLs that point as an active component in a botnet infrastructure.
to compromised sites. When users click on those Though social media is also a resource to preserve
links, proposed for example through a platform from attacks, its military use inevitably leads to a
message, he is redirected to a compromised site widening of the attack surface. Quite differently
used to exploit a vulnerability in his browser and from other domains, the military has to deal
allow malware downloading on the victim’s PC. with an area without perimeter that is difficult to
protect.
Conclusions
Rapid technological evolution makes surveillance
Social media platforms have assumed a systems obsolete in a short time. It is necessary
fundamental role in our society. Every day, billions to spend a greater effort for the establishment of
of people share information, documents and any early warning and security intelligence systems
kind of content through these platforms. It is to identify cyber threats, but other improvements
natural that they have become an object of interest must take place first. The military needs an
for cyber criminals and intelligence agencies. opening to social media, but it has to be consciously
made. Military personnel and their families must
Undoubtedly, social media is of strategic be instructed on how to manage their exposure
importance for military sectors, as they offer a to social platforms. Social media platforms are
mine of information that could be analyzed using powerful resources that can carry with them an
different axes of analysis providing efficient and incredible number of threats, so it’s best to never
reliable instruments for the study of realities of let your guard down.
interest. Both defense and offense could take
advantage of social media introduction. Social
media could be, in fact, used as powerful tool for A/Sub Lieutenant (S) MAM AYAZ
information gathering, cyber espionage and also NRS 4024
SLNS Thambapanni
51 msgqfjka''' lfvd,dk mrsir moaO;sh
05' u,a lfvd,a (Bruguiera Sexangula)
óg¾ 4-6 la olajd Wi jk fuu Ydl úfYaIh o m÷re fndfyda úg fhdod .ks' c,h iu. ks;ru .efgñka
wdldrhg j¾Okh fjhs' mqIamfha we;=,; iqÿ ñY% fld< mj;sk yn,a, Tre mdre md,ï wdos ud`M w,a,k
meye;s jk w;r îcho fld, meyefhka hqla;j fiñ Wmlrk iEoSfïoS o nyq,j fuu oej fhod .kS'
6-9 la ;rï os.h' fuu u, fya;=fjka fuu Ydlhgo by< jákd lula we;s oej j¾.hls' ;jo T!Iëh
u,a lfvd,a hk ku Ndú;d flf¾' YS% ,xldfõ iq,N jákdlula we;s Ydlhla jk w;r fuu Ydlfha u,a
lfvd,a úfYaIhla jk fuh mq;a;,u l,mqj y,dj; ó ueis md,kh i|ydo WmldÍ fjhs' M,fha hqI
^mïn,& l,mqj /lj l,mqj hk m%foaYj,os yuqfõ' weia wudrej iy ms
fuu Ydlfha m%Odk l| Ndú;d lrkq ,nhs' .Dy NdKav wdydrhgo tlalr .ks' mq¾K c,dnq;djho wkqj¾;k
md,ï myqre i|yd iy isú,sï .eiSfï os fuu oej f,i mj;s' ^fmd; m; weiqßka ilia l, w;r ;j;a
fldgila B,. l,dmfhka n,dfmdfrd;a;= jkak&
wd¾ta ùrisxy" hqtiams
fldudKav¾ ^wd¾tkawd¾&
wd¾tkawd¾ 9113
fldudKav¾ kdúl fjr< wdjrK n,ldh

