In this 4-part blog series, up-and-coming cybersecurity researcher Dakota State University Junior, Mariel Klosterman, describes the how sock puppets are used by malicious actors and OSINT investigators, types of sock puppet accounts, and how to create a sock puppet for information collection. Malicious actor: A person who, through any means, threatens or attempts to threaten the security of an individual or company for malicious purposes.Puppeteer: A person who creates sock puppet accounts for either benign or malicious purposes.More commonly known as a fake account or alternate account. Sock puppet account: An account created for a disingenuous purpose (that is, for a purpose other than what it is meant to be used for).However, this is not the only way to use a sock puppet account.įor the purposes of this discussion, the following definitions will be used: Sock puppet accounts are mainly known to those outside the information security field as accounts used for disinformation purposes, such as swaying your opinion about a topic or a product. Daniel Kats, Senior Principal Researcher for NortonLifeLock Research, held a similar view in his article, “Identifying Sockpuppet Accounts on Social Media Platforms:” “We define a sockpuppet as a fictitious online identity created for the purposes of deception.” The most common definition is found on Wikipedia’sentry: A sock puppet or sockpuppet is an online identity used for purposes of deception. When you search “sock puppet accounts” using Google, there are a few definitions that show in the search results, and they all follow a common theme. Junior at Beacom College of Computer and Cyber Sciences, Dakota State University
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |