SlideShare a Scribd company logo
CEC WORK
PRESENTATION
Sentiment Analysis & Security
Group Members :-
Bl-07 | Name: Vimal
Bl-43 | Name: Kishan
Bl-50 | Name: Rachit
Bl-60 | Name: Jay Guidance by :- Ms Zakiya malek
Bl-63 | Name: Jigar Faculty of
Computer Technology MCA
What is Sentiment Analysis ?
Positive Neutral Negative
What is
Sentiment
Analysis ?
(contd)
➔ Sentiment Analysis is the process of
‘computationally’ determining whether a
piece of writing is positive, negative or
neutral. It’s also known as opinion mining,
deriving the opinion or attitude of a
speaker .
➔ The main purpose behind the Sentiment
Analysis on Tweets is to gauge the
attitude, sentiments, evaluations,
attitudes and emotions of a user who
tweeted based on the computational
treatment of subjectivity in a text.
Importance
of
Sentiment
Analysis :
➔ Sentiment analysis is extremely useful in social
media monitoring as it allows us to gain an
overview of the wider public opinion behind
certain topics. Social media monitoring tools like
Brandwatch Analytics make that process
quicker and easier than ever before, thanks to
real-time monitoring capabilities.
➔ The applications of sentiment analysis are broad
and powerful. The ability to extract insights
from social data is a practice that is being widely
adopted by organizations across the world
Why
Sentiment
Analysis is to
be used ?
➔ Businesses today are heavily dependent on data.
Majority of this data however, is unstructured
text coming from sources like emails, chats,
social media, surveys, articles, and documents.
➔ The micro-blogging content coming from
Twitter and Facebook poses serious challenges,
not only because of the amount of data involved,
but also because of the kind of language used in
them to express sentiments, i.e., short forms,
memes and emoticons.
How SA is related to Cyber security ?
➔ Emotional intelligence is the ability to empathize, control our own
emotions, and interact with others in a way that accounts for the role
feelings play in how people make decisions.
➔ In many fields, including education, marketing, and sales, the
importance of emotional intelligence is widely acknowledged. But it’s
somewhat unusual to hear about emotional intelligence in the
cybersecurity space.
How SA is related to
Cyber security ? (contd)
➔ According to research being done at
Google and the University of
Florida, is that it takes advantage of
how the human brain works--and,
crucially, how people fail to detect
deception, depending on factors like
emotional intelligence, cognitive
motivation, mood, hormones, and
even the victim’s personality.
➔ Emotional Intelligence play an important role because people are still at the center of
efforts to keep data safe, and hackers play on users’ emotions to gain access to
confidential information. Here are just a few examples of how emotional intelligence
comes into play in cybersecurity:
◆ According to Verizon’s 2019 Data Breach Investigations Report, phishing remains a top
attack vector, with people falling for scams designed to bypass cybersecurity measures.
◆ Hackers are getting more emotionally intelligent; sophisticated cybercriminals analyze
when potential victims catch on to attempted scams and develop more convincing ruses.
Eg: Google Translate scam, Apple Phishing scam, Paypal scam, Netflix Phishing scam
➔ In the cybersecurity world, user security awareness training is considered a must and has
been adopted by many companies, but data breaches are still on the rise.
How SA is related to Cyber security ? (contd)
How to use SE to strengthen cyber security
➔ So, what can you do to bring your cybersecurity emotional IQ up? The first step is to
realize the role emotional intelligence plays in security and look for ways to incorporate
best practices. Here are some tips on how to use emotional intelligence to beef up
cybersecurity and foil attacks:
◆ Use positive language when discussing cybersecurity
◆ Be empathetic with users
◆ Demonstrate that position is no protection
◆ Teach staff to be suspicious of urgency
◆ Make security awareness training engaging and personal
◆ Use technology that minimizes the damages that result from human error
Role of Sentiment Analysis in Cybersecurity
Cyber
Security
Emotional IQ
Range
➔ To ensure that you maximize your
organization’s emotional intelligence defenses
against cyber threats, honestly assess your
current security posture through that lens and
identify areas for improvement.
➔ Think of it as a range, with the worst actions at
one end and the best at the other. Then, create a
plan to improve your security posture through
better emotional intelligence.
Case Study !
On Verizon data
breach
Verizon data breach Investigations
report
➔ The extensive report provides in-
depth insights and perspectives on
the tactics and techniques used in
cyberattacks and detailed
information on the current threat
landscape.
➔ The 2019 Verizon Data Breach
Investigations Report is the most
comprehensive report released by
Verizon to date and includes
information from 41,686 reported
security incidents and 2,013 data
breaches from 86 countries.
The key findings of the report are :
➔ Cyber-espionage related data breaches increased from 13% of breaches in 2017 to 25%
in 2018
➔ Nation-state attacks increased from 12% of attacks in 2017 to 23% in 2018
➔ Financially motivated breaches fell from 76% to 71%
➔ Phishing is involved in 32% of breaches and 78% of cyber-espionage incidents
➔ 52% of cyber attacks involve hacking
➔ 34% of attacks involved insiders
➔ 43% of cyber attacks were on small businesses.
➔ There has been a six-fold decrease in attacks on HR personnel
➔ Misconfiguration of cloud platforms accounted for 21% of breaches caused by errors
Role of Sentiment Analysis in Cybersecurity
Cyberattack
s on the
Healthcare
Industry
➔ The 2019 DBIR included 466 healthcare
cybersecurity incidents, 304 of which involved
confirmed data disclosures.
➔ Out of all industry sectors analyzed, healthcare
was the only industry where the number of
incidents caused by insiders was greater than
those caused by external threat actors.
➔ 72% of breaches involved medical data, 34%
involved personal information, and 25% involved
credential theft.
➔ It should be noted that, in most cases,
ransomware attacks are reportable breaches
under HIPAA.
Library Used !
VADER (Valence Aware Dictionary
and Sentiment Reasoner)
➔ VADER is a lexicon and rule-based sentiment analysis tool that is specifically attuned to
sentiments expressed in social media.
➔ VADER uses a combination of a sentiment lexicon is a list of lexical features (e.g., words)
which are generally labeled according to their semantic orientation as either positive or
negative.
➔ It produces 4 metrics - positive, negative, neutral and compound score.
Time for a
Live Demo !
Role of Sentiment Analysis in Cybersecurity
Thank you !
For your
Cooperation :)

More Related Content

PPTX
Computer Vision(4).pptx
PPTX
Application of computer graphic
PDF
Movie Business Plan
PPT
Computer graphics1
PPTX
Projection of solid cone Step by step Process
PPT
Random and raster scan
PDF
El Arte de la Presentación - UVAInnova - parte 2/2
PDF
Bresenham line-drawing-algorithm By S L Sonawane.pdf
Computer Vision(4).pptx
Application of computer graphic
Movie Business Plan
Computer graphics1
Projection of solid cone Step by step Process
Random and raster scan
El Arte de la Presentación - UVAInnova - parte 2/2
Bresenham line-drawing-algorithm By S L Sonawane.pdf

Similar to Role of Sentiment Analysis in Cybersecurity (20)

PDF
Priming your digital immune system: Cybersecurity in the cognitive era
PDF
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
PDF
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
PDF
Executive Summary of the 2016 Scalar Security Study
PDF
2016 Scalar Security Study Executive Summary
PPTX
Hacking the Human - How Secure Is Your Organization?
PDF
Insider_Threats_in_Healthcare_1651617236.pdf
PDF
Cybersecurity: Perceptions & Practices
PDF
Insider threats
PPTX
How to Mitigate Risk From Your Expanding Digital Presence
PDF
Most Influential Cybersecurity Leader to Follow in 2024.pdf
PPTX
Cybersecurity Risk Management Tools and Techniques (1).pptx
PDF
Cybersecurity awareness.pdf
PPT
Professor Martin Gill, Director, Perpetuity Research
PDF
Insuring your future: Cybersecurity and the insurance industry
PDF
We are living in a world where cyber security is a top priority for .pdf
PDF
Banning Whining, Avoiding Cyber Wolves, and Creating Warrior
PDF
Before the Breach: Using threat intelligence to stop attackers in their tracks
PDF
Enhancing Cyber Security Awareness: Building a Safer Digital World
PDF
Under cyber attack: EY's Global information security survey 2013
 
Priming your digital immune system: Cybersecurity in the cognitive era
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
Executive Summary of the 2016 Scalar Security Study
2016 Scalar Security Study Executive Summary
Hacking the Human - How Secure Is Your Organization?
Insider_Threats_in_Healthcare_1651617236.pdf
Cybersecurity: Perceptions & Practices
Insider threats
How to Mitigate Risk From Your Expanding Digital Presence
Most Influential Cybersecurity Leader to Follow in 2024.pdf
Cybersecurity Risk Management Tools and Techniques (1).pptx
Cybersecurity awareness.pdf
Professor Martin Gill, Director, Perpetuity Research
Insuring your future: Cybersecurity and the insurance industry
We are living in a world where cyber security is a top priority for .pdf
Banning Whining, Avoiding Cyber Wolves, and Creating Warrior
Before the Breach: Using threat intelligence to stop attackers in their tracks
Enhancing Cyber Security Awareness: Building a Safer Digital World
Under cyber attack: EY's Global information security survey 2013
 
Ad

Recently uploaded (20)

PPTX
Acceptance and paychological effects of mandatory extra coach I classes.pptx
PPT
Predictive modeling basics in data cleaning process
PPTX
IMPACT OF LANDSLIDE.....................
PPTX
QUANTUM_COMPUTING_AND_ITS_POTENTIAL_APPLICATIONS[2].pptx
PPTX
Market Analysis -202507- Wind-Solar+Hybrid+Street+Lights+for+the+North+Amer...
PPTX
(Ali Hamza) Roll No: (F24-BSCS-1103).pptx
PPTX
CYBER SECURITY the Next Warefare Tactics
PPTX
Managing Community Partner Relationships
PPTX
retention in jsjsksksksnbsndjddjdnFPD.pptx
PDF
Systems Analysis and Design, 12th Edition by Scott Tilley Test Bank.pdf
PPTX
New ISO 27001_2022 standard and the changes
PPTX
Database Infoormation System (DBIS).pptx
PDF
Jean-Georges Perrin - Spark in Action, Second Edition (2020, Manning Publicat...
PPT
ISS -ESG Data flows What is ESG and HowHow
PPTX
Introduction to Inferential Statistics.pptx
PPTX
01_intro xxxxxxxxxxfffffffffffaaaaaaaaaaafg
PPTX
IBA_Chapter_11_Slides_Final_Accessible.pptx
PDF
REAL ILLUMINATI AGENT IN KAMPALA UGANDA CALL ON+256765750853/0705037305
PDF
Global Data and Analytics Market Outlook Report
PPTX
Qualitative Qantitative and Mixed Methods.pptx
Acceptance and paychological effects of mandatory extra coach I classes.pptx
Predictive modeling basics in data cleaning process
IMPACT OF LANDSLIDE.....................
QUANTUM_COMPUTING_AND_ITS_POTENTIAL_APPLICATIONS[2].pptx
Market Analysis -202507- Wind-Solar+Hybrid+Street+Lights+for+the+North+Amer...
(Ali Hamza) Roll No: (F24-BSCS-1103).pptx
CYBER SECURITY the Next Warefare Tactics
Managing Community Partner Relationships
retention in jsjsksksksnbsndjddjdnFPD.pptx
Systems Analysis and Design, 12th Edition by Scott Tilley Test Bank.pdf
New ISO 27001_2022 standard and the changes
Database Infoormation System (DBIS).pptx
Jean-Georges Perrin - Spark in Action, Second Edition (2020, Manning Publicat...
ISS -ESG Data flows What is ESG and HowHow
Introduction to Inferential Statistics.pptx
01_intro xxxxxxxxxxfffffffffffaaaaaaaaaaafg
IBA_Chapter_11_Slides_Final_Accessible.pptx
REAL ILLUMINATI AGENT IN KAMPALA UGANDA CALL ON+256765750853/0705037305
Global Data and Analytics Market Outlook Report
Qualitative Qantitative and Mixed Methods.pptx
Ad

Role of Sentiment Analysis in Cybersecurity

  • 2. Sentiment Analysis & Security Group Members :- Bl-07 | Name: Vimal Bl-43 | Name: Kishan Bl-50 | Name: Rachit Bl-60 | Name: Jay Guidance by :- Ms Zakiya malek Bl-63 | Name: Jigar Faculty of Computer Technology MCA
  • 3. What is Sentiment Analysis ? Positive Neutral Negative
  • 4. What is Sentiment Analysis ? (contd) ➔ Sentiment Analysis is the process of ‘computationally’ determining whether a piece of writing is positive, negative or neutral. It’s also known as opinion mining, deriving the opinion or attitude of a speaker . ➔ The main purpose behind the Sentiment Analysis on Tweets is to gauge the attitude, sentiments, evaluations, attitudes and emotions of a user who tweeted based on the computational treatment of subjectivity in a text.
  • 5. Importance of Sentiment Analysis : ➔ Sentiment analysis is extremely useful in social media monitoring as it allows us to gain an overview of the wider public opinion behind certain topics. Social media monitoring tools like Brandwatch Analytics make that process quicker and easier than ever before, thanks to real-time monitoring capabilities. ➔ The applications of sentiment analysis are broad and powerful. The ability to extract insights from social data is a practice that is being widely adopted by organizations across the world
  • 6. Why Sentiment Analysis is to be used ? ➔ Businesses today are heavily dependent on data. Majority of this data however, is unstructured text coming from sources like emails, chats, social media, surveys, articles, and documents. ➔ The micro-blogging content coming from Twitter and Facebook poses serious challenges, not only because of the amount of data involved, but also because of the kind of language used in them to express sentiments, i.e., short forms, memes and emoticons.
  • 7. How SA is related to Cyber security ? ➔ Emotional intelligence is the ability to empathize, control our own emotions, and interact with others in a way that accounts for the role feelings play in how people make decisions. ➔ In many fields, including education, marketing, and sales, the importance of emotional intelligence is widely acknowledged. But it’s somewhat unusual to hear about emotional intelligence in the cybersecurity space.
  • 8. How SA is related to Cyber security ? (contd) ➔ According to research being done at Google and the University of Florida, is that it takes advantage of how the human brain works--and, crucially, how people fail to detect deception, depending on factors like emotional intelligence, cognitive motivation, mood, hormones, and even the victim’s personality.
  • 9. ➔ Emotional Intelligence play an important role because people are still at the center of efforts to keep data safe, and hackers play on users’ emotions to gain access to confidential information. Here are just a few examples of how emotional intelligence comes into play in cybersecurity: ◆ According to Verizon’s 2019 Data Breach Investigations Report, phishing remains a top attack vector, with people falling for scams designed to bypass cybersecurity measures. ◆ Hackers are getting more emotionally intelligent; sophisticated cybercriminals analyze when potential victims catch on to attempted scams and develop more convincing ruses. Eg: Google Translate scam, Apple Phishing scam, Paypal scam, Netflix Phishing scam ➔ In the cybersecurity world, user security awareness training is considered a must and has been adopted by many companies, but data breaches are still on the rise. How SA is related to Cyber security ? (contd)
  • 10. How to use SE to strengthen cyber security ➔ So, what can you do to bring your cybersecurity emotional IQ up? The first step is to realize the role emotional intelligence plays in security and look for ways to incorporate best practices. Here are some tips on how to use emotional intelligence to beef up cybersecurity and foil attacks: ◆ Use positive language when discussing cybersecurity ◆ Be empathetic with users ◆ Demonstrate that position is no protection ◆ Teach staff to be suspicious of urgency ◆ Make security awareness training engaging and personal ◆ Use technology that minimizes the damages that result from human error
  • 12. Cyber Security Emotional IQ Range ➔ To ensure that you maximize your organization’s emotional intelligence defenses against cyber threats, honestly assess your current security posture through that lens and identify areas for improvement. ➔ Think of it as a range, with the worst actions at one end and the best at the other. Then, create a plan to improve your security posture through better emotional intelligence.
  • 13. Case Study ! On Verizon data breach
  • 14. Verizon data breach Investigations report ➔ The extensive report provides in- depth insights and perspectives on the tactics and techniques used in cyberattacks and detailed information on the current threat landscape. ➔ The 2019 Verizon Data Breach Investigations Report is the most comprehensive report released by Verizon to date and includes information from 41,686 reported security incidents and 2,013 data breaches from 86 countries.
  • 15. The key findings of the report are : ➔ Cyber-espionage related data breaches increased from 13% of breaches in 2017 to 25% in 2018 ➔ Nation-state attacks increased from 12% of attacks in 2017 to 23% in 2018 ➔ Financially motivated breaches fell from 76% to 71% ➔ Phishing is involved in 32% of breaches and 78% of cyber-espionage incidents ➔ 52% of cyber attacks involve hacking ➔ 34% of attacks involved insiders ➔ 43% of cyber attacks were on small businesses. ➔ There has been a six-fold decrease in attacks on HR personnel ➔ Misconfiguration of cloud platforms accounted for 21% of breaches caused by errors
  • 17. Cyberattack s on the Healthcare Industry ➔ The 2019 DBIR included 466 healthcare cybersecurity incidents, 304 of which involved confirmed data disclosures. ➔ Out of all industry sectors analyzed, healthcare was the only industry where the number of incidents caused by insiders was greater than those caused by external threat actors. ➔ 72% of breaches involved medical data, 34% involved personal information, and 25% involved credential theft. ➔ It should be noted that, in most cases, ransomware attacks are reportable breaches under HIPAA.
  • 19. VADER (Valence Aware Dictionary and Sentiment Reasoner) ➔ VADER is a lexicon and rule-based sentiment analysis tool that is specifically attuned to sentiments expressed in social media. ➔ VADER uses a combination of a sentiment lexicon is a list of lexical features (e.g., words) which are generally labeled according to their semantic orientation as either positive or negative. ➔ It produces 4 metrics - positive, negative, neutral and compound score.
  • 20. Time for a Live Demo !
  • 22. Thank you ! For your Cooperation :)