SlideShare a Scribd company logo
1 of 10
Download to read offline
International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 3, No 4, August 2014 
THE CONCEPTUAL IDEA OF ONLINE SOCIAL MEDIA 
SITE(SMS) USER ACCOUNT PENETRATION TESTING 
SYSTEM 
Sabarathinam Chockalingam1,Harjinder Singh Lallie2 
1Kailash Nagar, First Street, Near Police Colony, Ka 
raikudi – 630002, India. 
2University of Warwick, WMG, Coventry, United Kingdo 
m,CV4 7AL. 
ABSTRACT 
Social Media Site (SMS) usage has grown rapidly in the last few years. This sudden increase in SMS usage 
creates an opportunity for data leakage which could compromise personal and/or professional life. In this 
work, we have reviewed traditional penetration testing process and discussed the failures of traditional 
penetration testing process to test the 'People' layer of Simple Enterprise Security Architecture (SESA) 
model. In order to overcome these failures, we have developed the conceptual idea of online SMS user 
account penetration testing system that could be applied to online SMS user account and the user account 
could be categorised based on the rating points. This could help us to avoid leaking information that is 
sensitive and/or damage their reputation. Finally, we have also listed the best practice guidelines of online 
SMS usage. 
KEYWORDS 
Data Leakage, Loss of Reputation, Penetration Testing, Sensitive Information, Social Media Site 
1.INTRODUCTION 
The lack of awareness of SMS usage best practice in the recent years among the people in an 
organisation have caused major damages to their professional and/or personal life. This is mainly 
due to the leakage of sensitive information through their online SMS activity. This introduces the 
need for the development of penetration testing system to test the 'people' layer of the Simple 
Enterprise Security Architecture (SESA) model, and listing various best practices of online SMS 
usage. 
This work is structured as follows: It begins by reviewing traditional penetration testing process 
and highlighting the failures of traditional penetration testing process to test the 'people' layer of 
the SESA model, reviewing various media reports that highlight data leakage through the online 
SMS activity of Authoritative Persons (APs), and reviewing various problems and challenges 
relating to online SMS usage particularly in relation to its link with data leakage. It proceeds to 
devise the conceptual idea of online SMS user account penetration testing system that applies a 
rating to a number of features of the online SMS user account. It concludes by listing various best 
practices of online SMS usage. 
DOI : 10.5121/ijsptm.2014.3401 1
International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 3, No 4, August 2014 
2 
2. LITERATURE REVIEW 
This section reviews traditional penetration testing process and highlight the failures of traditional 
penetration testing methodologies to test the 'People' layer of the SESA model. 
2.1. Traditional Penetration Testing Process 
SESA model encompasses security into three simple layers as shown in Figure 1. They were: 
Business, People, and System [1]. We have considered SESA model throughout this work 
because this model is clearly layered with regard to security in an organisation and easy to 
understand. 
Auditing processes typically test the 'Business' layer of the SESA model. 'System' layer comprises 
of four sub – layers namely, user security interfaces, protocol, code, and component as shown in 
Figure 1 [1]. Traditional penetration tests test the 'System' layer of the SESA model. 
Business 
People 
System 
Business Requirements and Strategy 
Regulation and Compliance 
Security Strategy 
Human Interface 
User Security Interfaces 
Protocol 
Code 
Component 
Figure 1. A Simple Enterprise Security Architecture (SESA) Model [1] 
Traditional penetration testing process comprises of six phases as shown in Figure 2. They are: 
I. Information Gathering – This phase would help in gathering information about the system. 
This information would be used to create a threat model using various techniques [2]. 
II. Creating a Threat Model – This phase would help in creating a threat model which should 
contain detailed, written description about the major threats to the system ([3] and [4]). Threat 
scenarios could also be created using sequence diagrams [4]. 
III. Building a Test Plan – This phase would help in building a roadmap for security testing. 
This should include a high level overview of the test cases, how testing would be conducted, and 
what would be tested [3]. 
IV. Executing Test Cases – This phase would help in conducting security tests. 
V. The Problem Report – Critical output of any testing process is the problem report. This 
should mainly include exploit scenarios, severity, and reproduction steps [3]. Reproduction steps
International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 3, No 4, August 2014 
in the problem report should help a person who would like to test the system by following the 
steps listed and would be able to reproduce it. 
VI. Post - mortems – Bugs are corporate assets that should be examined. Post-mortem evaluation 
help to refine the testing process to ensure that you could find the bugs sooner in the future 
security testing [3]. 
3 
Figure 2. Traditional Penetration Testing Process [3] 
'People' layer of the SESA model consist of one sub – layer namely, 'Human Interface' [1]. 
There are various reasons for the failure of traditional penetration testing process to test the 
'people' layer of the SESA model. They are: 
I. Development of traditional penetration testing process did not consider testing 'people' layer of 
an organisation. So, It would not be suitable to apply the traditional penetration testing process to 
test the 'People' layer of the SESA model. 
II. There are various online SMS used by the people in an organisation. Each online SMS have 
different features. There is no specific penetration test in the traditional penetration testing 
process that applies a number of features devised to test online SMS user account. So, It would 
not be possible to apply the traditional penetration testing process to test the 'people' layer of the 
SESA model.
International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 3, No 4, August 2014 
2.2. Data Leakage Through the Online SMS User Account Activity of the 
Authoritative Persons 
This section reviews various media reports that highlight the data leakage in online SMS user 
account activity of the Authoritative Persons (APs). 
I. “Doctor Booted For Facebook Post – Don't Post That [5]” 
This case states that Dr. Alexandra Thran leaked information about a trauma patient on Facebook. 
This activity on the online SMS compromised her reputation. She also received a reprimand and a 
$500 fine. 
II. “Kevin Pietersen fined by England for obscene Twitter Outburst [6]” 
This case states that Kevin Pietersen posted “F” word on twitter after being left out of the 
England squad for the ODI and T20 series against Pakistan. Misuse of the online SMS damaged 
Pietersen's reputation and his relationship with England Cricket Board (ECB). Pietersen have 
been fined an undisclosed sum for breaching contract. 
III. “MI6 Chief Blows his Cover as Wife's Facebook Account Reveals Family Holidays, 
Showbiz Friends and Links to David Irving [7]” 
This case states that Sir John Sawers (Incoming MI6 head during that time) left exposed by a 
major personal security breach after his wife posted photos and personal information on 
Facebook such as where they live and work, who their friends are, and where they spend their 
holidays. This activity by his wife left Sir John Sawers open to criticism and blackmail. 
IV. “ 'I didn't have the full story' : Ashton Kutcher Forced into Embarrassing Climbdown for 
Tweeting Joe Paterno Sacking had 'no class' [8]“ 
This case states that Ashton Kutcher tweeted “How do you fire Jo Pa? #Insult #Noclass” [8]. Jo 
Pa, nickname of the legendary football coach who had been fired for allegedly covering up sexual 
abuse by the school's former football defense coordinator 'Jerry Sandusky'. Ashton Kutcher 
tweeted this on his official online SMS account after hearing “Joe was fired” without knowing the 
full story. This online SMS activity damaged Ashton Kutcher's reputation. 
These case studies clearly highlight the lack of awareness of the online SMS usage best practice 
among the Authoritative Persons (APs). 
4 
2.3 Problems and Challenges of the Online SMS Usage 
There are various problems and challenges involved in the online SMS usage particularly in 
relation to its link with data leakage. They are: 
I. Status/Post Updates – There are various online SMS in existence. This could be accessed by 
the user at any time. This allow users to post information / update status as they wish. This 
highlight that there is a possibility of revealing sensitive information through status updates/ 
information posted which could compromise their professional and/or personal life [9].
International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 3, No 4, August 2014 
II. Accepting/Sending Friends' Request – Carelessness in accepting or sending friends' request 
could result in adding attackers who would have an easier access to personal information such as 
date of birth, family details, workplace information, living information, contact information, 
photos, videos, post/status updates, and friends ([9] and [10]). This could also create an 
opportunity for the attackers to perform social engineering attacks effectively. 
III. Uploading Photos and Videos – Everyone could view the publicly available photos and 
videos of the user. This photos and/or videos might contain sensitive information [9]. This could 
compromise users' professional and/or personal life. 
IV. Third Party Applications and Links to External Sites – There is a high likelihood for 
malware infecting employees' computing platforms when they use the third party applications or 
click on the external links in the online SMS [9]. This could allow the attackers to monitor and 
steal intellectual property. There are various privacy issues with using third party applications in 
the online SMS. 
3. THE CONCEPTUAL IDEA OF ONLINE SMS USER ACCOUNT PENETRATION 
TESTING SYSTEM 
This section focusses on devising the conceptual idea of online SMS user account penetration 
testing system that applies a rating to a number of features of the online SMS user account. 
5 
3.1. Penetration Testing System 
This penetration testing system could be applied to Facebook, Twitter, and Linkedin SMS user 
account. It is impractical to devise a penetration testing system that applies to all SMS because 
there are various SMS in existence and each SMS have different features. We have chosen 
Facebook, Twitter, and Linkedin in this work because of its world - wide popularity. 
List of features which would be tested in the online SMS user account have been listed below 
with corresponding description and rating points. 
I. User Name 
Description: If the user have same 'username' for Facebook, Twitter, and Linkedin online SMS 
then it would be easier for the attackers to search and identify user accounts in all these online 
SMS platforms by knowing it in any one the online SMS platform. This would also give an 
opportunity for attackers to validate the information they have gathered in one of the online SMS 
with the other. 
Rating Points: 
10 Points – The user have same 'username' for Facebook, Twitter, and Linkedin online SMS. 
5 Points – The user have same 'username' for two online SMS mentioned above. 
0 Points – The user have different 'username' for Facebook, Twitter and Linkedin online SMS. 
II. Personal Information 
Description: Personal information that could be posted by the user on their online SMS account 
includes date of birth, family details, workplace information, living information, contact 
information, and relationship status.
International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 3, No 4, August 2014 
Rating Points: 
10 Points – The user have posted their date of birth, living information, family details, or contact 
information publicly. These information were given 10 points based on their criticality. 
5 Points – The user have posted real workplace and/or education information publicly. 
0 Points – The user have not posted any of their personal information publicly. 
III. Friends List/Connections Visibility 
Description: Friends/connections of the user are publicly available. This would make it easier for 
the attackers to gather crucial information about friends/connections. 
Rating Points: 
10 Points – Friends/connections of the user are publicly available. 
0 Points - Friends/connections of the user are not publicly available. 
IV. Photos/Videos Visibility 
Description: Photos/videos of the user are publicly available. This would create an opportunity 
for data leakage. The attackers could view the publicly available photos/videos of the user. This 
would makes it easier for the attackers to gather sensitive information such as location, car 
registration number, etc. 
6 
Rating Points: 
10 Points - Photos/videos of the user are publicly available. 
0 Points - Photos/videos of the user are not publicly available. 
V. Photos/Videos 
Description: Photos/videos posted by the user could leak sensitive information / damage their 
reputation. Photos/videos posted could contain sensitive information such as date, location, where 
the photos/videos have been taken, car registration number, friends tagged in the photos/videos, 
etc. 
Rating Points: 
10 Points – Photos/videos posted by the user that contain sensitive information/could damage 
their reputation. 
0 Points – There is no photos/videos posted by the user that could leak sensitive 
information/damage their reputation. 
VI. Posts/Status Updates/Tweets 
Description: Posts/Status Updates/Tweets posted by the user could leak sensitive 
information/damage their reputation. 
Rating Points: 
10 Points – Posts/Status Updates/Tweets posted by the user that contain sensitive 
information/damage their reputation.
International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 3, No 4, August 2014 
0 Points – There is no posts/Status Updates/Tweets posted in their user account that could leak 
sensitive information/damage their reputation. 
VII. Photos/Videos Tagged 
Description: Photos/Videos in which the user is being tagged could leak sensitive 
information/damage their reputation. Photos/Videos in which the user is being tagged could 
contain sensitive information such as date, location where photos/videos have been taken, car 
registration number, other friends being tagged, etc. 
Rating Points: 
10 Points – Photos/Videos in which the user is being tagged that could leak sensitive 
information/damage their reputation. 
0 Points – There is no such Photos/Videos in which the user is being tagged that could leak 
sensitive information/damage their reputation. 
VIII. Posts/Status Updates/Tweets Tagged 
Description: Posts/Status updates/Tweets in which the user is being tagged could leak sensitive 
information/damage their reputation. 
Rating Points: 
10 Points – Posts/Status updates/Tweets in which the user is being tagged could leak sensitive 
information/damage their reputation. 
0 Points – There is no such Posts/Status updates/Tweets in which the user is being tagged that 
could leak sensitive information/damage their reputation. 
7 
IX. Groups/Pages 
Description: The user have joined any group/page that could damage their reputation. 
Rating Points: 
10 Points – The user have joined a group/page that could damage their reputation. 
0 Points – There is no such group/page that could damage their reputation. 
X. Check – in 
Description: Facebook feature named 'check-in' could help users to share information about the 
places they visit at any point of time. This could leak sensitive information about their location. 
Rating Points: 
10 Points – The user have used 'check-in' feature in their user account. 
0 Points – The user have not used 'check-in' feature in their user account.
International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 3, No 4, August 2014 
XI. Events 
Description: In Facebook, users could share publicly about the events they are going attend. This 
could leak sensitive information such as location, date and time of the event that they are going to 
attend. 
Rating Points: 
10 Points – The user have shared publicly about the events they are going to attend. 
0 Points – The user have not shared publicly about the events they are going to attend. 
This penetration testing system could be applied to the online SMS user account. Based on the 
points obtained, online SMS user account that have been applied would be categorised as low 
risk, medium risk, or high risk online SMS user account as shown in Figure 3. 
8 
0 – 30 → Low Risk 30 - 70 → Medium Risk 70 – 110 → High Risk 
Figure 3. Online SMS User Account Categorisation 
I. Low Risk Online SMS User Account (0 – 30 Points) – The online SMS User Account 
contain no or less information that is sensitive/damage user's reputation. The user is 
recommended to maintain their user account at this category. 
II. Medium Risk Online SMS User Account (30 – 70 Points) – The online SMS User Account 
contain reasonable amount of information that is sensitive/damage user's reputation. The user is 
recommended to take an initiative to review their user account and remove the information that is 
sensitive/damage their reputation. 
III. High Risk Online SMS User Account (70 – 110 Points) – The online SMS User Account 
contain large amount of the information that is sensitive/damage user's reputation. The user is 
recommended to take necessary actions immediately after reviewing their user account and 
remove the information that is sensitive/damage their reputation. 
The conceptual idea of online SMS user account penetration testing system have been developed 
taking into account the failure of traditional penetration testing process. This involve three steps 
as shown in Figure 4. 
I. Information Gathering – This step would help us to gather information from the online SMS 
user account which we intend to test. 
II. Applying Gathered Information to the Developed Penetration Testing System – Once the 
information have been gathered from the online SMS user account, it would be applied to the 
developed penetration testing system. 
III. Report Generation – The final step of the online SMS penetration testing process is the 
report generation. This report include description, points, and respective category of the online 
SMS user account based on their points.
International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 3, No 4, August 2014 
9 
Figure 4. Online SMS Penetration Testing Process 
4. CONCLUSION 
The conceptual idea of online SMS user account penetration testing system have been developed 
and applied to the online SMS user account of four publicly available Facebook user accounts. 
Due to privacy issues, we could not share the test process and test report with this paper. Based 
on the results, we have developed the guidelines to best practice of the online SMS usage. 
 Use different 'username' for the online SMS such as Facebook, Twitter, Linkedin, etc. 
This would make it difficult for the attackers to search and identify user accounts in 
various online SMS. 
 Do not post personal information such as date of birth, family details, workplace 
information, living information, contact information, and relationship status in the online 
SMS. 
 Do not make friends list/connections visible to everyone in the online SMS. 
 Do not make photos/videos that have been posted by the user visible to everyone in the 
online SMS. 
 Do not post photos/videos that could leak sensitive information/ damage their reputation. 
 Do not post posts/status updates/tweets that could leak sensitive information/damage their 
reputation. 
 Do turn on 'Tag Review', which would wait for your approval when your friends' tag you 
on photos, videos, and posts/status updates. 
 Do not use check – in feature while you are at that particular location. This could leak 
information about the location you are in at the moment to the attackers easily. 
 Do not join group/page that could damage your reputation. 
 Do not share information publicly about the events that you are going to attend. 
5. FUTUREWORK 
In the future, 
 The conceptual idea of the developed online SMS penetration testing system could be 
automated. 
 The features of various other online SMS platforms could be considered and incorporated 
into the developed conceptual idea of the online SMS penetration testing system as it is 
limited to Facebook, Linkedin, and Twitter.
International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 3, No 4, August 2014 
10 
REFERENCES 
[1] H. S. Lallie, “SESA – Towards defining a Pedagogic Architecture for Teaching Cyber Security,” 6th 
International Conference on Cybercrime Forensics Education and Training, Canterbury Christ Church 
University, Canterbury, UK, 2012. 
[2] W. G. J. Halfond, S. R. Choudhary, and A. Orso, “Improving Penetration Testing Through Static and 
Dynamic Analysis,” Software Testing, Verification, and Reliability, pp. 195 -214, 2011. 
[3] H. H. Thompson, “Application Penetration Testing,” IEEE Security & Privacy, Vol. 3, no. 1, pp. 66 – 
69, 2005. 
[4] L. Wang, E. Wong, and D. Xu, “A Threat Model Driven Approach for Security Testing,” Proceedings 
of the Third International Workshop on Software Engineering for Secure Systems, May 2007. 
[5] News Review (2011, May 19), “Doctor booted for Facebook Post” [Online], Available: 
http://www.newsreview.com/chico/doctor-booted-for-facebook-post/content?oid=2091069 
[6] The Guardian (2010, Sep 6), “Kevin Pietersen Fined by England for Obscene Twitter Outburst” 
[Online], Available: http://www.guardian.co.uk/sport/2010/sep/06/kevin-pietersen-fined-england-twitter 
[7] Daily Mail (2009, July 5), “MI6 Chief Blows his Cover as Wife's Facebook Account Reveals Family 
Holidays, Showbiz Friends and Links to David Irving” [Online], Available: 
http://www.dailymail.co.uk/news/article-1197562/MI6-chief-blows-cover-wifes-Facebookaccount-reveals- 
family-holidays-showbiz-friends-links-David-Irving.html 
[8] Daily Mail (2011, Nov 10), “ 'I didn't have the full story' : Ashton Kutcher Forced into Embarrassing 
Climbdown for Tweeting Joe Paterno Sacking had 'no class'“ [Online], Available: 
http://www.dailymail.co.uk/news/article-2059737/Penn-State-scandal-Ashton-Kutcher-says-Joe- 
Paterno-sacking-class-Twitter.html 
[9] N. N. A. Molok, S. Chang, and A. Ahmad, “Information Leakage through Online Social Networking: 
Opening the Doorway for Advanced Persistence Threats,” 8th Australian Information Security 
Management Conference, Edith Cowan University, Australia, 2010. 
[10] B. Dinerman (2011), “Social Networking and Security Risks,” GFI White Paper, pp. 1 – 7, Available: 
http://www.gfi.com/whitepapers/Social_Networking_and_Security_Risks.pdf 
Authors 
Sabarathinam Chockalingam (B.Tech., MSc) received his Bachelor of Technology in 
Computer Science and Engineering from SRM University in 2012, and his Master of Science 
in Cyber Security and Management from the University of Warwick (Warwick Manufacturing 
Group) in 2013. After completing his Master of Science, he worked as a Security Researcher – 
Intern at the Satellite Applications Catapult Limited which involved reviewing various 
existing security approaches and analysing the feasibility of those approaches with the Internet 
of Things (IoT). His research interests include Security, Digital Forensics, and Data Analytics. 
Harjinder Singh Lallie(BSc., MSc., MPhil) is a senior teaching fellow in Cybersecurity at 
the University of Warwick (WMG). He teaches three modules on the programme. He has 
developed and led a number of very successful University courses in Digital Forensics and 
Security at both undergraduate and postgraduate level.His research focus is in the area of 
Digital Forensics and Information Security particularly focussing on social network analysis 
and is currently studying towards his PhD. He has published dozens of papers in the digital 
forensics/information security domain and has presented at numerous 
conferences/workshops. He has held a number of conference committee memberships and acts as an 
external examiner for three Universities. Harjinder is a respected academic in the area of Teaching, 
Learning, Assessment and Curriculum (TLAC) and regularly organises and delivers at workshops and 
conferences in this domain.

More Related Content

What's hot

An Anti-Phishing Framework Based on Visual Cryptography
An Anti-Phishing Framework Based on Visual CryptographyAn Anti-Phishing Framework Based on Visual Cryptography
An Anti-Phishing Framework Based on Visual CryptographyIRJET Journal
 
IRJET- Security from Threats of Computer System
IRJET-  	  Security from Threats of Computer SystemIRJET-  	  Security from Threats of Computer System
IRJET- Security from Threats of Computer SystemIRJET Journal
 
Phishing detection in ims using domain ontology and cba an innovative rule ...
Phishing detection in ims using domain ontology and cba   an innovative rule ...Phishing detection in ims using domain ontology and cba   an innovative rule ...
Phishing detection in ims using domain ontology and cba an innovative rule ...ijistjournal
 
Intrusion Detection System using Self Organizing Map: A Survey
Intrusion Detection System using Self Organizing Map: A SurveyIntrusion Detection System using Self Organizing Map: A Survey
Intrusion Detection System using Self Organizing Map: A SurveyIJERA Editor
 
Image authentication for secure login
Image authentication for secure loginImage authentication for secure login
Image authentication for secure loginIRJET Journal
 
Review on mobile threats and detection techniques
Review on mobile threats and detection techniquesReview on mobile threats and detection techniques
Review on mobile threats and detection techniquesijdpsjournal
 
Behavior Analysis Of Malicious Web Pages Through Client Honeypot For Detectio...
Behavior Analysis Of Malicious Web Pages Through Client Honeypot For Detectio...Behavior Analysis Of Malicious Web Pages Through Client Honeypot For Detectio...
Behavior Analysis Of Malicious Web Pages Through Client Honeypot For Detectio...IJERA Editor
 
IRJET- Preventing Phishing Attack using Evolutionary Algorithms
IRJET-  	  Preventing Phishing Attack using Evolutionary AlgorithmsIRJET-  	  Preventing Phishing Attack using Evolutionary Algorithms
IRJET- Preventing Phishing Attack using Evolutionary AlgorithmsIRJET Journal
 
Taxonomy mobile malware threats and detection techniques
Taxonomy  mobile malware threats and detection techniquesTaxonomy  mobile malware threats and detection techniques
Taxonomy mobile malware threats and detection techniquescsandit
 
A novel way of integrating voice recognition and one time passwords to preven...
A novel way of integrating voice recognition and one time passwords to preven...A novel way of integrating voice recognition and one time passwords to preven...
A novel way of integrating voice recognition and one time passwords to preven...ijdpsjournal
 
IRJET- A Review of Information Systems Security: Types, Security Issues, and ...
IRJET- A Review of Information Systems Security: Types, Security Issues, and ...IRJET- A Review of Information Systems Security: Types, Security Issues, and ...
IRJET- A Review of Information Systems Security: Types, Security Issues, and ...IRJET Journal
 
Prevention Against CSRF Attack using Client Server Mutual Authentication Tech...
Prevention Against CSRF Attack using Client Server Mutual Authentication Tech...Prevention Against CSRF Attack using Client Server Mutual Authentication Tech...
Prevention Against CSRF Attack using Client Server Mutual Authentication Tech...IRJET Journal
 
Messaging Gateway
Messaging GatewayMessaging Gateway
Messaging Gatewayijsrd.com
 
IRJET - Secure Banking Application with Image and GPS Location
IRJET - Secure Banking Application with Image and GPS LocationIRJET - Secure Banking Application with Image and GPS Location
IRJET - Secure Banking Application with Image and GPS LocationIRJET Journal
 
IRJET- Malicious Short Urls Detection: A Survey
IRJET- Malicious Short Urls Detection: A SurveyIRJET- Malicious Short Urls Detection: A Survey
IRJET- Malicious Short Urls Detection: A SurveyIRJET Journal
 
e-AGE 2014 Proceedings_1st article
e-AGE 2014 Proceedings_1st articlee-AGE 2014 Proceedings_1st article
e-AGE 2014 Proceedings_1st articleAizharkyn Burkanova
 
Security Requirements for IVC Network
 Security Requirements for IVC Network  Security Requirements for IVC Network
Security Requirements for IVC Network IRJET Journal
 
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec Technology and Consulting
 
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET- 	  PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...IRJET- 	  PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...IRJET Journal
 

What's hot (20)

An Anti-Phishing Framework Based on Visual Cryptography
An Anti-Phishing Framework Based on Visual CryptographyAn Anti-Phishing Framework Based on Visual Cryptography
An Anti-Phishing Framework Based on Visual Cryptography
 
IRJET- Security from Threats of Computer System
IRJET-  	  Security from Threats of Computer SystemIRJET-  	  Security from Threats of Computer System
IRJET- Security from Threats of Computer System
 
Phishing detection in ims using domain ontology and cba an innovative rule ...
Phishing detection in ims using domain ontology and cba   an innovative rule ...Phishing detection in ims using domain ontology and cba   an innovative rule ...
Phishing detection in ims using domain ontology and cba an innovative rule ...
 
50120140502001 2
50120140502001 250120140502001 2
50120140502001 2
 
Intrusion Detection System using Self Organizing Map: A Survey
Intrusion Detection System using Self Organizing Map: A SurveyIntrusion Detection System using Self Organizing Map: A Survey
Intrusion Detection System using Self Organizing Map: A Survey
 
Image authentication for secure login
Image authentication for secure loginImage authentication for secure login
Image authentication for secure login
 
Review on mobile threats and detection techniques
Review on mobile threats and detection techniquesReview on mobile threats and detection techniques
Review on mobile threats and detection techniques
 
Behavior Analysis Of Malicious Web Pages Through Client Honeypot For Detectio...
Behavior Analysis Of Malicious Web Pages Through Client Honeypot For Detectio...Behavior Analysis Of Malicious Web Pages Through Client Honeypot For Detectio...
Behavior Analysis Of Malicious Web Pages Through Client Honeypot For Detectio...
 
IRJET- Preventing Phishing Attack using Evolutionary Algorithms
IRJET-  	  Preventing Phishing Attack using Evolutionary AlgorithmsIRJET-  	  Preventing Phishing Attack using Evolutionary Algorithms
IRJET- Preventing Phishing Attack using Evolutionary Algorithms
 
Taxonomy mobile malware threats and detection techniques
Taxonomy  mobile malware threats and detection techniquesTaxonomy  mobile malware threats and detection techniques
Taxonomy mobile malware threats and detection techniques
 
A novel way of integrating voice recognition and one time passwords to preven...
A novel way of integrating voice recognition and one time passwords to preven...A novel way of integrating voice recognition and one time passwords to preven...
A novel way of integrating voice recognition and one time passwords to preven...
 
IRJET- A Review of Information Systems Security: Types, Security Issues, and ...
IRJET- A Review of Information Systems Security: Types, Security Issues, and ...IRJET- A Review of Information Systems Security: Types, Security Issues, and ...
IRJET- A Review of Information Systems Security: Types, Security Issues, and ...
 
Prevention Against CSRF Attack using Client Server Mutual Authentication Tech...
Prevention Against CSRF Attack using Client Server Mutual Authentication Tech...Prevention Against CSRF Attack using Client Server Mutual Authentication Tech...
Prevention Against CSRF Attack using Client Server Mutual Authentication Tech...
 
Messaging Gateway
Messaging GatewayMessaging Gateway
Messaging Gateway
 
IRJET - Secure Banking Application with Image and GPS Location
IRJET - Secure Banking Application with Image and GPS LocationIRJET - Secure Banking Application with Image and GPS Location
IRJET - Secure Banking Application with Image and GPS Location
 
IRJET- Malicious Short Urls Detection: A Survey
IRJET- Malicious Short Urls Detection: A SurveyIRJET- Malicious Short Urls Detection: A Survey
IRJET- Malicious Short Urls Detection: A Survey
 
e-AGE 2014 Proceedings_1st article
e-AGE 2014 Proceedings_1st articlee-AGE 2014 Proceedings_1st article
e-AGE 2014 Proceedings_1st article
 
Security Requirements for IVC Network
 Security Requirements for IVC Network  Security Requirements for IVC Network
Security Requirements for IVC Network
 
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
 
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET- 	  PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...IRJET- 	  PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
 

Viewers also liked

Error performance of jpeg and watermark
Error performance of jpeg and watermarkError performance of jpeg and watermark
Error performance of jpeg and watermarkijsptm
 
The examination of relation between organizational space and organizational p...
The examination of relation between organizational space and organizational p...The examination of relation between organizational space and organizational p...
The examination of relation between organizational space and organizational p...ijsptm
 
تبصره مبرم سیاسی1
تبصره مبرم سیاسی1تبصره مبرم سیاسی1
تبصره مبرم سیاسی1kokchapress
 
IGT2009 The Open Cloud Computing Interface
IGT2009   The Open Cloud Computing InterfaceIGT2009   The Open Cloud Computing Interface
IGT2009 The Open Cloud Computing InterfaceShlomo Swidler
 
TEKS GRADE 6 2011 2012
TEKS GRADE 6 2011 2012TEKS GRADE 6 2011 2012
TEKS GRADE 6 2011 2012bmarfin
 
Finpro market opportunity textile industry
Finpro market opportunity textile industryFinpro market opportunity textile industry
Finpro market opportunity textile industryBusiness Finland
 
Finite Elements libmesh
Finite Elements libmesh Finite Elements libmesh
Finite Elements libmesh M Reza Rahmati
 
FutureGrid Computing Testbed as a Service
 FutureGrid Computing Testbed as a Service FutureGrid Computing Testbed as a Service
FutureGrid Computing Testbed as a ServiceGeoffrey Fox
 
Reflecting on PEDMAS
Reflecting on PEDMASReflecting on PEDMAS
Reflecting on PEDMASjwalts
 
The Fluid Core: How Technology Is Creating a New Hierarchy of Need, and How S...
The Fluid Core: How Technology Is Creating a New Hierarchy of Need, and How S...The Fluid Core: How Technology Is Creating a New Hierarchy of Need, and How S...
The Fluid Core: How Technology Is Creating a New Hierarchy of Need, and How S...Cognizant
 
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...ijfcstjournal
 
A trigger identification service for defending reactive jammers in wireless s...
A trigger identification service for defending reactive jammers in wireless s...A trigger identification service for defending reactive jammers in wireless s...
A trigger identification service for defending reactive jammers in wireless s...JPINFOTECH JAYAPRAKASH
 
Analysis and improvement of pairing free certificate-less two-party authentic...
Analysis and improvement of pairing free certificate-less two-party authentic...Analysis and improvement of pairing free certificate-less two-party authentic...
Analysis and improvement of pairing free certificate-less two-party authentic...ijsptm
 
Cross domain identity trust management for grid computing
Cross domain identity trust management for grid computingCross domain identity trust management for grid computing
Cross domain identity trust management for grid computingijsptm
 
Eastern Europe Partnership Event - 012 per oster
Eastern Europe Partnership Event - 012 per osterEastern Europe Partnership Event - 012 per oster
Eastern Europe Partnership Event - 012 per osterTERENA
 

Viewers also liked (20)

Error performance of jpeg and watermark
Error performance of jpeg and watermarkError performance of jpeg and watermark
Error performance of jpeg and watermark
 
The examination of relation between organizational space and organizational p...
The examination of relation between organizational space and organizational p...The examination of relation between organizational space and organizational p...
The examination of relation between organizational space and organizational p...
 
تبصره مبرم سیاسی1
تبصره مبرم سیاسی1تبصره مبرم سیاسی1
تبصره مبرم سیاسی1
 
IGT2009 The Open Cloud Computing Interface
IGT2009   The Open Cloud Computing InterfaceIGT2009   The Open Cloud Computing Interface
IGT2009 The Open Cloud Computing Interface
 
TEKS GRADE 6 2011 2012
TEKS GRADE 6 2011 2012TEKS GRADE 6 2011 2012
TEKS GRADE 6 2011 2012
 
Finpro market opportunity textile industry
Finpro market opportunity textile industryFinpro market opportunity textile industry
Finpro market opportunity textile industry
 
Finite Elements libmesh
Finite Elements libmesh Finite Elements libmesh
Finite Elements libmesh
 
Ow2 webinar erocci
Ow2 webinar erocciOw2 webinar erocci
Ow2 webinar erocci
 
FutureGrid Computing Testbed as a Service
 FutureGrid Computing Testbed as a Service FutureGrid Computing Testbed as a Service
FutureGrid Computing Testbed as a Service
 
Reflecting on PEDMAS
Reflecting on PEDMASReflecting on PEDMAS
Reflecting on PEDMAS
 
The Fluid Core: How Technology Is Creating a New Hierarchy of Need, and How S...
The Fluid Core: How Technology Is Creating a New Hierarchy of Need, and How S...The Fluid Core: How Technology Is Creating a New Hierarchy of Need, and How S...
The Fluid Core: How Technology Is Creating a New Hierarchy of Need, and How S...
 
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
 
Jammers in wsn
Jammers in wsnJammers in wsn
Jammers in wsn
 
Ar03302620266
Ar03302620266Ar03302620266
Ar03302620266
 
A trigger identification service for defending reactive jammers in wireless s...
A trigger identification service for defending reactive jammers in wireless s...A trigger identification service for defending reactive jammers in wireless s...
A trigger identification service for defending reactive jammers in wireless s...
 
Bt25420424
Bt25420424Bt25420424
Bt25420424
 
Derby Quiz
Derby QuizDerby Quiz
Derby Quiz
 
Analysis and improvement of pairing free certificate-less two-party authentic...
Analysis and improvement of pairing free certificate-less two-party authentic...Analysis and improvement of pairing free certificate-less two-party authentic...
Analysis and improvement of pairing free certificate-less two-party authentic...
 
Cross domain identity trust management for grid computing
Cross domain identity trust management for grid computingCross domain identity trust management for grid computing
Cross domain identity trust management for grid computing
 
Eastern Europe Partnership Event - 012 per oster
Eastern Europe Partnership Event - 012 per osterEastern Europe Partnership Event - 012 per oster
Eastern Europe Partnership Event - 012 per oster
 

Similar to The conceptual idea of online social media

Developing User Authentication by Knowledge Based Authentication Scheme in G...
 Developing User Authentication by Knowledge Based Authentication Scheme in G... Developing User Authentication by Knowledge Based Authentication Scheme in G...
Developing User Authentication by Knowledge Based Authentication Scheme in G...IJCSIS Research Publications
 
Strengthening the Weakest Link - Reducing Risks from Social Engineering Attacks
Strengthening the Weakest Link - Reducing Risks from Social Engineering AttacksStrengthening the Weakest Link - Reducing Risks from Social Engineering Attacks
Strengthening the Weakest Link - Reducing Risks from Social Engineering AttacksFitCEO, Inc. (FCI)
 
PHISHING DETECTION IN IMS USING DOMAIN ONTOLOGY AND CBA – AN INNOVATIVE RULE ...
PHISHING DETECTION IN IMS USING DOMAIN ONTOLOGY AND CBA – AN INNOVATIVE RULE ...PHISHING DETECTION IN IMS USING DOMAIN ONTOLOGY AND CBA – AN INNOVATIVE RULE ...
PHISHING DETECTION IN IMS USING DOMAIN ONTOLOGY AND CBA – AN INNOVATIVE RULE ...ijistjournal
 
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORDAN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORDIJNSA Journal
 
Keystroke with Data Leakage Detection for Secure Email Authentication
Keystroke with Data Leakage Detection for Secure Email AuthenticationKeystroke with Data Leakage Detection for Secure Email Authentication
Keystroke with Data Leakage Detection for Secure Email AuthenticationYogeshIJTSRD
 
IRJET- Minimize Phishing Attacks: Securing Spear Attacks
IRJET- Minimize Phishing Attacks: Securing Spear AttacksIRJET- Minimize Phishing Attacks: Securing Spear Attacks
IRJET- Minimize Phishing Attacks: Securing Spear AttacksIRJET Journal
 
Two-Factor_Authentication_1-22-15.pptx
Two-Factor_Authentication_1-22-15.pptxTwo-Factor_Authentication_1-22-15.pptx
Two-Factor_Authentication_1-22-15.pptxPreethamS41
 
APA Writing Sample Extortion on the JobValorie J. King, PhDApril .docx
APA Writing Sample Extortion on the JobValorie J. King, PhDApril .docxAPA Writing Sample Extortion on the JobValorie J. King, PhDApril .docx
APA Writing Sample Extortion on the JobValorie J. King, PhDApril .docxjustine1simpson78276
 
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...IRJET Journal
 
Continuous User Identity Verification through Secure Login Session
 	  Continuous User Identity Verification through Secure Login Session 	  Continuous User Identity Verification through Secure Login Session
Continuous User Identity Verification through Secure Login SessionIRJET Journal
 
Online Signature Authentication by Using Mouse Behavior
Online Signature Authentication by Using Mouse Behavior Online Signature Authentication by Using Mouse Behavior
Online Signature Authentication by Using Mouse Behavior Editor IJCATR
 
IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...
IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...
IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...IRJET Journal
 
E-Commerce Privacy and Security System
E-Commerce Privacy and Security SystemE-Commerce Privacy and Security System
E-Commerce Privacy and Security SystemIJERA Editor
 
E-Commerce Privacy and Security System
E-Commerce Privacy and Security SystemE-Commerce Privacy and Security System
E-Commerce Privacy and Security SystemIJERA Editor
 
CERT STRATEGY TO DEAL WITH PHISHING ATTACKS
CERT STRATEGY TO DEAL WITH PHISHING ATTACKSCERT STRATEGY TO DEAL WITH PHISHING ATTACKS
CERT STRATEGY TO DEAL WITH PHISHING ATTACKScsandit
 
IRJET- Review on the Simple Text Messages Classification
IRJET- Review on the Simple Text Messages ClassificationIRJET- Review on the Simple Text Messages Classification
IRJET- Review on the Simple Text Messages ClassificationIRJET Journal
 
Credential Harvesting Using Man in the Middle Attack via Social Engineering
Credential Harvesting Using Man in the Middle Attack via Social EngineeringCredential Harvesting Using Man in the Middle Attack via Social Engineering
Credential Harvesting Using Man in the Middle Attack via Social Engineeringijtsrd
 

Similar to The conceptual idea of online social media (20)

Assessment and Mitigation of Risks Involved in Electronics Payment Systems
Assessment and Mitigation of Risks Involved in Electronics Payment Systems Assessment and Mitigation of Risks Involved in Electronics Payment Systems
Assessment and Mitigation of Risks Involved in Electronics Payment Systems
 
Developing User Authentication by Knowledge Based Authentication Scheme in G...
 Developing User Authentication by Knowledge Based Authentication Scheme in G... Developing User Authentication by Knowledge Based Authentication Scheme in G...
Developing User Authentication by Knowledge Based Authentication Scheme in G...
 
Strengthening the Weakest Link - Reducing Risks from Social Engineering Attacks
Strengthening the Weakest Link - Reducing Risks from Social Engineering AttacksStrengthening the Weakest Link - Reducing Risks from Social Engineering Attacks
Strengthening the Weakest Link - Reducing Risks from Social Engineering Attacks
 
PHISHING DETECTION IN IMS USING DOMAIN ONTOLOGY AND CBA – AN INNOVATIVE RULE ...
PHISHING DETECTION IN IMS USING DOMAIN ONTOLOGY AND CBA – AN INNOVATIVE RULE ...PHISHING DETECTION IN IMS USING DOMAIN ONTOLOGY AND CBA – AN INNOVATIVE RULE ...
PHISHING DETECTION IN IMS USING DOMAIN ONTOLOGY AND CBA – AN INNOVATIVE RULE ...
 
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORDAN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
 
Keystroke with Data Leakage Detection for Secure Email Authentication
Keystroke with Data Leakage Detection for Secure Email AuthenticationKeystroke with Data Leakage Detection for Secure Email Authentication
Keystroke with Data Leakage Detection for Secure Email Authentication
 
IRJET- Minimize Phishing Attacks: Securing Spear Attacks
IRJET- Minimize Phishing Attacks: Securing Spear AttacksIRJET- Minimize Phishing Attacks: Securing Spear Attacks
IRJET- Minimize Phishing Attacks: Securing Spear Attacks
 
Two-Factor_Authentication_1-22-15.pptx
Two-Factor_Authentication_1-22-15.pptxTwo-Factor_Authentication_1-22-15.pptx
Two-Factor_Authentication_1-22-15.pptx
 
APA Writing Sample Extortion on the JobValorie J. King, PhDApril .docx
APA Writing Sample Extortion on the JobValorie J. King, PhDApril .docxAPA Writing Sample Extortion on the JobValorie J. King, PhDApril .docx
APA Writing Sample Extortion on the JobValorie J. King, PhDApril .docx
 
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
 
Continuous User Identity Verification through Secure Login Session
 	  Continuous User Identity Verification through Secure Login Session 	  Continuous User Identity Verification through Secure Login Session
Continuous User Identity Verification through Secure Login Session
 
Online Signature Authentication by Using Mouse Behavior
Online Signature Authentication by Using Mouse Behavior Online Signature Authentication by Using Mouse Behavior
Online Signature Authentication by Using Mouse Behavior
 
IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...
IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...
IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...
 
E-Commerce Privacy and Security System
E-Commerce Privacy and Security SystemE-Commerce Privacy and Security System
E-Commerce Privacy and Security System
 
E-Commerce Privacy and Security System
E-Commerce Privacy and Security SystemE-Commerce Privacy and Security System
E-Commerce Privacy and Security System
 
CERT STRATEGY TO DEAL WITH PHISHING ATTACKS
CERT STRATEGY TO DEAL WITH PHISHING ATTACKSCERT STRATEGY TO DEAL WITH PHISHING ATTACKS
CERT STRATEGY TO DEAL WITH PHISHING ATTACKS
 
IRJET- Review on the Simple Text Messages Classification
IRJET- Review on the Simple Text Messages ClassificationIRJET- Review on the Simple Text Messages Classification
IRJET- Review on the Simple Text Messages Classification
 
Ijcatr04041017
Ijcatr04041017Ijcatr04041017
Ijcatr04041017
 
Credential Harvesting Using Man in the Middle Attack via Social Engineering
Credential Harvesting Using Man in the Middle Attack via Social EngineeringCredential Harvesting Using Man in the Middle Attack via Social Engineering
Credential Harvesting Using Man in the Middle Attack via Social Engineering
 
Database Security Analysis
Database Security AnalysisDatabase Security Analysis
Database Security Analysis
 

Recently uploaded

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 

Recently uploaded (20)

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 

The conceptual idea of online social media

  • 1. International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 3, No 4, August 2014 THE CONCEPTUAL IDEA OF ONLINE SOCIAL MEDIA SITE(SMS) USER ACCOUNT PENETRATION TESTING SYSTEM Sabarathinam Chockalingam1,Harjinder Singh Lallie2 1Kailash Nagar, First Street, Near Police Colony, Ka raikudi – 630002, India. 2University of Warwick, WMG, Coventry, United Kingdo m,CV4 7AL. ABSTRACT Social Media Site (SMS) usage has grown rapidly in the last few years. This sudden increase in SMS usage creates an opportunity for data leakage which could compromise personal and/or professional life. In this work, we have reviewed traditional penetration testing process and discussed the failures of traditional penetration testing process to test the 'People' layer of Simple Enterprise Security Architecture (SESA) model. In order to overcome these failures, we have developed the conceptual idea of online SMS user account penetration testing system that could be applied to online SMS user account and the user account could be categorised based on the rating points. This could help us to avoid leaking information that is sensitive and/or damage their reputation. Finally, we have also listed the best practice guidelines of online SMS usage. KEYWORDS Data Leakage, Loss of Reputation, Penetration Testing, Sensitive Information, Social Media Site 1.INTRODUCTION The lack of awareness of SMS usage best practice in the recent years among the people in an organisation have caused major damages to their professional and/or personal life. This is mainly due to the leakage of sensitive information through their online SMS activity. This introduces the need for the development of penetration testing system to test the 'people' layer of the Simple Enterprise Security Architecture (SESA) model, and listing various best practices of online SMS usage. This work is structured as follows: It begins by reviewing traditional penetration testing process and highlighting the failures of traditional penetration testing process to test the 'people' layer of the SESA model, reviewing various media reports that highlight data leakage through the online SMS activity of Authoritative Persons (APs), and reviewing various problems and challenges relating to online SMS usage particularly in relation to its link with data leakage. It proceeds to devise the conceptual idea of online SMS user account penetration testing system that applies a rating to a number of features of the online SMS user account. It concludes by listing various best practices of online SMS usage. DOI : 10.5121/ijsptm.2014.3401 1
  • 2. International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 3, No 4, August 2014 2 2. LITERATURE REVIEW This section reviews traditional penetration testing process and highlight the failures of traditional penetration testing methodologies to test the 'People' layer of the SESA model. 2.1. Traditional Penetration Testing Process SESA model encompasses security into three simple layers as shown in Figure 1. They were: Business, People, and System [1]. We have considered SESA model throughout this work because this model is clearly layered with regard to security in an organisation and easy to understand. Auditing processes typically test the 'Business' layer of the SESA model. 'System' layer comprises of four sub – layers namely, user security interfaces, protocol, code, and component as shown in Figure 1 [1]. Traditional penetration tests test the 'System' layer of the SESA model. Business People System Business Requirements and Strategy Regulation and Compliance Security Strategy Human Interface User Security Interfaces Protocol Code Component Figure 1. A Simple Enterprise Security Architecture (SESA) Model [1] Traditional penetration testing process comprises of six phases as shown in Figure 2. They are: I. Information Gathering – This phase would help in gathering information about the system. This information would be used to create a threat model using various techniques [2]. II. Creating a Threat Model – This phase would help in creating a threat model which should contain detailed, written description about the major threats to the system ([3] and [4]). Threat scenarios could also be created using sequence diagrams [4]. III. Building a Test Plan – This phase would help in building a roadmap for security testing. This should include a high level overview of the test cases, how testing would be conducted, and what would be tested [3]. IV. Executing Test Cases – This phase would help in conducting security tests. V. The Problem Report – Critical output of any testing process is the problem report. This should mainly include exploit scenarios, severity, and reproduction steps [3]. Reproduction steps
  • 3. International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 3, No 4, August 2014 in the problem report should help a person who would like to test the system by following the steps listed and would be able to reproduce it. VI. Post - mortems – Bugs are corporate assets that should be examined. Post-mortem evaluation help to refine the testing process to ensure that you could find the bugs sooner in the future security testing [3]. 3 Figure 2. Traditional Penetration Testing Process [3] 'People' layer of the SESA model consist of one sub – layer namely, 'Human Interface' [1]. There are various reasons for the failure of traditional penetration testing process to test the 'people' layer of the SESA model. They are: I. Development of traditional penetration testing process did not consider testing 'people' layer of an organisation. So, It would not be suitable to apply the traditional penetration testing process to test the 'People' layer of the SESA model. II. There are various online SMS used by the people in an organisation. Each online SMS have different features. There is no specific penetration test in the traditional penetration testing process that applies a number of features devised to test online SMS user account. So, It would not be possible to apply the traditional penetration testing process to test the 'people' layer of the SESA model.
  • 4. International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 3, No 4, August 2014 2.2. Data Leakage Through the Online SMS User Account Activity of the Authoritative Persons This section reviews various media reports that highlight the data leakage in online SMS user account activity of the Authoritative Persons (APs). I. “Doctor Booted For Facebook Post – Don't Post That [5]” This case states that Dr. Alexandra Thran leaked information about a trauma patient on Facebook. This activity on the online SMS compromised her reputation. She also received a reprimand and a $500 fine. II. “Kevin Pietersen fined by England for obscene Twitter Outburst [6]” This case states that Kevin Pietersen posted “F” word on twitter after being left out of the England squad for the ODI and T20 series against Pakistan. Misuse of the online SMS damaged Pietersen's reputation and his relationship with England Cricket Board (ECB). Pietersen have been fined an undisclosed sum for breaching contract. III. “MI6 Chief Blows his Cover as Wife's Facebook Account Reveals Family Holidays, Showbiz Friends and Links to David Irving [7]” This case states that Sir John Sawers (Incoming MI6 head during that time) left exposed by a major personal security breach after his wife posted photos and personal information on Facebook such as where they live and work, who their friends are, and where they spend their holidays. This activity by his wife left Sir John Sawers open to criticism and blackmail. IV. “ 'I didn't have the full story' : Ashton Kutcher Forced into Embarrassing Climbdown for Tweeting Joe Paterno Sacking had 'no class' [8]“ This case states that Ashton Kutcher tweeted “How do you fire Jo Pa? #Insult #Noclass” [8]. Jo Pa, nickname of the legendary football coach who had been fired for allegedly covering up sexual abuse by the school's former football defense coordinator 'Jerry Sandusky'. Ashton Kutcher tweeted this on his official online SMS account after hearing “Joe was fired” without knowing the full story. This online SMS activity damaged Ashton Kutcher's reputation. These case studies clearly highlight the lack of awareness of the online SMS usage best practice among the Authoritative Persons (APs). 4 2.3 Problems and Challenges of the Online SMS Usage There are various problems and challenges involved in the online SMS usage particularly in relation to its link with data leakage. They are: I. Status/Post Updates – There are various online SMS in existence. This could be accessed by the user at any time. This allow users to post information / update status as they wish. This highlight that there is a possibility of revealing sensitive information through status updates/ information posted which could compromise their professional and/or personal life [9].
  • 5. International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 3, No 4, August 2014 II. Accepting/Sending Friends' Request – Carelessness in accepting or sending friends' request could result in adding attackers who would have an easier access to personal information such as date of birth, family details, workplace information, living information, contact information, photos, videos, post/status updates, and friends ([9] and [10]). This could also create an opportunity for the attackers to perform social engineering attacks effectively. III. Uploading Photos and Videos – Everyone could view the publicly available photos and videos of the user. This photos and/or videos might contain sensitive information [9]. This could compromise users' professional and/or personal life. IV. Third Party Applications and Links to External Sites – There is a high likelihood for malware infecting employees' computing platforms when they use the third party applications or click on the external links in the online SMS [9]. This could allow the attackers to monitor and steal intellectual property. There are various privacy issues with using third party applications in the online SMS. 3. THE CONCEPTUAL IDEA OF ONLINE SMS USER ACCOUNT PENETRATION TESTING SYSTEM This section focusses on devising the conceptual idea of online SMS user account penetration testing system that applies a rating to a number of features of the online SMS user account. 5 3.1. Penetration Testing System This penetration testing system could be applied to Facebook, Twitter, and Linkedin SMS user account. It is impractical to devise a penetration testing system that applies to all SMS because there are various SMS in existence and each SMS have different features. We have chosen Facebook, Twitter, and Linkedin in this work because of its world - wide popularity. List of features which would be tested in the online SMS user account have been listed below with corresponding description and rating points. I. User Name Description: If the user have same 'username' for Facebook, Twitter, and Linkedin online SMS then it would be easier for the attackers to search and identify user accounts in all these online SMS platforms by knowing it in any one the online SMS platform. This would also give an opportunity for attackers to validate the information they have gathered in one of the online SMS with the other. Rating Points: 10 Points – The user have same 'username' for Facebook, Twitter, and Linkedin online SMS. 5 Points – The user have same 'username' for two online SMS mentioned above. 0 Points – The user have different 'username' for Facebook, Twitter and Linkedin online SMS. II. Personal Information Description: Personal information that could be posted by the user on their online SMS account includes date of birth, family details, workplace information, living information, contact information, and relationship status.
  • 6. International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 3, No 4, August 2014 Rating Points: 10 Points – The user have posted their date of birth, living information, family details, or contact information publicly. These information were given 10 points based on their criticality. 5 Points – The user have posted real workplace and/or education information publicly. 0 Points – The user have not posted any of their personal information publicly. III. Friends List/Connections Visibility Description: Friends/connections of the user are publicly available. This would make it easier for the attackers to gather crucial information about friends/connections. Rating Points: 10 Points – Friends/connections of the user are publicly available. 0 Points - Friends/connections of the user are not publicly available. IV. Photos/Videos Visibility Description: Photos/videos of the user are publicly available. This would create an opportunity for data leakage. The attackers could view the publicly available photos/videos of the user. This would makes it easier for the attackers to gather sensitive information such as location, car registration number, etc. 6 Rating Points: 10 Points - Photos/videos of the user are publicly available. 0 Points - Photos/videos of the user are not publicly available. V. Photos/Videos Description: Photos/videos posted by the user could leak sensitive information / damage their reputation. Photos/videos posted could contain sensitive information such as date, location, where the photos/videos have been taken, car registration number, friends tagged in the photos/videos, etc. Rating Points: 10 Points – Photos/videos posted by the user that contain sensitive information/could damage their reputation. 0 Points – There is no photos/videos posted by the user that could leak sensitive information/damage their reputation. VI. Posts/Status Updates/Tweets Description: Posts/Status Updates/Tweets posted by the user could leak sensitive information/damage their reputation. Rating Points: 10 Points – Posts/Status Updates/Tweets posted by the user that contain sensitive information/damage their reputation.
  • 7. International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 3, No 4, August 2014 0 Points – There is no posts/Status Updates/Tweets posted in their user account that could leak sensitive information/damage their reputation. VII. Photos/Videos Tagged Description: Photos/Videos in which the user is being tagged could leak sensitive information/damage their reputation. Photos/Videos in which the user is being tagged could contain sensitive information such as date, location where photos/videos have been taken, car registration number, other friends being tagged, etc. Rating Points: 10 Points – Photos/Videos in which the user is being tagged that could leak sensitive information/damage their reputation. 0 Points – There is no such Photos/Videos in which the user is being tagged that could leak sensitive information/damage their reputation. VIII. Posts/Status Updates/Tweets Tagged Description: Posts/Status updates/Tweets in which the user is being tagged could leak sensitive information/damage their reputation. Rating Points: 10 Points – Posts/Status updates/Tweets in which the user is being tagged could leak sensitive information/damage their reputation. 0 Points – There is no such Posts/Status updates/Tweets in which the user is being tagged that could leak sensitive information/damage their reputation. 7 IX. Groups/Pages Description: The user have joined any group/page that could damage their reputation. Rating Points: 10 Points – The user have joined a group/page that could damage their reputation. 0 Points – There is no such group/page that could damage their reputation. X. Check – in Description: Facebook feature named 'check-in' could help users to share information about the places they visit at any point of time. This could leak sensitive information about their location. Rating Points: 10 Points – The user have used 'check-in' feature in their user account. 0 Points – The user have not used 'check-in' feature in their user account.
  • 8. International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 3, No 4, August 2014 XI. Events Description: In Facebook, users could share publicly about the events they are going attend. This could leak sensitive information such as location, date and time of the event that they are going to attend. Rating Points: 10 Points – The user have shared publicly about the events they are going to attend. 0 Points – The user have not shared publicly about the events they are going to attend. This penetration testing system could be applied to the online SMS user account. Based on the points obtained, online SMS user account that have been applied would be categorised as low risk, medium risk, or high risk online SMS user account as shown in Figure 3. 8 0 – 30 → Low Risk 30 - 70 → Medium Risk 70 – 110 → High Risk Figure 3. Online SMS User Account Categorisation I. Low Risk Online SMS User Account (0 – 30 Points) – The online SMS User Account contain no or less information that is sensitive/damage user's reputation. The user is recommended to maintain their user account at this category. II. Medium Risk Online SMS User Account (30 – 70 Points) – The online SMS User Account contain reasonable amount of information that is sensitive/damage user's reputation. The user is recommended to take an initiative to review their user account and remove the information that is sensitive/damage their reputation. III. High Risk Online SMS User Account (70 – 110 Points) – The online SMS User Account contain large amount of the information that is sensitive/damage user's reputation. The user is recommended to take necessary actions immediately after reviewing their user account and remove the information that is sensitive/damage their reputation. The conceptual idea of online SMS user account penetration testing system have been developed taking into account the failure of traditional penetration testing process. This involve three steps as shown in Figure 4. I. Information Gathering – This step would help us to gather information from the online SMS user account which we intend to test. II. Applying Gathered Information to the Developed Penetration Testing System – Once the information have been gathered from the online SMS user account, it would be applied to the developed penetration testing system. III. Report Generation – The final step of the online SMS penetration testing process is the report generation. This report include description, points, and respective category of the online SMS user account based on their points.
  • 9. International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 3, No 4, August 2014 9 Figure 4. Online SMS Penetration Testing Process 4. CONCLUSION The conceptual idea of online SMS user account penetration testing system have been developed and applied to the online SMS user account of four publicly available Facebook user accounts. Due to privacy issues, we could not share the test process and test report with this paper. Based on the results, we have developed the guidelines to best practice of the online SMS usage.  Use different 'username' for the online SMS such as Facebook, Twitter, Linkedin, etc. This would make it difficult for the attackers to search and identify user accounts in various online SMS.  Do not post personal information such as date of birth, family details, workplace information, living information, contact information, and relationship status in the online SMS.  Do not make friends list/connections visible to everyone in the online SMS.  Do not make photos/videos that have been posted by the user visible to everyone in the online SMS.  Do not post photos/videos that could leak sensitive information/ damage their reputation.  Do not post posts/status updates/tweets that could leak sensitive information/damage their reputation.  Do turn on 'Tag Review', which would wait for your approval when your friends' tag you on photos, videos, and posts/status updates.  Do not use check – in feature while you are at that particular location. This could leak information about the location you are in at the moment to the attackers easily.  Do not join group/page that could damage your reputation.  Do not share information publicly about the events that you are going to attend. 5. FUTUREWORK In the future,  The conceptual idea of the developed online SMS penetration testing system could be automated.  The features of various other online SMS platforms could be considered and incorporated into the developed conceptual idea of the online SMS penetration testing system as it is limited to Facebook, Linkedin, and Twitter.
  • 10. International Journal of Security, Privacy and Trust Management (IJSPTM) Vol 3, No 4, August 2014 10 REFERENCES [1] H. S. Lallie, “SESA – Towards defining a Pedagogic Architecture for Teaching Cyber Security,” 6th International Conference on Cybercrime Forensics Education and Training, Canterbury Christ Church University, Canterbury, UK, 2012. [2] W. G. J. Halfond, S. R. Choudhary, and A. Orso, “Improving Penetration Testing Through Static and Dynamic Analysis,” Software Testing, Verification, and Reliability, pp. 195 -214, 2011. [3] H. H. Thompson, “Application Penetration Testing,” IEEE Security & Privacy, Vol. 3, no. 1, pp. 66 – 69, 2005. [4] L. Wang, E. Wong, and D. Xu, “A Threat Model Driven Approach for Security Testing,” Proceedings of the Third International Workshop on Software Engineering for Secure Systems, May 2007. [5] News Review (2011, May 19), “Doctor booted for Facebook Post” [Online], Available: http://www.newsreview.com/chico/doctor-booted-for-facebook-post/content?oid=2091069 [6] The Guardian (2010, Sep 6), “Kevin Pietersen Fined by England for Obscene Twitter Outburst” [Online], Available: http://www.guardian.co.uk/sport/2010/sep/06/kevin-pietersen-fined-england-twitter [7] Daily Mail (2009, July 5), “MI6 Chief Blows his Cover as Wife's Facebook Account Reveals Family Holidays, Showbiz Friends and Links to David Irving” [Online], Available: http://www.dailymail.co.uk/news/article-1197562/MI6-chief-blows-cover-wifes-Facebookaccount-reveals- family-holidays-showbiz-friends-links-David-Irving.html [8] Daily Mail (2011, Nov 10), “ 'I didn't have the full story' : Ashton Kutcher Forced into Embarrassing Climbdown for Tweeting Joe Paterno Sacking had 'no class'“ [Online], Available: http://www.dailymail.co.uk/news/article-2059737/Penn-State-scandal-Ashton-Kutcher-says-Joe- Paterno-sacking-class-Twitter.html [9] N. N. A. Molok, S. Chang, and A. Ahmad, “Information Leakage through Online Social Networking: Opening the Doorway for Advanced Persistence Threats,” 8th Australian Information Security Management Conference, Edith Cowan University, Australia, 2010. [10] B. Dinerman (2011), “Social Networking and Security Risks,” GFI White Paper, pp. 1 – 7, Available: http://www.gfi.com/whitepapers/Social_Networking_and_Security_Risks.pdf Authors Sabarathinam Chockalingam (B.Tech., MSc) received his Bachelor of Technology in Computer Science and Engineering from SRM University in 2012, and his Master of Science in Cyber Security and Management from the University of Warwick (Warwick Manufacturing Group) in 2013. After completing his Master of Science, he worked as a Security Researcher – Intern at the Satellite Applications Catapult Limited which involved reviewing various existing security approaches and analysing the feasibility of those approaches with the Internet of Things (IoT). His research interests include Security, Digital Forensics, and Data Analytics. Harjinder Singh Lallie(BSc., MSc., MPhil) is a senior teaching fellow in Cybersecurity at the University of Warwick (WMG). He teaches three modules on the programme. He has developed and led a number of very successful University courses in Digital Forensics and Security at both undergraduate and postgraduate level.His research focus is in the area of Digital Forensics and Information Security particularly focussing on social network analysis and is currently studying towards his PhD. He has published dozens of papers in the digital forensics/information security domain and has presented at numerous conferences/workshops. He has held a number of conference committee memberships and acts as an external examiner for three Universities. Harjinder is a respected academic in the area of Teaching, Learning, Assessment and Curriculum (TLAC) and regularly organises and delivers at workshops and conferences in this domain.