SlideShare a Scribd company logo
1 of 17
1
 Personal Social Networks
 Status Update Social Networks
 Location Social Networks
 Content Sharing Social Networks
 Shared Interest Social Networks
2
3
4
Influencing factors in selecting a social
network
• Ease of use
• Friends use it
• Privacy
• Security
5
Shared Information
Profile data
Graph Data
Activity Data
 Third party application access
 Poor implementation
 Lack of awareness
6
7
1.Identity Theft Issues
- Profile Cloning
Existing Profile Cloning
Cross site Profile Cloning
- Social Phishing
8
2. Spam Issues
- Spam attack on social networking sites
- Email based spam attack on social network users
Broadcast spam
Context-aware spam
- Http session hijacking
9
10
3.Malware Issues
Spreading malware across social networks
- Fake accounts/ profiles
- Social network API
- Driven by download attack
- Shortened and hidden links
- Cross-Site scripting attack
11
12
13
Threats percentage-pose on social networks (Sophos 2010
Security Threat Report)
 Customize user profile data
 Link previews
 Private messaging
 HTTPS secured Twitter browsing
14
 2013
 250,000 users
 Limited user information
User names
Email Addresses
Sessions tokens
Encrypted versions of passwords
15
 [1] Wajeb Gharibi, Maha Shaabi, “Cyber Threats in Social Websites”, College of
Computer Science & Information Systems Jazan University, Kingdom of Saudi Arabia
 [2] Joseph Bonneau, “Security & Privacy in Online Social Networks” University of
Cambridge, Computer Laboratory
 [3] William F. Pelgrin, “Security and Privacy on Social Networking Sites”, Multi-State
Information Sharing & Analysis Center (MS-ISAC) Monthly Security Tips
NEWSLETTER, March 2010
 [4] Dr. Paul Judge, Chief Research Officer, “2011 Social Networking Security and
Privacy Study”, Barracuda Networks Inc.
 [5] George Danezis, “Inferring Privacy Policies for Social Networking Services”
Microsoft Research, Cambridge,
 [6] Dolvara Gunatilaka, “A Survey of Privacy and Security Issues in Social Networks”
(http://www.cse.wustl.edu)
 [7] Aaron Beach, Mike Gartrell, Richard Han “Solutions to Security and Privacy Issues
in Mobile Social Networking” University of Colorado at Boulder
 [8] Catherine Dwyer; Pace University, Starr Roxanne Hiltz ;New Jersey Institute of
Technology, Katia Passerini ;New Jersey Institute of Technology, “Trust and privacy
concern within social networking sites: A comparison of Facebook and MySpace”
 [9] “Social Networks Overview: Current Trends and Research
Challenges”, Coordinated by the “nextMEDIA” CSA. Supported by the Future Media
Networks cluster. NEXT-Media is supported by FP7, DG Information Society, Unit D2
Networked Media
16
Thank You
17

More Related Content

What's hot

Online Privacy
Online PrivacyOnline Privacy
Online PrivacyIWMW
 
Social Media Privacy
Social Media PrivacySocial Media Privacy
Social Media PrivacyLisa Turner
 
Social media and Security risks
Social media and Security risksSocial media and Security risks
Social media and Security risksParakum Pathirana
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationTriCorps Technologies
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network SecurityJohn Ely Masculino
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety Sadaf Walliyani
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Fabiha Shahzad
 
Application Security - Your Success Depends on it
Application Security - Your Success Depends on itApplication Security - Your Success Depends on it
Application Security - Your Success Depends on itWSO2
 
“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation tomasztopa
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security conceptsG Prachi
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITYAhmed Moussa
 

What's hot (20)

Online Privacy
Online PrivacyOnline Privacy
Online Privacy
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
Social Media Privacy
Social Media PrivacySocial Media Privacy
Social Media Privacy
 
Social media and Security risks
Social media and Security risksSocial media and Security risks
Social media and Security risks
 
Network security
Network security Network security
Network security
 
Computer Security Threats
Computer Security ThreatsComputer Security Threats
Computer Security Threats
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Browser Security
Browser SecurityBrowser Security
Browser Security
 
Application Security - Your Success Depends on it
Application Security - Your Success Depends on itApplication Security - Your Success Depends on it
Application Security - Your Success Depends on it
 
“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPESMALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 

Similar to Social network privacy & security

Impact of trust, security and privacy concerns in social networking: An explo...
Impact of trust, security and privacy concerns in social networking: An explo...Impact of trust, security and privacy concerns in social networking: An explo...
Impact of trust, security and privacy concerns in social networking: An explo...Anil Dhami
 
A4.1Proceedings of Student-Faculty Research Day, CSIS, Pa.docx
 A4.1Proceedings of Student-Faculty Research Day, CSIS, Pa.docx A4.1Proceedings of Student-Faculty Research Day, CSIS, Pa.docx
A4.1Proceedings of Student-Faculty Research Day, CSIS, Pa.docxjoyjonna282
 
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage TechnologyComprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage TechnologyCSCJournals
 
Social media and Security: How to Ensure Safe Social Networking
Social media and Security: How to Ensure Safe Social NetworkingSocial media and Security: How to Ensure Safe Social Networking
Social media and Security: How to Ensure Safe Social NetworkingIshfaq Majid
 
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKSSECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKSZac Darcy
 
New Media, New Ethics - ICA 2012
New Media, New Ethics - ICA 2012New Media, New Ethics - ICA 2012
New Media, New Ethics - ICA 2012Michael Zimmer
 
Risks and Security of Internet and System
Risks and Security of Internet and SystemRisks and Security of Internet and System
Risks and Security of Internet and SystemParam Nanavati
 
Professor Hendrik Speck - Social Conduct. Privacy and Social Networks.
Professor Hendrik Speck - Social Conduct. Privacy and Social Networks.Professor Hendrik Speck - Social Conduct. Privacy and Social Networks.
Professor Hendrik Speck - Social Conduct. Privacy and Social Networks.Hendrik Speck
 
Data mining in security: Ja'far Alqatawna
Data mining in security: Ja'far AlqatawnaData mining in security: Ja'far Alqatawna
Data mining in security: Ja'far AlqatawnaMaribel García Arenas
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Research Ethics in the 2.0 Era: New Challenges for Researchers and IRBs
Research Ethics in the 2.0 Era: New Challenges for Researchers and IRBsResearch Ethics in the 2.0 Era: New Challenges for Researchers and IRBs
Research Ethics in the 2.0 Era: New Challenges for Researchers and IRBsMichael Zimmer
 
A Survey of Methods for Spotting Spammers on Twitter
A Survey of Methods for Spotting Spammers on TwitterA Survey of Methods for Spotting Spammers on Twitter
A Survey of Methods for Spotting Spammers on Twitterijtsrd
 
A Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information PrivacyA Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information PrivacyMicah Altman
 
An IAC Approach for Detecting Profile Cloning in Online Social Networks
An IAC Approach for Detecting Profile Cloning in Online Social NetworksAn IAC Approach for Detecting Profile Cloning in Online Social Networks
An IAC Approach for Detecting Profile Cloning in Online Social NetworksIJNSA Journal
 
Cl15 a koene_ca_sma
Cl15 a koene_ca_smaCl15 a koene_ca_sma
Cl15 a koene_ca_smaAnsgar Koene
 
Professor Hendrik Speck - Social and Virtual. - An Analysis Framework for Lar...
Professor Hendrik Speck - Social and Virtual. - An Analysis Framework for Lar...Professor Hendrik Speck - Social and Virtual. - An Analysis Framework for Lar...
Professor Hendrik Speck - Social and Virtual. - An Analysis Framework for Lar...Hendrik Speck
 

Similar to Social network privacy & security (20)

Impact of trust, security and privacy concerns in social networking: An explo...
Impact of trust, security and privacy concerns in social networking: An explo...Impact of trust, security and privacy concerns in social networking: An explo...
Impact of trust, security and privacy concerns in social networking: An explo...
 
A4.1Proceedings of Student-Faculty Research Day, CSIS, Pa.docx
 A4.1Proceedings of Student-Faculty Research Day, CSIS, Pa.docx A4.1Proceedings of Student-Faculty Research Day, CSIS, Pa.docx
A4.1Proceedings of Student-Faculty Research Day, CSIS, Pa.docx
 
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage TechnologyComprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
 
Faculty presentation 21 st december 2015
Faculty presentation 21 st december 2015Faculty presentation 21 st december 2015
Faculty presentation 21 st december 2015
 
Social media and Security: How to Ensure Safe Social Networking
Social media and Security: How to Ensure Safe Social NetworkingSocial media and Security: How to Ensure Safe Social Networking
Social media and Security: How to Ensure Safe Social Networking
 
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKSSECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
 
New Media, New Ethics - ICA 2012
New Media, New Ethics - ICA 2012New Media, New Ethics - ICA 2012
New Media, New Ethics - ICA 2012
 
Risks and Security of Internet and System
Risks and Security of Internet and SystemRisks and Security of Internet and System
Risks and Security of Internet and System
 
Professor Hendrik Speck - Social Conduct. Privacy and Social Networks.
Professor Hendrik Speck - Social Conduct. Privacy and Social Networks.Professor Hendrik Speck - Social Conduct. Privacy and Social Networks.
Professor Hendrik Speck - Social Conduct. Privacy and Social Networks.
 
2_Doc5_2.pdf
2_Doc5_2.pdf2_Doc5_2.pdf
2_Doc5_2.pdf
 
Data mining in security: Ja'far Alqatawna
Data mining in security: Ja'far AlqatawnaData mining in security: Ja'far Alqatawna
Data mining in security: Ja'far Alqatawna
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Research Ethics in the 2.0 Era: New Challenges for Researchers and IRBs
Research Ethics in the 2.0 Era: New Challenges for Researchers and IRBsResearch Ethics in the 2.0 Era: New Challenges for Researchers and IRBs
Research Ethics in the 2.0 Era: New Challenges for Researchers and IRBs
 
A Survey of Methods for Spotting Spammers on Twitter
A Survey of Methods for Spotting Spammers on TwitterA Survey of Methods for Spotting Spammers on Twitter
A Survey of Methods for Spotting Spammers on Twitter
 
Social networking
Social networkingSocial networking
Social networking
 
A Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information PrivacyA Lifecycle Approach to Information Privacy
A Lifecycle Approach to Information Privacy
 
An IAC Approach for Detecting Profile Cloning in Online Social Networks
An IAC Approach for Detecting Profile Cloning in Online Social NetworksAn IAC Approach for Detecting Profile Cloning in Online Social Networks
An IAC Approach for Detecting Profile Cloning in Online Social Networks
 
549 458-465
549 458-465549 458-465
549 458-465
 
Cl15 a koene_ca_sma
Cl15 a koene_ca_smaCl15 a koene_ca_sma
Cl15 a koene_ca_sma
 
Professor Hendrik Speck - Social and Virtual. - An Analysis Framework for Lar...
Professor Hendrik Speck - Social and Virtual. - An Analysis Framework for Lar...Professor Hendrik Speck - Social and Virtual. - An Analysis Framework for Lar...
Professor Hendrik Speck - Social and Virtual. - An Analysis Framework for Lar...
 

Recently uploaded

Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 

Recently uploaded (20)

Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 

Social network privacy & security

  • 1. 1
  • 2.  Personal Social Networks  Status Update Social Networks  Location Social Networks  Content Sharing Social Networks  Shared Interest Social Networks 2
  • 3. 3
  • 4. 4
  • 5. Influencing factors in selecting a social network • Ease of use • Friends use it • Privacy • Security 5
  • 6. Shared Information Profile data Graph Data Activity Data  Third party application access  Poor implementation  Lack of awareness 6
  • 7. 7
  • 8. 1.Identity Theft Issues - Profile Cloning Existing Profile Cloning Cross site Profile Cloning - Social Phishing 8
  • 9. 2. Spam Issues - Spam attack on social networking sites - Email based spam attack on social network users Broadcast spam Context-aware spam - Http session hijacking 9
  • 10. 10
  • 11. 3.Malware Issues Spreading malware across social networks - Fake accounts/ profiles - Social network API - Driven by download attack - Shortened and hidden links - Cross-Site scripting attack 11
  • 12. 12
  • 13. 13 Threats percentage-pose on social networks (Sophos 2010 Security Threat Report)
  • 14.  Customize user profile data  Link previews  Private messaging  HTTPS secured Twitter browsing 14
  • 15.  2013  250,000 users  Limited user information User names Email Addresses Sessions tokens Encrypted versions of passwords 15
  • 16.  [1] Wajeb Gharibi, Maha Shaabi, “Cyber Threats in Social Websites”, College of Computer Science & Information Systems Jazan University, Kingdom of Saudi Arabia  [2] Joseph Bonneau, “Security & Privacy in Online Social Networks” University of Cambridge, Computer Laboratory  [3] William F. Pelgrin, “Security and Privacy on Social Networking Sites”, Multi-State Information Sharing & Analysis Center (MS-ISAC) Monthly Security Tips NEWSLETTER, March 2010  [4] Dr. Paul Judge, Chief Research Officer, “2011 Social Networking Security and Privacy Study”, Barracuda Networks Inc.  [5] George Danezis, “Inferring Privacy Policies for Social Networking Services” Microsoft Research, Cambridge,  [6] Dolvara Gunatilaka, “A Survey of Privacy and Security Issues in Social Networks” (http://www.cse.wustl.edu)  [7] Aaron Beach, Mike Gartrell, Richard Han “Solutions to Security and Privacy Issues in Mobile Social Networking” University of Colorado at Boulder  [8] Catherine Dwyer; Pace University, Starr Roxanne Hiltz ;New Jersey Institute of Technology, Katia Passerini ;New Jersey Institute of Technology, “Trust and privacy concern within social networking sites: A comparison of Facebook and MySpace”  [9] “Social Networks Overview: Current Trends and Research Challenges”, Coordinated by the “nextMEDIA” CSA. Supported by the Future Media Networks cluster. NEXT-Media is supported by FP7, DG Information Society, Unit D2 Networked Media 16