The document discusses security issues related to social networks. It notes that social networks store large amounts of private user data, making personal information vulnerable to malicious actors like hackers. It emphasizes the importance of using strong, unique passwords for each account and limiting personal details shared publicly. The document also examines privacy controls, identity theft, malware, social engineering and other fraud risks associated with using social media platforms. Protecting privacy and being aware of potential threats are key to staying secure in social networks.
This series of articles about security trips how to make social networking is more secure on the top social networks. Part I. Facebook.
http://hakin9.org/hakin9-bible-12012/
Social Networking Sites have become the means of the communication and have
experienced growth in the recent years. As these sites offer services for free of costs are
attracting the people all around the world. Some technologies are emerging in the field of
Internet but still the users are facing the security leakages by unauthorized users. Many of
the Social Sites are managed by the Third Party Domains which keep track of all the user
information along with the access details. Most Online Social Networking (OSN) Sites
provide an “accept all or nothing” mechanism for managing permission from Third Party
Access (TPA) to access user’s private data [3]. The Social Media sites do not provide any
mechanism for privacy on the shared data among the multiple users. Many users share their
personal information without knowing about the cyber thefts and risks associated with it.
From the survey it has been found that the teenagers are least concerned about the
navigating privacy. Privacy associated with the Social media is the very crucial thing.
Different methods are discussed regarding sharing of the personal information and leakage
of this information through different mediums. Different models are also proposed in this
paper regarding the privacy control of third party access of the personal information. An
approach is proposed which allows users to share their access control configuration for TPA
s with their friends who can reuse and rate such configurations [3]
There is no argument about the popularity of the social platforms such as Facebook, YouTube, twitter, etc. These platforms can be used to stay in touch with your friends, increase sales revenues for organizations and as a collaboration tool to stay connected with the public. However, each of these benefits comes at a cost, putting your private information at a risk/ exposed. We aim to discuss the common security risks associated with usage of these platforms including risk mitigation strategies.
Intro Video : https://www.youtube.com/watch?v=zxpa4dNVd3c
Presentation for Computer Society of Sri Lanka on 24 Feb 2015
How to Like Social Media Network SecurityBrian Honan
This is my presentation from Source Dublin 2014 on cyber crime and social media.
Social media networks provide individuals and businesses with exciting opportunities to communicate and collaborate with others throughout the world. But with these opportunities come a number of security challenges and risks. This talk will outline how social media networks can pose various threats to businesses, from information leakage, reputational damage, to social engineering profiling, and vectors for enabling compromise of corporate systems. Social media networks also enable the rapid dissemination of news which in the event of an information security breach could either save or destroy an organisations reputation. Understanding and dealing with these challenges will enable companies to like and favourite social media networks in a secure way.
Online Social Networks: 5 threats and 5 ways to use them safelyTom Eston
I spent the last few months doing research on various social networks specifically MySpace, Facebook, LinkedIn. Many of us either use these sites or know others that do. Users of these sites have been increasing at a dramatic rate for several years. For example, MySpace was the most visited website in the US with more than 114 million global visitors in 2007, and Facebook increased its global unique visitor numbers by 270% last year alone. With this massive increase in social network usage, online social networking is now becoming the fastest growing area of privacy concerns and security threats.
This series of articles about security trips how to make social networking is more secure on the top social networks. Part I. Facebook.
http://hakin9.org/hakin9-bible-12012/
Social Networking Sites have become the means of the communication and have
experienced growth in the recent years. As these sites offer services for free of costs are
attracting the people all around the world. Some technologies are emerging in the field of
Internet but still the users are facing the security leakages by unauthorized users. Many of
the Social Sites are managed by the Third Party Domains which keep track of all the user
information along with the access details. Most Online Social Networking (OSN) Sites
provide an “accept all or nothing” mechanism for managing permission from Third Party
Access (TPA) to access user’s private data [3]. The Social Media sites do not provide any
mechanism for privacy on the shared data among the multiple users. Many users share their
personal information without knowing about the cyber thefts and risks associated with it.
From the survey it has been found that the teenagers are least concerned about the
navigating privacy. Privacy associated with the Social media is the very crucial thing.
Different methods are discussed regarding sharing of the personal information and leakage
of this information through different mediums. Different models are also proposed in this
paper regarding the privacy control of third party access of the personal information. An
approach is proposed which allows users to share their access control configuration for TPA
s with their friends who can reuse and rate such configurations [3]
There is no argument about the popularity of the social platforms such as Facebook, YouTube, twitter, etc. These platforms can be used to stay in touch with your friends, increase sales revenues for organizations and as a collaboration tool to stay connected with the public. However, each of these benefits comes at a cost, putting your private information at a risk/ exposed. We aim to discuss the common security risks associated with usage of these platforms including risk mitigation strategies.
Intro Video : https://www.youtube.com/watch?v=zxpa4dNVd3c
Presentation for Computer Society of Sri Lanka on 24 Feb 2015
How to Like Social Media Network SecurityBrian Honan
This is my presentation from Source Dublin 2014 on cyber crime and social media.
Social media networks provide individuals and businesses with exciting opportunities to communicate and collaborate with others throughout the world. But with these opportunities come a number of security challenges and risks. This talk will outline how social media networks can pose various threats to businesses, from information leakage, reputational damage, to social engineering profiling, and vectors for enabling compromise of corporate systems. Social media networks also enable the rapid dissemination of news which in the event of an information security breach could either save or destroy an organisations reputation. Understanding and dealing with these challenges will enable companies to like and favourite social media networks in a secure way.
Online Social Networks: 5 threats and 5 ways to use them safelyTom Eston
I spent the last few months doing research on various social networks specifically MySpace, Facebook, LinkedIn. Many of us either use these sites or know others that do. Users of these sites have been increasing at a dramatic rate for several years. For example, MySpace was the most visited website in the US with more than 114 million global visitors in 2007, and Facebook increased its global unique visitor numbers by 270% last year alone. With this massive increase in social network usage, online social networking is now becoming the fastest growing area of privacy concerns and security threats.
I made this presentation for Professional And Ethical Issues In Information Systems, module that I'm studying at UWIC University, Cardiff.
I hope you like it, please, send your feedback.
This series of articles about security trips how to make social networking is more secure on the top social networks. Part I. Facebook.
http://hakin9.org/hakin9-042012-cyber-warfare/
Multi facet trust model for online social network environmentIJNSA Journal
Online Social Network (OSN) has become the most popular platform on the Internet that can provide an interesting and creative ways to communicate, sharing and meets with peoples. As OSNs mature, issues regarding proper use of OSNs are also growing. In this research, the challenges of online social networks have been investigated. The current issues in some of the Social Network Sites are being studied and compared. Cyber criminals, malware attacks, physical threat, security and usability and some privacy issues have been recognized as the challenges of the current social networking sites. Trust concerns have been raised and the trustworthiness of social networking sites has been questioned. Currently, the trust in social networks is using the single- faceted approach, which is not well personalized, and doesn’t account for the subjective views of trust, according to each user, but only the general trust believes of a group of population. The trust level towards a person cannot be calculated and trust is lack of personalization. From our initial survey, we had found that most people can share their information without any doubts on OSN but they normally do not trust all their friends equally and think there is a need of trust management. We had found mixed opinions in relation to the proposed rating feature in OSNs too. By adopting the idea of multi-faceted trust model, a user-centric model that can personalize the comments/photos in social network with user’s customized traits of trust is proposed. This model can probably solve many of the trust issues towards the social networking sites with personalized trust features, in order to keep the postings on social sites confidential and integrity.
We Didn't Say That! - Minimizing Risk Via Social Media PoliciesDave Tinker, CFRE
Presentation on minimizing risk via Social Media Policies from Pittsburgh Regional Training Collaborative in January 2012. Focus on Nonprofit organizations.
Presentation from Robert Morris University's Bayer Center's TechNow11 conference on why you need social media policies and ways for a nonprofit to minimize risk.
Powerpoint presentation created for a workshop hosted by CASLIS-Ottawa, "Connecting with Our Clients: Marketing and Communicating Information Services". January 12 2009.
I made this presentation for Professional And Ethical Issues In Information Systems, module that I'm studying at UWIC University, Cardiff.
I hope you like it, please, send your feedback.
This series of articles about security trips how to make social networking is more secure on the top social networks. Part I. Facebook.
http://hakin9.org/hakin9-042012-cyber-warfare/
Multi facet trust model for online social network environmentIJNSA Journal
Online Social Network (OSN) has become the most popular platform on the Internet that can provide an interesting and creative ways to communicate, sharing and meets with peoples. As OSNs mature, issues regarding proper use of OSNs are also growing. In this research, the challenges of online social networks have been investigated. The current issues in some of the Social Network Sites are being studied and compared. Cyber criminals, malware attacks, physical threat, security and usability and some privacy issues have been recognized as the challenges of the current social networking sites. Trust concerns have been raised and the trustworthiness of social networking sites has been questioned. Currently, the trust in social networks is using the single- faceted approach, which is not well personalized, and doesn’t account for the subjective views of trust, according to each user, but only the general trust believes of a group of population. The trust level towards a person cannot be calculated and trust is lack of personalization. From our initial survey, we had found that most people can share their information without any doubts on OSN but they normally do not trust all their friends equally and think there is a need of trust management. We had found mixed opinions in relation to the proposed rating feature in OSNs too. By adopting the idea of multi-faceted trust model, a user-centric model that can personalize the comments/photos in social network with user’s customized traits of trust is proposed. This model can probably solve many of the trust issues towards the social networking sites with personalized trust features, in order to keep the postings on social sites confidential and integrity.
We Didn't Say That! - Minimizing Risk Via Social Media PoliciesDave Tinker, CFRE
Presentation on minimizing risk via Social Media Policies from Pittsburgh Regional Training Collaborative in January 2012. Focus on Nonprofit organizations.
Presentation from Robert Morris University's Bayer Center's TechNow11 conference on why you need social media policies and ways for a nonprofit to minimize risk.
Powerpoint presentation created for a workshop hosted by CASLIS-Ottawa, "Connecting with Our Clients: Marketing and Communicating Information Services". January 12 2009.
Although contradictory in its title, this post does bring to light something I have recently been thinking about: ‘How private can you be on social networks?‘ I have a wide variety of social media accounts and use a huge list of tools in order to perform my daily activities effectively and efficiently.
Advantages and disadvantages of social mediaAlan Raj
an interesting show about social media that you can find all the information and it also contains an interesting video with voice so u can understand what is the advantages and disadvantages of social media very clearly....................................................................................................................................................u just need to watch this u will be interested ,iam sure about that
Effects of Social Media on Young AdultsRatan Rajpal
Social media has taken the world by storm through dozens of websites, mobile apps, and other forms of technologies improving the way people communicate with each other. There are social media sites that have millions of members allowing them to share photos, videos, text messages, and more on a regular basis. There are a large number of advantages and disadvantages to using such sites that leave researchers wondering if we are better off without it. Has social media improved or damaged the way people connect with each other?
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docxtodd521
Running Head: SOCIAL NETWORKS DATA PRIVACY POLICIES 1
Social networking data privacy policies
Information Governance
Summer 2020
Ali, S., Islam, N., Rauf, A., Din, I. U., Guizani, M., & Rodriguez, J. P. (2018). Privacy and Security Issues in Online Social Networks
Social media are networks used for communication between data owners and viewers in virtual communities. The world has hence become a small global village; as a result, accordingly, information is shared seamlessly regardless of the geographical distance between people. There are, therefore, numerous social networks such as Facebook, LinkedIn, and Twitter, just to name a few, and with the help of the internet, people can link and communicate in real-time. When connecting with people from mobile devices, there is data that could be retrieved, indicating the location information and metadata embedded in the machines. Malicious users can hence retrieve this information and leverage it against other users.
The author makes it clear that with the new technology, presently, there is a lot more information available with the growth of online virtual communication platforms. Virtual networking platforms have changed the way people interact. People are always on their mobile devices browsing through social media sites, which is progressively attracting hackers and other cybercriminals. Due to this high usage, there are serious data security and privacy threats are facing social media users. The author is affirmative that the majority of the users are always sharing a lot of their personal information online, putting them at significant risks of the numerous methods of attacks.
This article is rather informative as the author is rather vocal about the reasons why people are continually being targeted by cybercriminals and made victims of attacks. It, therefore, clear on specific policies and strategies which one may implement to prevent them from falling victim to cyberattacks. One should refrain from sharing too much information on social networks, using real names when creating online profiles, and accepting friend requests from suspiciously looking accounts. Social network users must be keen and take the time to read the privacy statement before agreeing to the network's terms and conditions when creating reports.
Sarikakis, K., & Winter, L. (2017). Social Media Users’ Legal Consciousness About Privacy. Social Media + Society
Social network sites are on the upward trajectory, and they are still continuously growing with every mobile user in the world having been connected to an average of more that one social network. Social networks are mainly common among young adults aged between 18 years and 29 years. Users are becoming more comfortable sharing most of their personal details, which significantly challenges the social norm of privacy. The social model has hence become somewhat obsolete. According to the Electronic Frontier Foundation (EFF), which is a non-profit or.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
How world-class product teams are winning in the AI era by CEO and Founder, P...
Security in social network araceli&arlethe
1. Security in Social Networks 1
“SECURITY IN SOCIAL NETWORKS”
Hernández Castro Araceli
Tenorio Martínez Arlethe
February, 2014
2. Security in Social Networks 2
ABSTRAC
Social networking has had a great impact today, have grown exponentially and
store a lot of private information about its users and their interactions, data stored
with all these social networks can attract malicious persons to harass, defame, do
spam and phishing.
The respective advantages of social networks are known well worldwide but talk
about privacy and security on them is of little people, which is why it is necessary
to talk about safety, how to optimize how and the proper use thereof, subject of this
article. To mention security in the social web is a key point in the passwords we
use for our accounts, which must be combined with numbers, letters and
characters for your safety.
A simple option is to make good use of social networks and not creating a very
personal inquisition, the protection is paramount importance in social network
research as private users, may cause undesirable or harmful effects on the
personal life.
3. Security in Social Networks 3
KEYWORDS
Internet ---------------------- Internet
Inseguridad ---------------- Insecurity
Privacidad ----------------- Privacy
Seguridad ----------------- Security
Redes Sociales ---------- Social Networks
4. Security in Social Networks 4
INTRODUCTION
Social networks are based on the Theory of Six Degrees of Separation, as this
anyone can be connected elsewhere in the world through a chain of acquaintances
that has no more than five intermediaries, connecting two people with only six
bonds. The theory was first proposed in 1929 by Frigyes Karinthy. The concept is
based on the idea that the known number grows exponentially with the number of
links in the chain, and only a small number of links are required for known
assembly becomes the entire human population.
The number of users in social networks has increased considerably in recent
years, to be part of social networks the user must register, usually for free, and
then complete a series of forms with your personal data, hobbies, personal photo
etc. We see this as a simple means of maintaining communication with our
surroundings, we see and publish photos, share feelings and thoughts, but do you
really know about the people who will see the other side of the computer or some
other means are?
In recent years, the popularity and the trust of social networks are being exploited
by cybercriminals, who have found a new way of exploiting their fraudulent
activities. The rise of social networking has taken the concept of privacy to a
dangerous terrain in which the vulnerability of each person on the network
increases. It is advisable to consider some points that can protect our data if we
use online social networks.
5. Security in Social Networks 5
CHAPTER I: NETWORKS
ANTECEDENTS
Social networks are based on the Theory of Six Degrees of Separation, whereby
anyone can be connected to any other in the world through a chain of
acquaintances that has no more than five intermediaries, connecting people with
only two six bonds. This theory attempts to prove that our grandparents saying "the
world is a handkerchief," that is, that anyone on Earth can be connected to any
other person through a chain of acquaintances that has no more than five levels
intermediaries. (PANDA, 2008, p. 4)
Figure 1.1.1 theory of six degrees of separation.
The origin of social networks goes back to 1995 when Randy Conrads
classmates.com website created with the objective that people could regain or
maintain contact with former classmates from school, college or university.
(PANDA, 2008, p. 3)
With the advent of Internet, network par excellence, has given rise to hundreds of
sites that facilitate the formation of social networks in relation to their academic
status, your workplace, your geographic region, interests, hobbies, taste, among
others.
6. Security in Social Networks 6
SOCIAL NETWORK
A network is an abstract way to visualize a number of systems, and in general,
almost all complex systems.
Figure 1.1.2 The Rise of Social Networks
When talking about social networks refers to those services where users can
create a personal profile and interact with other users is. These platforms allow you
to interact through messages, share information, pictures or videos, so that these
publications are immediately visible for all the users form their group of contacts.
To join them you must register by filling out a series of forms with personal details,
photographs, etc. Normally just create a basic profile, and from there to provide all
the information about yourself that you want to increase the data provided to the
network. (INTECO, 2010)
Figure 1.1.3 The Rise of Social Networks2
7. Security in Social Networks 7
Social networks show clear network effects, the greater the number of users and
the more rich and complex profiles are created, more capacity has the social
network to get new users, and present value as an advertising platform or as a
platform for submission of applications or services.
In this sense, Privacy management represents one of the key elements for social
networking, not only by the need to comply with relevant legal obligations, but by
the perception of users regarding the use and visibility of their data, which can put
the privacy policies employed as a competitive factor among different social
networks.
ADVANTAGES
Revisiting known.
Opportunity to join Flashmobs (short meetings via online for games and
entertainment in order to mobilize thousands of people).
Excellent for promoting new contacts affective as matchmaking, friendship
or sharing interests nonprofit.
Share special moments with those close to our lives.
Dilute geographical boundaries and serve to connect people regardless of
distance.
Perfect for connections to the professional world.
Get updates on topics of interest information, and let you attend events,
participate in events and conferences.
Communication can be in real time.
Can generate mass movements of solidarity in a crisis situation.
8. Security in Social Networks 8
Figure 1.1.4 Advantages of Social Networking
DISADVANTAGES
Apart from the general disadvantages (invasion of privacy, lack of security,
addiction) has emerged a new disadvantage arising from boredom or boredom of
some who have proposed anti social networks such as travesty to authentic.
In the same way the happy customers to write good reviews of a product,
annoying customers also write about their bad experience. These comments
can be viewed by thousands of people in a short time and affect the image
of any business in weeks or even days.
A further disadvantage is the loss of privacy. Suddenly we become
accessible to anyone and is not always good. Avoid revealing sensitive
information how phone numbers, addresses not to mention bank accounts
and passwords.
Figure 1.1.5 Disadvantages of Social Networks
9. Security in Social Networks 9
CHAPTER II: PRIVACY
SECURITY
Joined this public display of your privacy is a lack of security. There is too much
personal information rolling around, and little assurance that is well protected.
Participation in social networks is not without risks, such as identity theft. Even the
most careful users may provide personal information to strangers without realizing
it, to download and install an application designed by third parties that include
games, contests, contests of knowledge and virtual gifts. People entering these
networks think that information is considered private, can see only friends or
specific groups, but programmers sometimes used to bring together users with
similar interests. Sometimes used to broadcast advertising aimed at specific
sectors, taking into account things like age and gender.
The magnificent growth of social networking sites has changed the way of
communication, creating messages often unintelligible to users. Shared ideas and
dysfunction of the information is difficult to understand. Although the process of
transmitting information is perhaps easier and more comfortable, the amount of
information that can be run from one country to another in seconds is unlimited and
cannot control. Another disadvantage found in social networks, we can not be
certain that the information set out is there genuine or true.
Many companies have made the move to the new era and have established social
networks have caution when carrying a message. The companies aim networks,
but many managers and owners of the same fear for what employees can say
about them and the reputation that you provide to them. Public relations company
can not control what your employees commenting, but if you teach ethics and
responsibility that each must have.
10. Security in Social Networks 10
PRIVACY
Today, the rise of social networks has led to the concept of privacy dangerous
territory in which the vulnerability of each person on the network increases. If we
use them, you should keep in mind some points that can protect our data online.
Privacy is a set of practices that divide public and private things. In this regard, let
us start from the point of view that privacy and confidentiality are imperative part of
computational activity. Thus, the problems that surround conflict systematically for
information security become, in many cases go beyond computer science.
At first glance, these problems would not impact such a sensitive issue as the
consequences of social engineering attacks, or maybe a little more dangerous as it
can be the subject of kidnapping, extortion and even "bullying" or "bullying" to
children and youth. (BOURBON Sanabria, 2012)
Intimacy and privacy is a right that anyone has. But with social networking privacy
is in check. Having a profile on social networks is almost a necessity to keep in
touch with family, friends or work. Few people who are not on Facebook, Twitter or
other social network. The problem that arises with these is privacy affected.
Numbers, ideology, religion or directions are some of the data they can get to
appear in the profiles of social networks. That's why you have to be more cautious
about sharing personal information. Public sharing of sensitive information that
may be more dangerous, beyond that there are few confirmed cases of
kidnappings, theft or fraud cases generated from the networks. (GRIVA, 2011)
The issue of privacy in social networks has increased relative to other online
services due to the ease with which users reveal personal information, as well as
the lack of awareness of these on the risks involved and the difficulty of some
users configured appropriately for such tools. (RODOTA, 2011)
11. Security in Social Networks 11
PRIVACY IN THE CONTEXT OF SOCIAL NETWORKS
Anonymity of the user's identity
Protecting the actual identity of users, changes depending on which social network
we are registered. In social networks like Facebook, people use their own name as
such listing, to make them easier to locate users and especially to locate them
within the social network.
Everything we put on the net, stays on the net, so we must be careful what we do
not harm us or get into problematic situations.
But on social networks like Twitter, usually people can put aliases or addresses of
your own web page as a profile.
Privacy of personal space
The visibility of the user profile in a social network to another varies, in some
networks profiles can be found by doing a search on Google, such as Facebook or
Twitter; however the social network Tuenti this is not possible, is completely closed
to people registered on the website. This part also entered the profiles that may or
may not see people.
Depending on a social network or another, the default permissions are public or
private. Facebook takes a different approach by default; users who are on the
same subnet can view other profiles, unless a profile has decided to deny
permission for your subnet. As mentioned above, most social networks allow
friends to see aggregate profiles you're seeing.
As we have said, in most networks, you can see the list of friends we have,
although there are exceptions either because the social network itself gives you the
option to hide your friends list or because you hacked the profile from exit.
12. Security in Social Networks 12
Privacy of user communication
A part of the data we provide to the social networks, as our photos, our comments
etc. A user of the social network discloses additional data, such as connection
time, the IP address used (and of course, their geographical location), visited
profiles, messages sent and received, i.e., a whole log of personal information
about what we've done while we were in the social network. All this should be
private, remember that an IP address in a period is unique, identifying a single
person, and it is illegal publication without user consent.
All this is summarized in that privacy must be present in both the social network
and information sharing (photos, messages etc.), and logs that are recorded in this
social network. Unauthorized entities should not know the contents of private data
sent and received via the network.
This aspect of the privacy of the data involves data confidentiality and anonymity of
homeowners, and must have access control. Access to information about a user
can only be granted by the user. Unauthorized entities, nor should they be able to
link the private data with the profile owner.
13. Security in Social Networks 13
FRAUD IN SOCIAL NETWORKS
Identity Theft
Identity theft is a crime in which a person appropriates personal information to
commit fraud or other crimes. This a problem that affects millions of people
annually in the United States, including children who are victims of child identity
theft.
We can all take steps to prevent identity theft, but unfortunately sometimes
it depends on vulnerability in the computer systems or carelessness of
others who have access to our personal data.
If you think someone has stolen your personal information without your
permission, know what steps to take to report identity theft and protect your
money and your credit and reputation.
It is also important to learn how to protect your privacy, both personal and
financial, medical and Internet, to control what information is shared with
others and what it is used. Take care of your personal data in transactions
and avoid becoming a victim of identity theft.
Malware
Malware (malicious software) is a term that describes a variety of programs that
are installed on the computers of users usually through deception. The malware
can multiply quickly through social networks, infected user's computer and then
expand to the computers of your contacts. This is because the malware may
appear to come from a trusted contact, and therefore users are more likely to click
on links or downloading malicious software.
Some of the most common techniques for propagation of malware are:
14. Security in Social Networks 16
Short URLs, especially those that appear in the area of updates or news
updates. This may cause the user to download a virus or visit a site that
attempts to download malware onto your computer.
Messages that appear to come from reliable sources that invite the user to
click on a link, view a video or download a file.
An email that appears to come from the same social networking site, which
requests information or asks the user to click on a link.
Third-party applications that infect computers with malicious software,
which spreads through contact.
False security alerts. These are applications that are passed by a virus
protection program and informs the user that your safety program is expired
or has detected a threat.
Social Engineering
An absolute truth, in terms of information security, is the weakest link in the chain is
the user human. This means that it is easier to attack a person and obtain
information or actions of this that violate achieve an information system that is
secured, shielded and protected against possible attackers. This leads to the
definition of social engineering:
"Art and science of manipulating people into performing actions that may be of
interest or goal" Chris Hadnagy.
"An act of manipulating people and develop actions or disclose".
In short one can speak of social engineering as a kind of human hacking.
Now and in the hacking work is performed to obtain information (Information
Gathering) of a possible target, just as obtaining information is the basis of social
engineering attacks, with the difference that normally the objective of attack will be
a person, a human, and for this you need to delve into every possible media
15. Security in Social Networks 16
containing target information possible, this containing target information possible,
this is where the Internet and social networks appears.
From the perspective of a social engineer, any information about the person aims,
can contribute to form a profile or outline of tastes, haunts, activities performed,
place of work and activities, among other data. That is why without a doubt; social
media can provide a lot of information that can be useful. Next, let's look at a short
table that spans some data can get to get through these information systems:
Table 1. Data obtained through social networks
SOCIAL NETWORK /
PLATFORM
INFORMATION OBTAINED UTILITY
Facebook / G+ / Hi5/Badoo
/ ...
• moods
• Visits
• pictures
• Interests
• Family
•
Relationships
• Etc.
These
networks
provide a lot of
general
information
about the
person and
their contacts.
Twitter / Myspace / BBM /
...
• moods
• Visits
• pictures
• Interests
Establish a list
of activities,
psychological
profile, sites
visited,
information
consulted and
tastes of the
individual.
MySpace / Grooveshark /
LastFM / ...
• Music heard
• Musical
Tastes
Set a profile of
preferences
and musical
tastes.
Linkedin/... • State labor
• Knowledge
• Wage
Assignment
• Studies in
process
Identify job
profile of the
person, current
job, past,
education,
knowledge,
interests, work,
etc..
16. Security in Social Networks 16
Foursquare / ... • Visits
• Gourmet
Tastes
Allows
geoposicionar
people and
places
frequented
identify
possible
demonstrations
or through
travel.
Flickr / Picasa / ... • Visits
• individual
tastes
• Environment
in which the
individual
develops
Establish a list
of activities,
psychological
profile, visited
places and
tastes of the
individual.
Now, knowing that I usually have information published by these systems, taking
into account that this information can be indexed in search engines with or without
the consent of the user, it is necessary to validate both being shared.
17. Security in Social Networks 17
SAFETY STANDARDS
To understand the challenge of balancing security and privacy, sociability and
usability have to see the main standards of network security.
Notice: Requires that information is accessible only to authorized entities. It
is vital in social networking misuse because information could have serious
consequences on the lives of people.
Integrity: Requires that information be modified only by authorized entities.
Availability: Requires that system resources are always available.
Non-repudiation: To provide protection against a user other then denying he
made some communication.
18. Security in Social Networks 18
RESULTS
According to statistics based on a September 2013 report of eBizMBA Rank, one
of the largest networks is visited Facebook than 750 million unique visitors per
month.
As for the surveys conducted by ESET Latin America in July 2013, noted that the
total Latin American users surveyed 51.4% said using social networks to work.
Although communication with friends and family (85.6%), and the study (53.6%)
are the reasons most often cited by users regarding the use of social networks, the
fact that a little over half share corporate data and the job position as the third
largest in the graph (51.4%) reason, shows that companies and corporate users
also use these media for business purposes:
19. Security in Social Networks 19
On the other hand, face the question about the level of security of information
stored on the servers of social networks, 52.2% think that their information is
slightly insecure:
20. Security in Social Networks 20
DISCUSSION
Today, most people is recessed in the world of technology, make use of the tools
offered by Web 2.0 and is favorable because they remain on the advantages they
offer, but hey that is the problem we focus on the benefits, we settle for being
communicated with our friends, colleagues or even knowing other people. Most are
not aware of what we publish and if there are no privacy in the media, such
information can be read or take any user on the network and to misuse it in order
to cause any damage to our person.
The security and privacy begins with ourselves, of what we publish, we discuss
and permissions that grant, we are aware of our attitudes toward the media is true
has many advantages if we give the proper use but it is also appropriate to provide
for the consequences resulting for inappropriate behavior.
In conclusion, the study of security and privacy in social networks allows us to be
alert to himself about our behaviors to make use of them, as we all realize the
problems appear for privacy by the lack of knowledge by the user options that can
be enabled to restrict certain account data. The technology is advancing, social
networks evolve but we must focus regarding security and privacy to our person to
make use of them.
21. Security in Social Networks 21
GRATITUDE
This article is written with an expression of gratitude to teacher Valeriano Orozco
Meztli and our fellow reviewers who provided moral support for writing this.
Araceli&Arlethe
22. Security in Social Networks 22
REFERENCES
BORBÓN Sanabria , J. S. (2012). Seguridad.
FUNDACIÓN TELEFÓNICA. (2012). El debate sobre la privacidad y seguridad en
la Red: Regulación y mercados. Fundación Telefónica.
GOUJON, A. (21 de Agosto de 2013). welivesecurity. Recuperado el 15 de Mayo
de 2014, de http://www.welivesecurity.com/la-es/2013/08/21/51-usuarios-
latinoamericanos-utiliza-redes-sociales-fines-corporativos/
RODOTÁ, S. (2011). Social Networks and children's privacy. Reus.
INTECO, I. (17 de 05 de 2010). Seguridad de La Información y Redes Sociales.
GRIVA, J. P. (19 de 09 de 2011). Privacidad en las redes Sociales. Recuperado el
12 de 04 de 2014, de http://redaccion1.bligoo.com.ar/la-privacidad-en-las-
redes-sociales
PANDA, S. (28 de 08 de 2008). PandaLabs. Recuperado el 10 de Abril de 2014,
de http://www.pandasecurity.com/img/enc/Red_Soc_punto_mira.pdf