Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology (original) (raw)

Threats and Anti-threats Strategies for Social Networking Websites

International journal of Computer Networks & Communications, 2013

Social networks can offer many services to the users for sharing activities events and their ideas. Many attacks can happened to the social networking websites due to trust that have been given by the users. Cyber threats are discussed in this paper. We study the types of cyber threats, classify them and give some suggestions to protect social networking websites of variety of attacks. Moreover, we gave some antithreats strategies with future trends.

Cyber threats in social networking websites

A social network is a social structure made up of individuals or organizations called nodes, which are connected by one or more specific types of interdependency, such as friendship, common interest, and exchange of finance, relationships of beliefs, knowledge or prestige. A cyber threat can be both unintentional and intentional, targeted or non targeted, and it can come from a variety of sources, including foreign nations engaged in espionage and information warfare, criminals, hackers, virus writers, disgruntled employees and contractors working within an organization. Social networking sites are not only to communicate or interact with other people globally, but also one effective way for business promotion. In this paper, we investigate and study the cyber threats in social networking websites. We go through the amassing history of online social websites, classify their types and also discuss the cyber threats, suggest the anti-threats strategies and visualize the future trends of such hoppy popular websites.

Classification of various attacks and their defence mechanism in online social networks: a survey

Enterprise Information Systems, 2019

Due to the popularity and user friendliness of the Internet, numbers of users of online social networks (OSNs) and social media have grown significantly. However, globally utilised, social networks are the consequence of the lack of understanding of secrecy and protection on OSN and media has increased. Secrecy and surety of OSNs need to be inquired from various positions. According to recent studies, OSN users expose their private information such as email address, phone number etc. In this paper, we have presented a high-level classification of recent OSN attacks for recognising the problem and analysing the blow of such attacks on World Wide Web. We have also discussed OSN attacks on different social networking web applications by citing certain recent reports such as Kaspersky security network and Sophos security threat report. We also offer some simple-to-implement user practice tips to protect the system and user's information. In addition to this, we have discussed a comprehensive analysis of numerous defensive approaches on OSN security. Lastly, based on the acknowledged strength and faults of these defensive approaches, we have explained open research issues.

Vulnerabilities of Social Networking Sites-An Open Attack Vector for Cyber Criminals

Journal of Network and Information Security, 2018

A social networking service is an online service that focuses on facilitating the building of social networks or social relations among people who can share images, activities, backgrounds, or real-life connections. Once information is posted to a social networking site, it is no longer private. The more information shared, the more likely someone could impersonate the user and trick one of their friends into sharing personal information, downloading malware, or providing access to restricted sites. Predators, hackers, business competitors, and foreign state actors troll social networking sites looking for information or people to target for exploitation. Information gleaned from social networking sites may be used to design a specific attack that does not come by way of the social networking site. Users of online social media become victims for various types of cybercrimes; this may be due to the vulnerabilities present in the application. The advancement in technology provides the social networking sites to be user friendly and quick accessible but there are so many vulnerabilities that can make the users as victim to different types of cybercrimes. This article analysis the various vulnerabilities of social networking sites and how the attackers use this vulnerabilities to take control of the users account and their personal information. Social networking is a magnificent means to hook up with people, create new contacts, share what we familiar with others, and study new things. User must, on the other hand, be conscious of the fact that the web has its own fair share of good and bad components which pulls users to be victim of the vulnerabilities.

IRJET-Analysis of Social Media Attacks and Classify Advances to Preserve

The growth of Internet is increasing day by day and users of internet are also increasing regularly. The tremendous growth of internet also leads to increment in cyber attacks. Security threats and attacks are violating cyber rules and regulations. It also affects data and information available on internet and steals personal information of users who are locating their secret information online. The major problem is there when threats and attacks are affecting to financial transaction performed by user online and secret information available online on social media. The standard rules and regulation for internet and cyber security are there but not enough to protect data online available on social media and it is also not useful to get defence from threats and attacks by legitimate or unlawful users of social networking sites and applications. This leads to study of threats and attacks of social media and approaches to defend it from others. This paper presents depth study of threats and attacks available on social media webs and applications and various ways to defend it. The paper discusses characteristics of threats and attacks on social media and also discusses about vulnerable sites and applications. Paper is useful to protect their data and information to them who are providing their personal and secret data as well as information online via social media. This paper is also discusses about the case study of threats and attacks available on Facebook, largest popular site of social media, and various way to defend it.

Social Media Network Attacks and their Preventive Mechanisms: A Review

Computing Advances & Trends, 2021

We live in a virtual world where actual lifestyles are replicated. The growing reliance on the use of social media networks worldwide has resulted in great concern for information security. One of the factors popularizing the social media platforms is how they connect people worldwide to interact, share content, and engage in mutual interactions of common interest that cut across geographical boundaries. Behind all these incredible gains are digital crime equivalence that threatens the physical socialization. Criminal minded elements and hackers are exploiting social media platforms (SMP) for many nefarious activities to harm others. As detection tools are developed to control these crimes so also hackers’ tactics and techniques are constantly evolving. Hackers are constantly developing new attacking tools and hacking strategies to gain malicious access to systems and attack social media network thereby making it difficult for security administrators and organizations to develop and...

Social Media Security Risks and Cyber Threats

2018

Social media is being utilized to demonstrate communication skills. Social media provides a way to connect with our loved ones any time anywhere. There are several social networks like Facebook, twitter, LinkedIn and so on are presented over the internet. These social networking sites make an online profile of a user which is shared freely with the public. It can have negative impact on our life. It can allow easy access to one’s privacy. In this paper, we have discussed privacy and network related issues and threats and proposes anti threats steps and preventive measures for users. Although these sites may work harmless but they always have malicious content. The undertaken study is helpful for researchers, scholars and academicians

A survey on : Online Social Networking Attacks Detection Techniques

International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 2021

Today's due the popularity of internet number of users are increase on every social media platform. In recent research found that 80% of youth depend on social media to make new friends , share photos. Through this they get popularity and large number of user base and become influencers . Most of the social media platform are providing different privacy and security . Still attacker find out the way to breech the security, privacy and confidently of users and companies or organizations using several techniques . This paper highlight the major security issues phasing by many social networking web applications. Also identify the solution based on attacks in different literature . At last, we discuss open research issues

A Study On Social Networking Malicious Activities and Prevention Techniques

2016

With the increasing use of social networking site, there are increments in the malicious, fake, and viruses. Daily approximately 20 million users will register in one day on different social networking site. Unfortunately, hackers have realized the potential of using apps for spreading malware and spam. And now days this problem is more critical, as our survey find that at least 13% of apps in our dataset are malicious. And due to this the research community has focused on detecting malicious posts and campaigns. In this paper, we took the survey of some social networking sites and application and malicious activity relates to it. Also we mention the different techniques to control malicious activities for different social networking sites like Twitter, Facebook. Keywords— Facebook Apps, Malicious Apps, Profiling Apps, Online Social Networks, Social Network Security, Spam profiles

IJERT-Review of Security Approaches for Social Networking

International Journal of Engineering Research and Technology (IJERT), 2014

https://www.ijert.org/review-of-security-approaches-for-social-networking https://www.ijert.org/research/review-of-security-approaches-for-social-networking-IJERTV3IS040614.pdf Social networking uses different applications and dedicated websites for the communication to the user located at remote site. People having similar interest are connected through social networking. Online social networking uses different websites. Such websites are called as social networking sites. Social networking creates community of interested users. Online communities shares hobbies, common interest, lifestyle, views, politics, and knowledge. Sharing will helps even reading the profiles of other users, commenting on status, contacting others users indirectly. Ultimately personal information of any user can be known by any other easily. Misuse of personal information disturbs the mental, physical, social, psychological state of mind of user. Economical loss is major impact .Rapid growth in social networking are responsible for giving rise to many attacks that are entering from cyber world to real life. Structural anomaly and psychological profiling helps to identify behavior of attacker. Using Psycho-linguistic cues deception is identified. Protection motivation theory helps to motivate online social networking user for safe surfing. Proposed incident handing framework helps learners to feel confident while online and alerts adults to manage secure online environment. All above approaches will helps social networking users to be secure in online environment.