Satyam Rohit School of Computing, Informatics & Decision Systems Engineering Arizona State University srohit@asu.edu Privacy & Security Threats in Social Networks and Available Solutions: A Survey Abstract— As the importance and usage of social networks is rising faster these days, obviously the concerns regarding the privacy and security is also growing faster. Thus, we have investigated various privacy and security related threats in social networks. We have also surveyed various available solutions, which are being explored or being implemented in order to avoid the privacy and security threats in social networks these days. In addition to that we have also summarized the strength and weakness of each approach as per our understanding …show more content…
With the continuing increase of the usage of the OSN, the privacy and security threats/breaches are also growing at an alarming rate. Indeed almost all the social networking sites have some kind of mechanism, which is focused on dealing with these kinds of threats and breaches. Thus, we have taken liberty to summarize and analyze various security and privacy models present to deal with these issues. In order to do, so we have read multiple papers dealing with the privacy & security issues and after carefully understanding the ideas behind them, we have tried to come up with their strength and weakness and where they can be suitably used. II. OVERVIEW In this section, we will give an overview of our work while surveying. This section will primarily focus on brief details on Social Engineering, Identity Disclosure, Link Privacy, Attribute Disclosure and Privacy & Security of Involvers. Social Engineering is basically a tool for a hacker to gain sensitive information from a user by means of trick game or con game. More precisely, “Social engineering is a non- technical method that majorly relies on human weakness in interaction and is often used by the hackers to trick people for the purpose of information gathering, fraud or for gaining system access”. Social Engineering is mainly performed in order to gain sensitive information from a user but the motto may vary from user to user. Sometimes, it is more than just collecting the sensitive information. Social Engineering
It is shown, that one of the most prominent sources that prove a danger toward privacy, is through social media, specifically Facebook. This site alone
Although technology has provided tools to enhance our capabilities in things such as finding a missing person, solving murder cases based on technological assets etc.., this technology also leaves us vulnerable in many ways to slowly losing our privacy (Burten, C., 2012).
It is important to highlight and explain how we intend deal with crucial issues of the anonymity and protection of our respondents. We aim to use the examples of best practices by ensuring confidentiality and protection. With regard to the anonymity, we intend to encrypt indefinable data (name, address, Email address, telephone no. etc.), using pseudonyms and acronyms, which cannot be directly or indirectly traced back to them. We also intend to put security codes for digital records or by limiting access to these data. Furthermore, we intend to ensure the confidentiality by ensuring whatever their responses (verbally or written) will be kept safe and will not be used against them or their
Next I would like to speak about effective measures to protect data. Selection of security means should be based on an effective protection and meanwhile should be convenient. As advises article Anonymity for lazy people (2004, June
Social Media is a current way in which people are using to interact with one another daily. Since the launch of various Social Networking Sites (SNS) its been a huge attraction in a new way to share information with others and correspond with interests of your choice in many different forms. Although social media sites allow users to share information with friends and other sites on the internet, many people are unaware of how their privacy is getting out. Now that the expansion of global connection through these social media networking sites are so highly present in todays society, giving us easy access to information, the lack of one's privacy is being diminished. Everyday peoples privacy rights are
Appealing for social networks because of there is a capability to reach lots of consumers in networks that are online and it may skip detection methods and behavioral that aim to stop unsolicited contact that is wide-spread. Not as feeling is increased, if the sufferer sees the attacker, and a greater likelihood is that a social engineering attack is going to be successful [1].
Social networking sites continue to grow and evolve as technology advances. People of all ages are using social media to communicate with friends and family. Sites like Facebook, Twitter, Instagram, Snapchat, Pinterest, and LinkedIn make it easy to keep up with the latest gossip, news, relationship status, trends, etc. While social media has its pro’s and con’s, it also has another huge concern that a lot of people don’t think about and that’s privacy risks. What some people don’t realize is that when they post on social media, it’s easily accessible even after the information has been deleted. Anyone who posts on social networking sites is at risk whether it’s from a computer or mobile device. Therefore, one must protect their privacy from hackers to avoid being a victim of identity thief and other cyber-attacks. While there are several ways to manage privacy, the most powerful way is in the hands of the user. With social networking being a part of our daily lives and easily accessible to everyone, it’s important for one to take the appropriate steps to protect their privacy and not allow social behavior to influence privacy protection. When you think about privacy protection, think of the three C’s; post with caution, click with caution and take control of your own privacy.
Social networks have been increasingly used by people all over the world. Surging since the creation of Facebook which now has over one billion active users. These social networks are services that allow individuals to create an online profile and create their own group of friends with whom to share a connection. They also allow users to share ideas, pictures/videos, posts, events, activities and their interests with people in their chosen network. There are many different social networks providing the same basic service to anyone who wishes to use them, but also bringing the same problems and risks.
The growth and evolution of social media have influenced our social and business dynamics. We share more content than ever before in a bid to stay connected, we are less mindful of strangers and we sometimes feel invincible online. However, the level of connectivity offered by social media is quickly growing into our undoing. We are now more vulnerable than ever and this is a risk we cannot afford to take in this day and age when everyone with the know-how can hack into our accounts for their selfish benefits. With the increase in cybersecurity threats, and in this case, social media threats, it is important that we plug the holes and find ways to guarantee our safety online.
Social networking sites are currently the most popular and most accessed websites on the internet. According to Boshmaf et al. these websites have attracted more than a billion active users [1]. This is almost a seventh of the world’s population and attackers want to exploit this for their own personal gains.
In prior work, providing the privacy in mobile social networking sites, considered tools for protecting sensitive information in mobile social networks and testing methodology has used for better protection of sensitive information on social networks and provide the several ways for improve social network privacy. Unfortunately users have no control on sharing data outside their space that who can see their photo and who misuse of data. Now we are going to work on create the key generated work to give the better privacy in mobile social network. Through which users may be involved in the control of a large number of shared photos/data. We have faced many problems regarding social networking sites.
Abstract—In recent years social network has became pervasive all over the world, and smartphone plays an important role for individuals communication. Online social networking is a pervasive communication platform where users with smart- phones or website can search over the Internet and query neighboring peers to obtain the information they desired. We do research on main techniques that can protect user’s privacy and build robust and trustful application. Moreover, we deeply discuss the issues of online social network and the problem we face to. Future trends has also been discussed, we try to figure out a good way to build a trustful and solid social network.
Social networks are popular infrastructures for communication, relations, and information sharing on the internet, popularly known as social network such as My Space Twitter and Facebook supply communication, storage and social applications for hundreds of millions users. Users set up social links to friends and influence their social links to distribute content, organise measures for particular users or share resources, therefore, these social networks provide proposal for organising event users to users communication, and also between the internet’s most accepted destinations. Currently work has been seen as a form of group of socially improved applications that influence the correlation from social networks to improve security and performance of online social network applications as well as spam email improvement Garriss, (2006) On one hand, significant interactive with friends relationship are essential to developed confidence and trustworthiness in the system.
Introduction: The topic for this research proposal is violation of personal data in social network. This topic interests me because when I was playing Facebook, I have seen a lot of advertisements that relied on the websites I have accessed. I am curious why they knew what websites I have reached. Moreover, I am keen on information technology, which the major I would like to complete my master 's degree. And I used to work as marketing analyst, where I usually associated with numerous data relating to personal information. Indeed, there are a lot of people who do not realize that they are being tracking and collecting their personal information without any permission. I hope my research will help them being cognizant of their privacy in the era of globalization by the research I will be working on it.
All around the world people are using Social Media to create large online social networks and the sizes of these networks are continuously increasing. It is estimated that by the year 2018, 2.44 billion people will be using social networks. The growing desire and demand of social networks is not just removing our communication