Fire et al., 2014 - Google Patents
Online social networks: threats and solutionsFire et al., 2014
View PDF- Document ID
- 16062062109794563841
- Author
- Fire M
- Goldschmidt R
- Elovici Y
- Publication year
- Publication venue
- IEEE Communications Surveys & Tutorials
External Links
Snippet
Many online social network (OSN) users are unaware of the numerous security risks that exist in these networks, including privacy violations, identity theft, and sexual harassment, just to name a few. According to recent studies, OSN users readily expose personal and …
- 230000001568 sexual 0 abstract description 15
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
- H04L51/04—Real-time or near real-time messaging, e.g. instant messaging [IM]
- H04L51/046—Real-time or near real-time messaging, e.g. instant messaging [IM] interacting with other applications or services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/54—Store-and-forward switching systems
- H04L12/58—Message switching systems, e.g. electronic mail systems
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Fire et al. | Online social networks: threats and solutions | |
Jain et al. | Online social networks security and privacy: comprehensive review and analysis | |
Rathore et al. | Social network security: Issues, challenges, threats, and solutions | |
Sahoo et al. | Classification of various attacks and their defence mechanism in online social networks: a survey | |
Al-Turjman et al. | Security in social networks | |
Almarabeh et al. | The impact of cyber threats on social networking sites. | |
Hamid et al. | Cyber security concerns in social networking service | |
Bhattacharya et al. | A comprehensive survey on online social networks security and privacy issues: Threats, machine learning‐based solutions, and open challenges | |
Sadeghian et al. | Security threats in online social networks | |
Hassan et al. | Digital Privacy and Security Using Windows: A Practical Guide | |
Deliri et al. | Security and privacy issues in social networks | |
Jethava et al. | Exploring security and trust mechanisms in online social networks: An extensive review | |
Bossetta | A simulated cyberattack on Twitter: Assessing partisan vulnerability to spear phishing and disinformation ahead of the 2018 US midterm elections | |
Adu Michael et al. | Mitigating cybercrime and online social networks threats in Nigeria | |
Alotaibi et al. | Threats, crimes and issues of privacy of users’ information shared on online social networks | |
Norman et al. | Security threats and techniques in social networking sites: a systematic literature review | |
Sharma et al. | Security analysis on social media networks via STRIDE model | |
Malagi et al. | A survey on security issues and concerns to social networks | |
Hudaib | Comprehensive social media security analysis & xkeyscore espionage technology | |
Al-Turjman et al. | Security in social networks | |
Kahimise et al. | An analysis of social networking threats | |
Sunhare et al. | Study of security vulnerabilities in social networking websites | |
Arora et al. | Threats to Security and privacy of Information due to growing use of social media in India | |
Kundu et al. | Analysis of security and privacy in social media platforms | |
Chaudhary et al. | Challenges in protecting personnel information in social network space |