[go: up one dir, main page]

Fire et al., 2014 - Google Patents

Online social networks: threats and solutions

Fire et al., 2014

View PDF
Document ID
16062062109794563841
Author
Fire M
Goldschmidt R
Elovici Y
Publication year
Publication venue
IEEE Communications Surveys & Tutorials

External Links

Snippet

Many online social network (OSN) users are unaware of the numerous security risks that exist in these networks, including privacy violations, identity theft, and sexual harassment, just to name a few. According to recent studies, OSN users readily expose personal and …
Continue reading at ieeexplore.ieee.org (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
    • H04L51/04Real-time or near real-time messaging, e.g. instant messaging [IM]
    • H04L51/046Real-time or near real-time messaging, e.g. instant messaging [IM] interacting with other applications or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/54Store-and-forward switching systems
    • H04L12/58Message switching systems, e.g. electronic mail systems

Similar Documents

Publication Publication Date Title
Fire et al. Online social networks: threats and solutions
Jain et al. Online social networks security and privacy: comprehensive review and analysis
Rathore et al. Social network security: Issues, challenges, threats, and solutions
Sahoo et al. Classification of various attacks and their defence mechanism in online social networks: a survey
Al-Turjman et al. Security in social networks
Almarabeh et al. The impact of cyber threats on social networking sites.
Hamid et al. Cyber security concerns in social networking service
Bhattacharya et al. A comprehensive survey on online social networks security and privacy issues: Threats, machine learning‐based solutions, and open challenges
Sadeghian et al. Security threats in online social networks
Hassan et al. Digital Privacy and Security Using Windows: A Practical Guide
Deliri et al. Security and privacy issues in social networks
Jethava et al. Exploring security and trust mechanisms in online social networks: An extensive review
Bossetta A simulated cyberattack on Twitter: Assessing partisan vulnerability to spear phishing and disinformation ahead of the 2018 US midterm elections
Adu Michael et al. Mitigating cybercrime and online social networks threats in Nigeria
Alotaibi et al. Threats, crimes and issues of privacy of users’ information shared on online social networks
Norman et al. Security threats and techniques in social networking sites: a systematic literature review
Sharma et al. Security analysis on social media networks via STRIDE model
Malagi et al. A survey on security issues and concerns to social networks
Hudaib Comprehensive social media security analysis & xkeyscore espionage technology
Al-Turjman et al. Security in social networks
Kahimise et al. An analysis of social networking threats
Sunhare et al. Study of security vulnerabilities in social networking websites
Arora et al. Threats to Security and privacy of Information due to growing use of social media in India
Kundu et al. Analysis of security and privacy in social media platforms
Chaudhary et al. Challenges in protecting personnel information in social network space