CFP last date
20 January 2025
Reseach Article

Social Network and Security Issues: Mitigating Threat through Reliable Security Model

by A.a. Obiniyi, O. N. Oyelade, P. Obiniyi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 103 - Number 9
Year of Publication: 2014
Authors: A.a. Obiniyi, O. N. Oyelade, P. Obiniyi
10.5120/18099-9163

A.a. Obiniyi, O. N. Oyelade, P. Obiniyi . Social Network and Security Issues: Mitigating Threat through Reliable Security Model. International Journal of Computer Applications. 103, 9 ( October 2014), 1-7. DOI=10.5120/18099-9163

@article{ 10.5120/18099-9163,
author = { A.a. Obiniyi, O. N. Oyelade, P. Obiniyi },
title = { Social Network and Security Issues: Mitigating Threat through Reliable Security Model },
journal = { International Journal of Computer Applications },
issue_date = { October 2014 },
volume = { 103 },
number = { 9 },
month = { October },
year = { 2014 },
issn = { 0975-8887 },
pages = { 1-7 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume103/number9/18099-9163/ },
doi = { 10.5120/18099-9163 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:34:04.409802+05:30
%A A.a. Obiniyi
%A O. N. Oyelade
%A P. Obiniyi
%T Social Network and Security Issues: Mitigating Threat through Reliable Security Model
%J International Journal of Computer Applications
%@ 0975-8887
%V 103
%N 9
%P 1-7
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Social network sites have become de factor in establishing and maintaining good relationships across different continents and countries. Associations or connectivity has proven beneficial to people who share same interests professionally, research wise, in casual social connectivity, and companies have employed the social network in advancing their marketing strategies and it which have proven profitable. However, like other web applications that attract a great influx of visitors, the security of personal information of users in social network sites had suffered different security threats. This paper focuses on highlighting social network users on some security issues that are peculiar with social network. It proposes an algorithm and a model to circumventing security threats which are categorized into user authentication, data confidentiality and integrity.

References
  1. Al Hasib, A. , (2008). Threats of Online Social Networks, International Journal of Computer Science and Network Security (IJCSNS), Vol. 9 No. 11, 288?293.
  2. Boyd, M. D. and Ellison, B. N. , (2008). Social Network Sites: Definition, History, and Scholarship, Journal of Computer-Mediated Communication, Vol. 13, No. 1, pp. 210-230.
  3. Bernstein, J. http://socialmediatoday. com/jonathan-bernstein/1894441/social-media-stats-facts-2013. Retrieved on 9th June 2014.
  4. Bullas, J. (2013). http://www. jeffbullas. com/2013/07/ 04/5-insights-into-the-latest-social-media-facts-figures-and-statistics/ Retrieved on June 9, 2014.
  5. Buttyán, L. , and Hubaux, J (2007). Introduction to Cryptographic Algorithms and Protocols, http://secowinet. epfl. ch/ Retrieved on 2nd August 2014.
  6. Chi, M. and Wanner, R. , (2011). Security Policy and Social Media Use, SANS Institute InfoSec Reading Room. Retrieved from www. sans. org/reading-room/whitepapers/policyissues/reducing-risks-social-mediaorganization-33749 on August 9 2014.
  7. Cooper, B. B. (2013). Retrieved from www. huffingtonpost. com/belle-beth-cooper/10-surprising-social-medi_b_4325088. html on June 9, 2014.
  8. Dinerman, B. , (2011): Social Networking and Security Risks, http://www. fieldbrook. net/TechTips/Security/ SocialNetworking. asp Retrieved on August 9, 2014.
  9. ISACA (2010). Social Media: Business Benefits and security, Governance and Assurance Perpectives, Available at http://www. isaca. org/Knowledge-Center/Research/ResearchDeliverables/Pages/Social-Media-Business-Benefits-and-Security-Governance-and-Assurance-Perspectives. aspx
  10. Gunatilaka, D. , (2011). A survey of privacy and security issues in social networks, Retrieved from http://www. cse. wustl. edu/~jain/cse571-11/ftp/social/index. html on August 9 2014
  11. Wondracek , G. , Holz, T. , Kirda, E. , Kruegel, C. (2010). A Practical Attack to De-Anonymize Social Network Users, Security and Privacy, SP 2010 Proceedings of the IEEE Symposium on Security and Privacy, pp. 223-238.
  12. Hill, K. (2011). The Spy Who Liked Me. Retrieved from http://www. forbes. com/sites/kashmirhill/2011/11/02/the-spy-who-liked-me/ on 28 July 2014.
  13. Kim, H. J. , (2012). Online Social Media Networking and Accessing its Security Risks, International Journal of Security and Its Application, Vol. 6 No. 3, pp. 15-16.
  14. Kumar, A. , Gupta, K. S. , Rai, K. A. and Sinha, S. (2013). Social Networking Sites and their Security Issues, International Journal of Scientific and Research Publications, Vol. 3, No. 4, pp. 1-5.
  15. Saaty T. , (2008). Decision making with the analytical hierarchy process, International Journal of Services Sciences, vol. 1, no. 1, pp. 83-98.
  16. Sharma, R. , (2012): Analyzing the Role of Semantic web in Social Networking Sites, International Journal of Scientific Engineering Technology, Vol. 1 No. 3, pp. 125-131.
  17. Timm, M. D. and Duven, J. C. (2008). Privacy and Social Networking Sites, Available at www. interscience. wiley. com published online by Wiley InterScience,.
  18. Vanheuangdy, V. (2010). Security Threats of Web 2. 0 and Social Networking Sites, Retreived from http://uwcisa. uwaterloo. ca/Biblio2/Topic/ACC626%20Security%20Threats%20of%20Web%202%20and%20SNS%20V%20Vanheuangdy. pdf on August 9 2014.
  19. Qing, Liau Yun. Top 5 Social Networking Business Threats - Security - News. ZDNet Asia. Retrieved August 9 2014, from. http://www. zdnetasia. com/top-5-social-networking-business-threats-62060912. htm.
  20. Nguyen, H. , (2013). Research Report 2013 State of Social Media Spam, NextGate Publication, San Francisco. Retreived from http://nexgate. com/wp-content/uploads/2013/09/Nexgate-2013-State-of-Social-Media-Spam-Research-Report. pdf on August 9 2014.
  21. Mali J. Retrieved from http://www. lifehack. org/articles/technology/identity-theft-through-social- networking-lessons-take-now. html on 28 July, 2014.
  22. Slow PC. Retrieved from http://www. spamfighter. com/News-13034-Hackers-Prefer-SQL-Injection-Attack-Social-Networks-Websites. htm on 28 July, 2014.
  23. TrendMicro (2012). A Guide to Threats on Social Media, Trend Micro Incorporated, Internet Security Threat Report 2013. Symantec Cooperation Volume 18, pp. 45. http://www. trendmicro. com/us/security-intelligence/research-and-analysis/threat-reports/
  24. Wood, P. Phishing on Social Networks: What's the value of your small biz Twitter account? Looked up July 12, 2014. http://www. symantec. com/connect/blogs/ phishing-social-networks-what-s-value-your-small-biz-twitter-account
  25. Wondracek G. , Holz, T. ; Kirda, E. ; Kruegel, C. (2010). Published in: Security and Privacy (SP), 2010 IEEE Symposium Conference, pp. 223 – 238.
  26. ICT Facts and Figures, ITU, the world in 2014. Retrieved from https://www. itu. int/en/ITU-D/Statistics/Documents/facts/ICTFactsFigures2014-e. pdf on August 9, 2014.
  27. Zhang, Y. , Wang, X. , Luo, Q. , and Liu, Q (2013). Cross-Site Scripting Attacks in Social Network APIs. Retrieved from www. w2spconf. com/2013/papers/s3p1. pdf on July 28, 2014.
Index Terms

Computer Science
Information Sciences

Keywords

Social Network Sites (SNS) Security