Home > CSC-OpenAccess Library > Manuscript Information
EXPLORE PUBLICATIONS BY COUNTRIES |
EUROPE | |
MIDDLE EAST | |
ASIA | |
AFRICA | |
............................. | |
United States of America | |
United Kingdom | |
Canada | |
Australia | |
Italy | |
France | |
Brazil | |
Germany | |
Malaysia | |
Turkey | |
China | |
Taiwan | |
Japan | |
Saudi Arabia | |
Jordan | |
Egypt | |
United Arab Emirates | |
India | |
Nigeria |
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Adam Ali.Zare Hudaib
Pages - 97 - 158 | Revised - 10-07-2014 | Published - 10-08-2014
MORE INFORMATION
KEYWORDS
XKeyscore, Social Media Security, Privacy, TFC, Cyber Threats.
ABSTRACT
Social networks can offer many services to the users for sharing activities events and their ideas. Many attacks can happened to the social networking websites due to trust that have been given by the users. Cyber threats are discussed in this paper. We study the types of cyber threats, classify them and give some suggestions to protect social networking websites of variety of attacks. Moreover, we gave some antithreats strategies with future trends.
Acquisti A., Gross R. Imagined Communities:Awareness, Information Sharing, and Privacy on the Facebook. Privacy Enhancing Technologies Workshop (PET), 2006. | |
Alexa. Facebook.com—site info from Alexa. Internet:http://www.alexa.com/siteinfo/facebook.com (May, 2014). | |
“Using Facebook to Social Engineer Your Way Around Security”. Internet:http://www.eweek.com/c/a/Security/Social-Engineering-Your-Way-Around-Security-WithFacebook-277803/(2010). | |
B. Stone. Is Facebook growing up too fast. The New York Times (March 29, 2009). | |
Bailey, J. Life in the fishbowl: Feminist interrogations of webcamming. In Lessons from the identity trail: Anonymity, privacy and identity in a networked society. Oxford: OUP, pp. 283–301 (2009). | |
Benkler, Y. Through the looking glass: Alice and the constitutional foundations of the public domain. Law and Contemporary Problems, 66, pp. 173–224 (2003). | |
D. boyd: Friendster and publicly articulated social networking. In: Conference on Human Factors and Computing Systems (CHI 2004), April 24-29, Vienna, Austria. (2004). | |
D. boyd: Reflections on friendster, trust and intimacy. In: Intimate (Ubiquitous) Computing Workshop – Ubicomp 2003, October 12-15, Seattle, Washington, USA. (2003). | |
Daniele Quercia. Facebook and Privacy: The Balancing Act of Personality, Gender, and Relationship Currency. Internet:http://www.aaai.org/ocs/index.php/ICWSM/ICWSM12/paper/viewFile/4613/4997 (2014). | |
Devmane, M. A., Rana, N. K. Security Issues of Online Social Networks?. Advances in Computing, Communication, and Control Communications in Computer and Information Science. 361 (1), pp. 740-746 (2013). | |
Donath, J., D. boyd: Public displays of connection. BT Technology Journal 22 (2004) 71–82. | |
Dulles, Allen Welsh. The Craft of Intelligence, New York: Harper&Row (1963). | |
European Commission. Proposal for a General Data Protection Regulation (2011). | |
European Commission. Proposal for a General Data Protection Regulation, 25.1.2012, COM(2012). | |
European Commissioner - Reding, Viviane, Letter to the Attorney General, Ref. Ares (2013). | |
European Data Protection Supervisor - Hustinx, Peter. Data Protection and Cloud Computing Under EU Law, speech, Third European Cyber Security Awareness Day, BSA,European Parliament, 13 April 2010, Panel IV: Privacy and Cloud Computing. | |
Facebook Delays New Privacy Policy. Internet:http://bits.blogs.nytimes.com/2013/09/05/facebook-delays-new-privacypolicy/?_php=true&_type=blogs&_php=true&_type=blogs&_r=1(2014). | |
Gallagher, Sean. NSA's Internet Taps Can Find Systems to Hack, Track VPNs and Word Docs – X-Keyscore Gives NSA the Ability to Find and Exploit Vulnerable Systems. Ars Technica. (August 4, 2013). | |
Glenn Greenwald. XKeyscore: NSA tool collects 'nearly everything a user does on the internet' Internet: http://www.theguardian.com/world/2013/jul/31/nsa-top-secret-programonline-data/print(2013). | |
Gross, R., Acquisti, A.: Privacy and information revelation in online social networks. In:Proceedings of the ACM CCS Workshop on Privacy in the Electronic Society (WPES ’05).(2005). | |
How to Protect Yourself against Online Spying, NSA PRISM/Fairview can spy on anyone.Internet: http://davidpapp.com/2013/09/05/how-to-protect-yourself-against-online-spyingnsa-prismfairview-can-spy-on-anyone/(2014). | |
Hull G. Contextual gaps: privacy issues on Facebook. Ethics Inf Technol (2011), pp.289-302. | |
Ikhalia E.J. A New Social Media Security Model (SMSM). International Journal of Emerging Technology and Advanced Engineering Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 3, Issue 7, July 2013). | |
Imafidon, C.O, Ikhalia, E. The investigation and implementation of social media security?.Proceedings of the 2nd global conference, London on communication information science and engineering (2013). | |
Joinson, A. “Looking at”, “looking up” or “keeping up with” people?: Motives and use of Facebook. In Proc. CHI 2008, ACM (2008), pp.1027-1036. | |
Katz, E., Gurevitch, M., and Haas, H. On the use of the mass media for important things.American Sociological Review 38, (1973), pp.164-181. | |
Keelty M. Social Media, Privacy and Security: Identifying and managing the public policy risks. Internet:https://crawford.anu.edu.au/public_policy_community/workshops/social_media_privacy_and_security/Social_Media_Privacy_and_Security_summary.pdf (May,2014). | |
Key Facts - Facebook Newsroom. Internet: http://newsroom.fb.com/Key-Facts (Jan, 2014). | |
Kharif, O.: Big brother is reading your blog. BusinessWeek online February 28 (2006). | |
Kontaxis, G., Polakis I., Ioannidis S., Markatos, E.P. Detecting Social Network Profile Cloning. 3rd International Workshop on Security and Social Networking, pp.295-300 (2011). | |
Kumar, A., Gupta, S.K., Rai, A. K. ,Sinha, S. Social Networking Sites and Their Security Issues?. International Journal of Scientific and Research Publications, Volume 3, Issue 4,April 2013, pp.1-5. | |
Lampe, C., Vitak, J., Gray, R., and Ellison, N. Perceptions of facebook’s value as an information source. In Proc. CHI 2012, ACM (2012). | |
Lampe, C., Wash, R., Velasquez, A., and Ozkaya, E. Motivations to participate in online communities. In Proc. CHI 2010, ACM (2010), pp.1927–1936. | |
Lars Kaczmirek. Social Media Monitoring of The Campaigns for the 2013 German Bundestag Elections on Facebook and Twitter. Internet: http://arxiv.org/abs/1312.4476(2014). | |
Lenkart, J. J. The Vulnerability of Social Networking Media and the Insider Threat: New Eyes for Bad Guys?. MA Thesis. Monterey, California: naval postgraduate school (2011). | |
Lipford, H. R., Hull, G., Latulipe, C., Besmer, A., & Watson, J. Visual flows: Contextual integrity and the design of privacy mechanisms on social network sites. In Proceedings of the Workshop on Security and Privacy in Online Social Networking, IEEE International Conference on Social Computing (SocialCom) (Aug, 2009). | |
Liu, H., Maes, P.: Interestmap: Harvesting social network profiles for recommendations. In:Beyond Personalization - IUI 2005, January 9, San Diego, California, USA. (2005). | |
Magid L. Facebook Groups Can Jeopardize Privacy. Internet:http://www.cubagreenscreen.com/forum/showthread.php?tid=10731, accessed (2010). | |
Markus Ottela. TFC. Internet: http://www.cs.helsinki.fi/u/oottela/TFC.pdf (2014). | |
Michael Fire. Online Social Networks: Threats and Solutions (2014). | |
Mr Snowden interview. Internet: http://www.tagesschau.de/snowden-interviewenglisch100.pdf(2014). | |
Norddeutscher Rundfunk. Snowden Interview Transcript. (27 January 2014). | |
Omar Saeed Al Mushayt. Threats and Anti-threats Strategies for Social Networking Websites. International Journal of Computer Networks & Communications (IJCNC) Vol.5,No.4, July. | |
Parker, R.: Alcohol policy violated. Kansan.com February 28 (2006) | |
Pritam Gundecha. Exploiting Vulnerability to Secure User Privacy on a Social Networking Site. Internet:http://www.researchgate.net/publication/220272037_Exploiting_vulnerability_to_secure_user_privacy_on_a_social_networking_site/file/5046351a386dceb101.pdf (2014). | |
Report: NSA XKeyscore program allows access to emails, chats without warrant. Internet:http://thehill.com/policy/technology/314659-report-nsas-xkeyscore-program-allowswarrantless-internet-monitoring(2014). | |
Researcher argues for open hardware to defend against NSA spying. Internet:http://www.csoonline.com/article/2134047/network-security/researcher-argues-for-openhardware-to-defend-against-nsa-spying.html(2014). | |
Social media and the law: A handbook for UK companies. Internet:http://www.linklaters.com/Publications/Social-media-law-A-handbook-UKcompanies/Pages/Index.aspx(2014). | |
Social Media Compliance Policy. Internet:http://www.liv.ac.uk/media/livacuk/computingservices/regulations/socialmediapolicy.pdf(2014). | |
Social networking sites searchengine. Internet: /http://findasocialnetwork. com/search.php. | |
Spiliotopoulos T., Oakley I. Understanding Motivations for Facebook Use: Usage Metrics,Network Structure, and Privacy. Internet: http://tasosspiliotopoulos.com/publications_assets/CHI13-Spiliotopoulos-FacebookMotivations.pdf(May, 2014). | |
Staff. XKeyscore Presentation from 2008 – Read in Full. The Guardian (July 31, 2013). | |
The US surveillance programmes and their impact on EU citizens' fundamental rights.Internet:http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/dv/briefingnote_/briefin gnote_en.pdf (2014). | |
White noise: An idea to defend privat sphere against XKeyscore. Internet:http://futuretechblog.com/?p=266 (2014). | |
Won Kim , Ok-Ran Jeong, Sang-Won Lee. On Social Websites. Information Systems 35(2010), pp.215-236. | |
World Facebook connections (2010). Internet: http://mashable.com/2010/12/13/facebookmembersvisualization/?utm_source=feedburner&utm_medium=email&utm_campaign=Feed %3A+Mashable+%28Mashable%29 (April, 2014). | |
Yahoo Finance (2011). Apple slammed over iPhone, iPad location tracking (April, 2014). | |
Youngwood, S.: Networking by the ‘book’. The Times Argus February 26 (2006). | |
Mr. Adam Ali.Zare Hudaib
Licensed Penetration Tester Certified Ethical Hacker Network Security Defence Research &Troubleshooting CEH , ECSA , LPT , WCNA Poland - Poland
adamhudaib@gmail.com
|
|
|
|
View all special issues >> | |
|
|