2010 Fifth International Conference on Systems and Networks Communications 2010
DOI: 10.1109/icsnc.2010.36
|View full text |Cite
|
Sign up to set email alerts
|

A Security Framework to Protect against Social Networks Services Threats

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 1 publication
0
4
0
Order By: Relevance
“…Hacked information can be used for many purposes such as sending unauthorized messages (spam), stealing money from victim's accounts etc. The purpose of this paper is to study and analyze the current threats of social network and develop measures to protect the identity in cyberspace i.e., security of personal information and identity in social networks are studied [5][6][7][8][9][10][11]. The Internet today, unfortunately, offers to the cybercriminals many chances to hack accounts on social network sites and the number of malicious programs that target the social web sites is very huge.…”
Section: Figure 1 Social Network Compared By Usersmentioning
confidence: 99%
See 1 more Smart Citation
“…Hacked information can be used for many purposes such as sending unauthorized messages (spam), stealing money from victim's accounts etc. The purpose of this paper is to study and analyze the current threats of social network and develop measures to protect the identity in cyberspace i.e., security of personal information and identity in social networks are studied [5][6][7][8][9][10][11]. The Internet today, unfortunately, offers to the cybercriminals many chances to hack accounts on social network sites and the number of malicious programs that target the social web sites is very huge.…”
Section: Figure 1 Social Network Compared By Usersmentioning
confidence: 99%
“…In [11], author addresses security issues, network and security managers, which often turn to network policy management services such as firewall, intrusion, perfusion system, antivirus and data lose. It addresses security, framework to protect corporation information against the threats related to social networking web sites.…”
Section: Related Workmentioning
confidence: 99%
“…Further evolution of information security system models strengthened the tasks of the owner, who chose himself, that is, from a standard set of such security measures that in his opinion, could provide an acceptable level of security [21][22][23]. This was a significant step because it provided an information security system bond to a specific object with specific conditions for its existence as well as the contradictions associated with the information security system problem's self-sufficiency [24,25].…”
Section: Introductionmentioning
confidence: 99%
“…4) Cross-Site Scripting (XSS), identity theft, phishing, and social engineering attacks are common on OSN sites (Hashimoto et al, 2010).…”
Section: Security and Privacy Challengesmentioning
confidence: 99%