logo

Information System Security in Facebook

   

Added on  2023-06-13

6 Pages2540 Words177 Views
 | 
 | 
 | 
Running head: INFORMATION SYSTEM SECURITY IN FACEBOOK
Information System Security in Facebook
Name of the Student
Name of the University
Authors Note
Information System Security in Facebook_1

1INFORMATION SYSTEM SECURITY IN FACEBOOK
Introduction
Facebook is a most popular social media that has garnered popularity all over the world.
However, there are security issues with Facebook that are discussed in this research paper
(Zlatolas et al., 2015). The information security concepts that are examined in this research paper
are confidentiality, integrity, availability, non-repudiation, authentication and authorization
related to Facebook. The given information security concepts are necessary to prevent
information of Facebook from being corrupted, unauthorized access and modified. The purpose
of this research paper is to analyze the information security concepts related to Facebook along
with the challenges posed by this concepts.
Discussion
Registration and login
The registration and login in Facebook gives authority to the user to be a member in
Facebook or use their account. The social login is the aspect of registration and login in
Facebook (Wang et al., 2014). The registration and login in Facebook uses basic information
every time an individual log in and the issues related with Facebook are given in the following
paragraph.
The issues in Facebook due to social login aspect in terms of confidentiality, integrity,
availability, non-repudiation, authentication, and authorization are as follows. The confidentiality
issue in Facebook are concerns that sensitive information of users can be collected by the
Facebook (Miron & Ravid, 2015). This can result in data breach where hackers can hack
Facebook and misuse the data and Facebook through collects sensitive data shows that there are
issues with it. The integrity issue in Facebook is that anonymously searching on Facebook can be
dangerous as attackers can identify the user and its data that can be misused (Gritzalis et al.,
2014). The availability issue in Facebook is that the users always do not make difficult
passwords to login in Facebook as they find it difficult to remember the password. This poses
issues that people can be attacked using simple hacking technique (Zhang et al., 2014). The non-
repudiation issue in Facebook is that users can be attacked with real-time proxy where there is
less control on losing of data. This is a serious issue where users are on a verge of loss of data.
The authentication issue in Facebook is that the encryption of text or data in Facebook can be
broken and stole to view the text or message (White, 2016). This proves that there is limited
scope of safety of messages and data in Facebook. The authorization issue in Facebook is that
people with multiple accounts can have issues related to authorization where the userid is
sometimes not reliable to access Facebook.
Access Control
The access control model in Facebook is a systemization of composed polices that are
based on a particular set of functions and features in the information system. This model
facilitates regulation and authorization to access data (Oh et al., 2016). The most important
access model is access model based on consulting access policies. This access control model is
important in Facebook due to various factors. Facebook has lots of people and some of them are
real and some are fake. However, there are several issues that arise due to consulting access
policies. They are described in the following paragraph.
The issues in Facebook due to consulting access policies, in terms of confidentiality,
integrity, availability, non-repudiation, authentication and authorization are as follows. The
Information System Security in Facebook_2

2INFORMATION SYSTEM SECURITY IN FACEBOOK
confidentiality issue in Facebook can be explained through an example of a new client dealing
with the company (Hajli & Lin, 2016). The new client is dealing with the company but somehow
the deal does not resulted any profit. The company’s manager will be curious to find the
employee on Facebook to know about him/her personal life. This shows that there is
confidentiality issue where a person requires to check a person on Facebook to know about
him/her only for personal reasons (Kang et al., 2015). The integrity issue in Facebook can be
explained by the example of a firm. A firm’s owner asked his staff to get maximum likes for his
firm and workers tried to make a fake page to like the firm by clicking a button. This shows that
Facebook has integrity issue where fake and real cannot be distinguished (Turban et al., 2017).
The availability issue in Facebook is that everything available on Facebook is sometimes not
correct or genuine. The attackers generate the fake pages or contents or links to trap users. The
availability issue in Facebook are also where online advertisement are whether criticized or
appreciated resulting in whether growth or decrease of company’s business (Nadeem et al.,
2015). The non-repudiation issue in Facebook are when a user is not able to verify its own
account on Facebook. The users make more than one account and it poses difficulty to identify
which one is real and which one is fake. The access to Facebook account poses an issue due to
non-repudiation as user can be affected due to fake people posing as the person from which a
user was expecting message in Facebook (Marwick & Boyd, 2014). The authentication issue in
Facebook is that it can affect people if they are not authenticated to do any further processes in
Facebook. The authentication issue poses problem as people can be breached if not authenticated
and their sensitive information will be lost (Townsend & Wallace, 2016). The authorization issue
in Facebook is that it can affect an individual in a way that user without authorization can be a
hacker who is trying to misuse Facebook and steal its information.
Secure Communication
The secure communication in Facebook is represented as messages going in and out of
Facebook. The secure communication in Facebook poses several issues due to the aspects that
communications may be secure or insecure (Watson & Rodrigues, 2018). There are several
issues of secure communication in Facebook that poses threats for privacy and security of
Facebook.
The issue in Facebook due to aspect of secure communication can be described in terms
of confidentiality, integrity, availability, non-repudiation, authentication, and authorization. The
confidentiality issue in Facebook is that insecure communication is not confidential completely
as it goes through third party providers in Facebook (Zhang, & Gupta, 2016). This poses issue
that communication through messages can be misused and publicized in very negative way. The
integrity issue in Facebook is that messages can be modified if attacked by any third party
causing major havoc (Gafni & Nissim, 2014). This will result in user getting wrong or
misleading information that can trap the user. The availability issue in Facebook is that messages
are available to third parties and they cannot be trusted whether they will be available in its
initial form to the recived person or in a modified way ((Fox-Brewster, 2016)). This issue poses
challenges for secure communication where there is no guarantee of available data to be original
if attacked by the hackers (Titcomb, 2017). The non-repudiation issue in Facebook is that the
communication in Facebook through messages or post can be impersonated to confuse the user
in the other end. This issue can confuse the other end user and they might get trapped in the
attackers messages where not only security or privacy issues are concerned but social issues such
as harassment can also occur (Kumar, Saravanakumar & Deepa, 2016). The authentication issue
Information System Security in Facebook_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Information about Cloud Computing Technology 2022
|4
|518
|11

Password Security and Prevention Techniques
|13
|2666
|254

Authenticated and Unauthenticated Attacks on Websites
|4
|591
|483

Information Technology | Question and Answer
|6
|1038
|15

MANAGING INFORMATION SYSTEMS.
|4
|440
|182

Assignment on Oracle Virtual Machine Installation
|16
|1480
|225