Security Issues on Social Network Assignment
Added on - 12 Oct 2019
IntroductionWhen it comes to privacy and security issues on social networks, "the sites most likely to sufferfrom issues are the most popular ones," Graham Cluley, Chief Technology Officer at UK techsecurity firm Sophos says. But security issues and privacy issues are entirely two differentbeasts. A security issue occurs when a hacker gains unauthorized access to a site's protectedcoding or written language. Privacy issues, those involving the unwarranted access of privateinformation, don't necessarily have to involve security breaches. Someone can gain access toconfidential information by simply watching you type your password. But both types of breachesare often intertwined on social networks, especially since anyone who breaches a site's securitynetwork opens the door to easy access to private information belonging to any user. But thepotential harm to an individual user really boils down to how much a user engages in a socialnetworking site, as well as the amount of information they're willing to share. In other words, theFacebook user with 900 friends and 60 group memberships is a lot more likely to be harmed by abreach than someone who barely uses the site.Security lapses on social networks don't necessarily involve the exploitation of a user's privateinformation. Take, for example, the infamous "Samy" MySpace XSS worm that effectively shutthe site down for a few days in October 2005. The "Samy" virus (named after the virus' creator)was fairly harmless, and the malware snarkily added the words "Samy Is My Hero" to the top ofevery affected user's MySpace profile page. A colossal inconvenience, naturally, but nobody'sidentity was stolen and no private information was leaked. In the end, the problem galvanized theMySpace team to roll up their sleeves and seriously tighten the site's security. Result: no majorbreak-ins since. Unfortunately, these kinds of breaches, purely for sport in "Samy's" case, arerare.The reason social network security and privacy lapses exist results simply from the astronomicalamounts of information the sites process each and every day that end up making it that mucheasier to exploit a single flaw in the system. Features that invite user participation — messages,invitations, photos, open platform applications, etc. — are often the avenues used to gain accessto private information, especially in the case of Facebook. Adrienne Felt, a Ph.D. candidate atBerkeley, made small headlines last year when she exposed a potentially devastating hole in theframework of Facebook's third-party application programming interface (API) which allows foreasy theft of private information. Felt and her co-researchers found that third-party platformapplications for Facebook gave developers access to far more information (addresses, pictures,interests, etc.) than needed to run the app.This potential privacy breach is actually built into the systematic framework of Facebook, andunfortunately the flaw renders the system almost indefensible. "The question for social networksis resolving the difference between mistakes in implementation and what the design of theapplication platform is intended to allow," David Evans, Assistant Professor of ComputerScience at the University of Virginia, says. There's also the question of whom we should holdresponsible for the over-sharing of user data? That resolution isn't likely to come anytime soon,says Evans, because a new, more regulated API would require Facebook "to break a lot of
applications, and a lot of companies are trying to make money off applications now." Felt agrees,noting that now "there are marketing businesses built on top of the idea that third parties can getaccess to data on Facebook."The problems plaguing social network security and privacy issues, for now, can only be resolvedif users take a more careful approach to what they share and how much. With the growth ofsocial networks, it's becoming harder to effectively monitor and protect site users and theiractivity because the tasks of security programmers becomes increasingly spread out. Imagine if aprison whose inmate count jumped froma few dozen to 250 million in less than five years onlyemployed 300 guards (in the case of MySpace). In response to the potential threats that users areexpose to, most of the major networks now enable users to set privacy controls for who has theability to view their information. But, considering the application loophole in Facebook,increased privacy settings don't always guarantee privacy. But even when the flawed API waspublicly exposed, "Facebook changed the wording of the user agreement a little bit, but nothingtechnically to solve the problem," says Evans. That means if a nefarious application developerwanted to sell the personal info of people who used his app to advertising companies, he or shecould.Yet users still post tons of personal data on social networks without batting an eye. It's onlynatural. Anonymity and the fact that you're communicating with a machine instead of an actualperson (or people in the case of social networking) makes sharing a lot easier. "People shouldjust exercise common sense online, but the problem with common sense is that it's not verycommon. If you wouldn't invite these people into your house to see your cat, you certainlywouldn't let them see pictures from holiday," says Cluley.In the end, the only tried and true solution to social network privacy and security issues is tolimit your presence altogether. Don't post anything you wouldn't mind telling a completestranger, because in reality that's the potential for access. Be careful who you add as a "friend,"because there's simply no way of verifying a user's actual identity online. Cluley compares it to arep from your company's IT department calling to ask for your login password — "Most peoplewill give it over" with no proof of the IT rep actually existing. The caller might be your IT rep,or she might not. "This kind of scam happens all the time," says Cluley. Friends on socialnetworks should know thatrealfriends should know personal information already, negating theneed to post it online.Will there ever be a security breach-free social network? Probably not. "Any complex system hasvulnerabilities in it. It's just the nature of building something above a certain level ofcomplexity," says Professor Evans. According to Felt, the best idea is a completely private socialnetwork. "It simply requires that there's no gossip in the circle, by which I mean one person whosets their privacy settings so low that third parties can use them to get to their friends.""Social networks are great fun, and can be advantageous but people really need to understandthat it's complicated world and you need to step wisely," Cluley says.
condition of limited access to a person. Privacy regulations can be defined as a set of rules orpolicies set by users to achieve a certain level of privacy. In terms of location privacy, privacyregulations restrict access to information on a user’s location. Each privacy rule or policy caninclude some restrictions (Sadeh& Hong 2009). Although there is no policy mandating onlinepersonal information privacy, some types of privacy solutions do exist (Passant et al. 2009).These solutions can be classified into: protective technologies, social awareness and legislativesupport. Protective technologies, such as strong authentication and access control, havedeveloped quickly and have evolved over time. These rely on encryption as a way to solveprivacy concerns. The second type of solution, social awareness, involves educating peopleabout the possible risks of personal information misuse when they provide data such as theirhome address and mobile phone number. Lastly, legislation can be enacted to clarify aspects ofthe agreement with users to protect the collection of personal information under the frameworkof the law (Campisi, Maiorana&Neri 2009).Since the inception of the first social networking site, SixDegrees.com at 1997 (Boyd andEllison, 2008), the social networking craze has grown beyond all expectations. Data privacy is afundamental problem in today's information era. Enormous amounts of data are collected bygovernment agencies, search engines, social networking systems, hospitals, financial institutions,and other organizations, and are stored in databases. Those stored information is very crucial forindividuals, people might misuse this information. The problems that exist in the real world suchas theft, fraud, vandalism also exists in online Web 2 environments an identity thief.According to consumer security risks survey 2014, is done by B2B International in conjunctionwith Kaspersky Lab shown that even using social networking is worldwide, but however thereare minority of them understanding the risks of using social networking especially in terms ofusing mobile device to access the sites. Correspondingly, more than 78% of correspondents didnot concern their information to be targeted by cyber-attacks or cyber-crime and they though thatno any dangerous with any activities on their social network. The survey also found that one often has ever conversed to anonymous person about personal information, while 15% sendingpersonal information which has not been exposed anywhere before through social network.Furthermore, 12 % of correspondents using public Wi-Fi to fill online account information, butonly 18% of them who concerned that their personal information disclosure is excessive or notand 7% seriously considered their communicating through social networking is one of majorfactor which information will be lose . Every social network sites ask users to accomplish aprofile which contains privacy information including name, address, email and so on. Throughthis information is claim to be danger which can be easily accessed by unexpected person  ,but what is happening today, most of social network users tend to public real identity and postprivate information where privacy will be raised . Accordingly,     , theydescribed that online social networking data is of great help to the researchers, analysts, and anykind of third party who has opportunity to mine and use data for particular purposes such asspamming, fishing, targeted advertising and so on . This is because sensitive information andtheir interaction are stored in social OSN server are not always honest and transparent due to thenature of OSN allows third parties to collect and analyze easily . Raji and her colleaguesdemonstrated that there are some principle privacy problems in social network like Facebook.
Most social networks offer privacy settings that are simple to use, but coarse. They often requirethe user to set the visibility for each profile item to either private, friends only, or public.Sometimes a few more options are given. In the end it boils down to a list of items and checkboxes to either opt-in or opt-out of disclosing these items to certain groups, limiting user control.Gross and Acquisti show in a case study that most users do not change the default privacysettings as provided by the OSN. Furthermore these users share a large amount of information ontheir profile. Tufecki  concludes in his case study that privacy-aware users are more reluctantto join social networks. However once a privacy aware user joins he is willing to disclose a lot ofinformation and a user’s privacy is regulated mostly through visibility, i.e. the privacy settings ofthe OSN (Online Social Networks). This privacy aware user aims to remain in control.Furthermore users are more pre-occupied with the current visibility of their information and donot look towards future implications. It seems that users implicitly trust social network providersto handle user data in a fair and conscientious way.Ahern, Eckles et al. (2007: 357) analysing the issue and conducting studies on Privacy Patternsand Considerations in online and mobile photo sharing claim: The growing amount of onlinepersonal content exposes users to a new set of privacy concerns. Digital cameras, and lately, anew class of camera phone applications that can upload photos or video content directly to theweb, make publishing of personal content increasingly easy. Privacy concerns are especiallyacute in the case of multimedia collections, as they could reveal much of the user’s personal andsocial environment.Online social network privacyGeorge (2006) cited the case of US college athletes whose pictures, which they posted online,were misused by a website, which publishes stories about scandals in sport. The author pointedout that the issue of privacy has not gone unnoticed by social network providers. Gross andAcquisti (2005) conducted a study on a sample of 4,000 students from Carnegie MellonUniversity who use social network accounts. They found that a large proportion of students didnot care about the privacy risks that might increase the chance of a third party misusing astudent’s personal information. Another study by the same authors claimed that more than 77percent of the respondents did not read privacy policies (Acquisti& Gross 2006). The ability tocontrol privacy options is essential to increasing the users’ confidence in their social networkproviders. Since Internet users represent a range of different cultures and ages, privacy optionsshould be clear, simple and easy to use. Users must have the ability to control their privacyoptions at any time. These privacy options allow users to accept or reject the dissemination oftheir information to others. For example, some users do not want to publish sensitive informationsuch as health or medical information (Samavi&Consens 2010). These users are aware thatpeople with less than honourable intentions can harm adults or children by misusing theirpersonal information. A study conducted by Casarosa (2010) found that minors are interested innew technologies and the Internet, and can be contacted by strangers online asking to form afriendship. When a website publishes the personal information of a minor without giving thechild’s parents (or the child’s guardian) the authority to select privacy options, potentialpredators can use some of the minor’s personal information, such as a mobile phone number, toengage in sexual contact (Casarosa 2010).