Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available

(844.69KB)
This is an Open Access publication published under CSC-OpenAccess Policy.
Publications from CSC-OpenAccess Library are being accessed from over 74 countries worldwide.
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Adam Ali.Zare Hudaib
Pages - 97 - 158     |    Revised - 10-07-2014     |    Published - 10-08-2014
Volume - 8   Issue - 4    |    Publication Date - August 2014  Table of Contents
MORE INFORMATION
KEYWORDS
XKeyscore, Social Media Security, Privacy, TFC, Cyber Threats.
ABSTRACT
Social networks can offer many services to the users for sharing activities events and their ideas. Many attacks can happened to the social networking websites due to trust that have been given by the users. Cyber threats are discussed in this paper. We study the types of cyber threats, classify them and give some suggestions to protect social networking websites of variety of attacks. Moreover, we gave some antithreats strategies with future trends.
1 Google Scholar 
2 CiteSeerX 
3 refSeek 
4 Scribd 
5 SlideShare 
6 PdfSR 
1 Key Facts - Facebook Newsroom. Internet: http://newsroom.fb.com/Key-Facts (Jan, 2014).
2 Joinson, A. “Looking at”, “looking up” or “keeping up with” people?: Motives and use of Facebook. In Proc. CHI 2008, ACM (2008), pp.1027-1036.
3 Spiliotopoulos T., Oakley I. Understanding Motivations for Facebook Use: Usage Metrics,Network Structure, and Privacy. Internet: http://tasosspiliotopoulos.com/publications_assets/CHI13-Spiliotopoulos-FacebookMotivations.pdf(May, 2014).
4 Lampe, C., Vitak, J., Gray, R., and Ellison, N. Perceptions of facebook’s value as an information source. In Proc. CHI 2012, ACM (2012).
5 Lampe, C., Wash, R., Velasquez, A., and Ozkaya, E. Motivations to participate in online communities. In Proc. CHI 2010, ACM (2010), pp.1927–1936.
6 Katz, E., Gurevitch, M., and Haas, H. On the use of the mass media for important things.American Sociological Review 38, (1973), pp.164-181.
7 Ikhalia E.J. A New Social Media Security Model (SMSM). International Journal of Emerging Technology and Advanced Engineering Website: www.ijetae.com (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 3, Issue 7, July 2013).
8 Imafidon, C.O, Ikhalia, E. The investigation and implementation of social media security?.Proceedings of the 2nd global conference, London on communication information science and engineering (2013).
9 Devmane, M. A., Rana, N. K. Security Issues of Online Social Networks?. Advances in Computing, Communication, and Control Communications in Computer and Information Science. 361 (1), pp. 740-746 (2013).
10 Lenkart, J. J. The Vulnerability of Social Networking Media and the Insider Threat: New Eyes for Bad Guys?. MA Thesis. Monterey, California: naval postgraduate school (2011).
11 Kumar, A., Gupta, S.K., Rai, A. K. ,Sinha, S. Social Networking Sites and Their Security Issues?. International Journal of Scientific and Research Publications, Volume 3, Issue 4,April 2013, pp.1-5.
12 Kontaxis, G., Polakis I., Ioannidis S., Markatos, E.P. Detecting Social Network Profile Cloning. 3rd International Workshop on Security and Social Networking, pp.295-300 (2011).
13 Alexa. Facebook.com—site info from Alexa. Internet:http://www.alexa.com/siteinfo/facebook.com (May, 2014).
14 Bailey, J. Life in the fishbowl: Feminist interrogations of webcamming. In Lessons from the identity trail: Anonymity, privacy and identity in a networked society. Oxford: OUP, pp. 283–301 (2009).
15 Benkler, Y. Through the looking glass: Alice and the constitutional foundations of the public domain. Law and Contemporary Problems, 66, pp. 173–224 (2003).
16 Hull G. Contextual gaps: privacy issues on Facebook. Ethics Inf Technol (2011), pp.289-302.
17 Lipford, H. R., Hull, G., Latulipe, C., Besmer, A., & Watson, J. Visual flows: Contextual integrity and the design of privacy mechanisms on social network sites. In Proceedings of the Workshop on Security and Privacy in Online Social Networking, IEEE International Conference on Social Computing (SocialCom) (Aug, 2009).
18 Keelty M. Social Media, Privacy and Security: Identifying and managing the public policy risks. Internet:https://crawford.anu.edu.au/public_policy_community/workshops/social_media_privacy_and_security/Social_Media_Privacy_and_Security_summary.pdf (May,2014).
19 Magid L. Facebook Groups Can Jeopardize Privacy. Internet:http://www.cubagreenscreen.com/forum/showthread.php?tid=10731, accessed (2010).
20 Yahoo Finance (2011). Apple slammed over iPhone, iPad location tracking (April, 2014).
21 World Facebook connections (2010). Internet: http://mashable.com/2010/12/13/facebookmembersvisualization/?utm_source=feedburner&utm_medium=email&utm_campaign=Feed %3A+Mashable+%28Mashable%29 (April, 2014).
22 Acquisti A., Gross R. Imagined Communities:Awareness, Information Sharing, and Privacy on the Facebook. Privacy Enhancing Technologies Workshop (PET), 2006.
23 Parker, R.: Alcohol policy violated. Kansan.com February 28 (2006)
24 Youngwood, S.: Networking by the ‘book’. The Times Argus February 26 (2006).
25 Kharif, O.: Big brother is reading your blog. BusinessWeek online February 28 (2006).
26 Gross, R., Acquisti, A.: Privacy and information revelation in online social networks. In:Proceedings of the ACM CCS Workshop on Privacy in the Electronic Society (WPES ’05).(2005).
27 D. boyd: Reflections on friendster, trust and intimacy. In: Intimate (Ubiquitous) Computing Workshop – Ubicomp 2003, October 12-15, Seattle, Washington, USA. (2003).
28 D. boyd: Friendster and publicly articulated social networking. In: Conference on Human Factors and Computing Systems (CHI 2004), April 24-29, Vienna, Austria. (2004).
29 Donath, J., D. boyd: Public displays of connection. BT Technology Journal 22 (2004) 71–82.
30 Liu, H., Maes, P.: Interestmap: Harvesting social network profiles for recommendations. In:Beyond Personalization - IUI 2005, January 9, San Diego, California, USA. (2005).
31 Social Media Compliance Policy. Internet:http://www.liv.ac.uk/media/livacuk/computingservices/regulations/socialmediapolicy.pdf(2014).
32 Omar Saeed Al Mushayt. Threats and Anti-threats Strategies for Social Networking Websites. International Journal of Computer Networks & Communications (IJCNC) Vol.5,No.4, July.
33 Social networking sites searchengine. Internet: /http://findasocialnetwork. com/search.php.
34 B. Stone. Is Facebook growing up too fast. The New York Times (March 29, 2009).
35 “Using Facebook to Social Engineer Your Way Around Security”. Internet:http://www.eweek.com/c/a/Security/Social-Engineering-Your-Way-Around-Security-WithFacebook-277803/(2010).
36 Won Kim , Ok-Ran Jeong, Sang-Won Lee. On Social Websites. Information Systems 35(2010), pp.215-236.
37 Facebook Delays New Privacy Policy. Internet:http://bits.blogs.nytimes.com/2013/09/05/facebook-delays-new-privacypolicy/?_php=true&_type=blogs&_php=true&_type=blogs&_r=1(2014).
38 Daniele Quercia. Facebook and Privacy: The Balancing Act of Personality, Gender, and Relationship Currency. Internet:http://www.aaai.org/ocs/index.php/ICWSM/ICWSM12/paper/viewFile/4613/4997 (2014).
39 Social media and the law: A handbook for UK companies. Internet:http://www.linklaters.com/Publications/Social-media-law-A-handbook-UKcompanies/Pages/Index.aspx(2014).
40 Lars Kaczmirek. Social Media Monitoring of The Campaigns for the 2013 German Bundestag Elections on Facebook and Twitter. Internet: http://arxiv.org/abs/1312.4476(2014).
41 Glenn Greenwald. XKeyscore: NSA tool collects 'nearly everything a user does on the internet' Internet: http://www.theguardian.com/world/2013/jul/31/nsa-top-secret-programonline-data/print(2013).
42 Staff. XKeyscore Presentation from 2008 – Read in Full. The Guardian (July 31, 2013).
43 Norddeutscher Rundfunk. Snowden Interview Transcript. (27 January 2014).
44 Gallagher, Sean. NSA's Internet Taps Can Find Systems to Hack, Track VPNs and Word Docs – X-Keyscore Gives NSA the Ability to Find and Exploit Vulnerable Systems. Ars Technica. (August 4, 2013).
45 Mr Snowden interview. Internet: http://www.tagesschau.de/snowden-interviewenglisch100.pdf(2014).
46 Dulles, Allen Welsh. The Craft of Intelligence, New York: Harper&Row (1963).
47 European Commission. Proposal for a General Data Protection Regulation (2011).
48 European Commission. Proposal for a General Data Protection Regulation, 25.1.2012, COM(2012).
49 European Commissioner - Reding, Viviane, Letter to the Attorney General, Ref. Ares (2013).
50 European Data Protection Supervisor - Hustinx, Peter. Data Protection and Cloud Computing Under EU Law, speech, Third European Cyber Security Awareness Day, BSA,European Parliament, 13 April 2010, Panel IV: Privacy and Cloud Computing.
51 The US surveillance programmes and their impact on EU citizens' fundamental rights.Internet:http://www.europarl.europa.eu/meetdocs/2009_2014/documents/libe/dv/briefingnote_/briefin gnote_en.pdf (2014).
52 White noise: An idea to defend privat sphere against XKeyscore. Internet:http://futuretechblog.com/?p=266 (2014).
53 Markus Ottela. TFC. Internet: http://www.cs.helsinki.fi/u/oottela/TFC.pdf (2014).
54 Report: NSA XKeyscore program allows access to emails, chats without warrant. Internet:http://thehill.com/policy/technology/314659-report-nsas-xkeyscore-program-allowswarrantless-internet-monitoring(2014).
55 Researcher argues for open hardware to defend against NSA spying. Internet:http://www.csoonline.com/article/2134047/network-security/researcher-argues-for-openhardware-to-defend-against-nsa-spying.html(2014).
56 Michael Fire. Online Social Networks: Threats and Solutions (2014).
57 Pritam Gundecha. Exploiting Vulnerability to Secure User Privacy on a Social Networking Site. Internet:http://www.researchgate.net/publication/220272037_Exploiting_vulnerability_to_secure_user_privacy_on_a_social_networking_site/file/5046351a386dceb101.pdf (2014).
58 How to Protect Yourself against Online Spying, NSA PRISM/Fairview can spy on anyone.Internet: http://davidpapp.com/2013/09/05/how-to-protect-yourself-against-online-spyingnsa-prismfairview-can-spy-on-anyone/(2014).
Mr. Adam Ali.Zare Hudaib
Licensed Penetration Tester Certified Ethical Hacker Network Security Defence Research &Troubleshooting CEH , ECSA , LPT , WCNA Poland - Poland
adamhudaib@gmail.com