Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Vulnerabilities of Social Networking Sites-An Open Attack Vector for Cyber Criminals


Affiliations
1 Centre of Excellence in Digital Forensics, University of Madras, Perungudi, Chennai, Tamil Nadu,, India
2 LNJN National Institute of Criminology and Forensic Science, Ministry of Home Affairs, Rohini, Delhi, India
     

   Subscribe/Renew Journal


A social networking service is an online service that focuses on facilitating the building of social networks or social relations among people who can share images, activities, backgrounds, or real-life connections. Once information is posted to a social networking site, it is no longer private. The more information shared, the more likely someone could impersonate the user and trick one of their friends into sharing personal information, downloading malware, or providing access to restricted sites. Predators, hackers, business competitors, and foreign state actors troll social networking sites looking for information or people to target for exploitation. Information gleaned from social networking sites may be used to design a specific attack that does not come by way of the social networking site. Users of online social media become victims for various types of cybercrimes; this may be due to the vulnerabilities present in the application. The advancement in technology provides the social networking sites to be user friendly and quick accessible but there are so many vulnerabilities that can make the users as victim to different types of cybercrimes. This article analysis the various vulnerabilities of social networking sites and how the attackers use this vulnerabilities to take control of the users account and their personal information. Social networking is a magnificent means to hook up with people, create new contacts, share what we familiar with others, and study new things. User must, on the other hand, be conscious of the fact that the web has its own fair share of good and bad components which pulls users to be victim of the vulnerabilities.

Keywords

Malicious Website, Privacy Issues, Social Networking Sites, SNS Vulnerabilities, Third Party Application.
Subscription Login to verify subscription
User
Notifications
Font Size


  • C. Fuchs, “Social media: A critical introduction,” Los Angeles: Sage, 2017.
  • S. B. Barnes, “A privacy paradox: Social networking in the United States,” First Monday, vol. 11, no. 9, 2006. Available:http://firstmonday.org/issues/issue11_9/barnes/index.html (Accessed May 10, 2013).
  • D. Boyd, “Why youth love social network sites: The role of networked publics in teenage social life MacArthur Foundation Series on Digital Learning- Youth, Identity, and Digital Media Volume (David Buckingham ed.). Cambridge, MA: MIT Press, 2004.
  • FBI Law Enforcement Bulletin. A Study on Cyber-stalking. Available: http://findarticles.com/p/articles/mi_m2194 /is_3_72/ai_99696472/. (Accessed August 9. 2013).
  • G. McMillan, “40% of social network users attacked by malware,” Available: http://techland.time.com/2011/03/23/40-of-social-network-users-attacked-by-malware/. (Accessed December 19, 2013).
  • M. Huber, S. Kowalski, M. Nohlberg, and S. Tjoa, “Towards automating social engineering using social networking sites,” Available: http://www.sba-research.org/wp-content/uploads/publications/2009- Huber-Towards Automating Social Engineering Using Social Networking Sites.pdf. (Accessed April 15, 2012).
  • Mad Irish.net. “Hacking Penetration Testing,” Available: http://www.madirish.net/? article=188, (Accessed October 8, 2013).
  • Symantec, Inc. “Symantec Intenet threat report - volume 16. Symantec.com,” Available: http://www. symantec.com/business/threatreport/index.jsp. (Accessed August 4, 2013)
  • C. Timm, R. Perez, and A. Ely, “Seven deadliest social network attacks,” Burlington, MA: Syngress/Elsevier, 2010.
  • S. Zalalichin, R. Efrati, and T. Cohen, “The social networking corporate threat,” Available: http://www.comsecglobal.com/FrameWork/Upload/TheSocialNetworkingCorporateThreatComsec.pdf. (Accessed April 15, 2012).
  • J. Pomerantz, and F. Stutzman, “Collaborative Reference Work in the Blogosphere,” Reference Services Review, vol. 34, no. 2, pp. 200-212, 2006.
  • M. Silic, and A. Back, “The dark side of social networking sites: Understanding phishing risks,” Computers in Human Behavior, vol. 60, no. C, pp. 35-43, July 2016.
  • M. Chewae, S. Hayikader, M. H. Hasan, and J. Ibrahim, “How much privacy we still have on social network?” International Journal of Scientific and Research Publications, vol. 5, no. 1, pp. 1-5, January, 2015.
  • Adgaonkar, A. and Shaikh, H. “Privacy in Online Social Networks (OSNs),” International Journal of Advanced Research in Computer Science and Software Engineering, vol. 5, no. 3, pp. 28-32, March 2015.
  • P. Tsantarliotis, E. Pitoura, and P. Tsaparas, “Troll vulnerability in online social networks,” The 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pp. 1394-1396, August, 2016.

Abstract Views: 386

PDF Views: 0




  • Vulnerabilities of Social Networking Sites-An Open Attack Vector for Cyber Criminals

Abstract Views: 386  |  PDF Views: 0

Authors

Thilagaraj Ramasubbu
Centre of Excellence in Digital Forensics, University of Madras, Perungudi, Chennai, Tamil Nadu,, India
G. Deepak Raj Rao
LNJN National Institute of Criminology and Forensic Science, Ministry of Home Affairs, Rohini, Delhi, India

Abstract


A social networking service is an online service that focuses on facilitating the building of social networks or social relations among people who can share images, activities, backgrounds, or real-life connections. Once information is posted to a social networking site, it is no longer private. The more information shared, the more likely someone could impersonate the user and trick one of their friends into sharing personal information, downloading malware, or providing access to restricted sites. Predators, hackers, business competitors, and foreign state actors troll social networking sites looking for information or people to target for exploitation. Information gleaned from social networking sites may be used to design a specific attack that does not come by way of the social networking site. Users of online social media become victims for various types of cybercrimes; this may be due to the vulnerabilities present in the application. The advancement in technology provides the social networking sites to be user friendly and quick accessible but there are so many vulnerabilities that can make the users as victim to different types of cybercrimes. This article analysis the various vulnerabilities of social networking sites and how the attackers use this vulnerabilities to take control of the users account and their personal information. Social networking is a magnificent means to hook up with people, create new contacts, share what we familiar with others, and study new things. User must, on the other hand, be conscious of the fact that the web has its own fair share of good and bad components which pulls users to be victim of the vulnerabilities.

Keywords


Malicious Website, Privacy Issues, Social Networking Sites, SNS Vulnerabilities, Third Party Application.

References