Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/324860729

Social Media Security Risks, Cyber Threats And Risks Prevention And
Mitigation Techniques

Article  in  International Journal of Advance Research in Computer Science and Management · May 2018

CITATIONS READS

22 22,781

2 authors:

Sunil Kumar Dr Vikas Somani


Amity University Sangam University
41 PUBLICATIONS   437 CITATIONS    22 PUBLICATIONS   28 CITATIONS   

SEE PROFILE SEE PROFILE

Some of the authors of this publication are also working on these related projects:

cyber security View project

“Effect of Milk Feeding in Human Volunteers” View project

All content following this page was uploaded by Sunil Kumar on 01 May 2018.

The user has requested enhancement of the downloaded file.


IJSART - Volume 4 Issue 4 – APRIL 2018 ISSN [ONLINE]: 2395-1052

Social Media Security Risks, Cyber Threats And Risks


Prevention And Mitigation Techniques
Dr. Sunil Kumar1, Vikas Somani2
1, 2
Assistant Professor Dept of Computer Science
1, 2
Sangam University, Bhilwara, Rajasthan

Abstract- A social network is a public structure made up of than 3 million clients were utilizing it. In 2003, MySpace was
people or associations called nodes, which are associated by lunched and in the next years numerous other social
at least one particular sorts of interdependency, for example, networking
friendship, normal interest, and interchange of fund,
connections of convictions, information or notoriety. A cyber Websites Were lunched, for example, Facebook in
threat can be unexpected and purposeful, directed or non- 2004, Twitter in 2006 and so forth. (See Figure 1) [1].
targeted, and it can originate from an assortment of sources,
including outside countries occupied with secret activities and There are such a large number of social networking
data fighting, criminals, programmers, hackers, virus code destinations and social media locales that there is even search
writer, displeased representatives and contractual workers engine for them [1]. Further, there are particular sites which
working inside an association. Social networking destinations enable clients to make their social networking websites.
are not only communicated with other individuals all
inclusive, yet additionally one successful route for business These social sites have constructive and negative
promotion. effects; such huge numbers of peoples waste most of their
time on utilizing these sites, which brings about losing their
In this paper, we research and concentrate the cyber employments or universities or even their normal social lives
threats in social networking sites. We experience the history of and families! Numerous others post copyrighted materials
online social sites, classify their types and also discuss the without authorizations, pornographic or banned contents. A
cyber threats, propose the anti-threats methodologies and portion of the users, smart users, utilize social networking sites
imagine the future patterns of such hoppy popular sites. in a positive manner; as happen now in the spring of entire
World!
Keywords- Social Network, Social Networking sites, Security,
Privacy, Cyber threats, mitigation techniques, Cyber Threats Usually, users commit numerous risks and errors
in Social Networking, Risks Prevention in Social Networking when utilizing social networks services, for example, utilizing
sites. unapproved programs, misuse of corporate PCs, unapproved
physical and network access, misuse of passwords and
I. INTRODUCTION exchange touchy data between their work and computers when
working at homes [3].
These days, many internet clients consistently visit a
large number of social site to continue connecting with their
companions, share their thoughts, photographs, recordings and
talk about even about their everyday life. Social networks can
be followed back to the main email which was sent in 1971
where two PCs were sitting ideal alongside each other. In
1987 Bulletin Board System exchanged information over
telephone lines with different clients and of late around the Figure 1: Total number of social networks users
same year the main copies of early web programs were
conveyed through Usenet. Geocities was the primary social The basic agenda is that the quantity of social
site established in 1994. Theglobe.com launched in 1995 and networking websites viewer and users is expanding step by
gave individuals the capacity of communicating with others, step (Ref. Figure 2), the quantity of attacks conveyed out by
customize and distribute their records on the Internet. In 1997, programmers or hackers to take personal data is additionally
the America on Line (AOL) Instant Messenger was lunched. raised. Hacked can be utilized for users information for many
In 2002, Friendster was lunched and within three months more reasons, for example, sending unapproved messages (spam),
Page | 125 www.ijsart.com
IJSART - Volume 4 Issue 4 – APRIL 2018 ISSN [ONLINE]: 2395-1052

taking cash from users accounts etc. The purpose for this the counter threats techniques. In Section 6, the future patterns
paper is to think about and analyze the present threats of social of social networks have been analyzed. In Section 7, we cover
network and develop measures to protect the identity in the the risks counteractive action and threats vulnerabilities. At
internet world. long last, we finished our paper with the conclusion at Section
8.

II. RELATED WORKS

The reputation of the term social networking sites has


been expanded since 1997, and a huge number of peoples now
are utilizing social networking sites to speak with their
companions, perform business and numerous different
utilizations as per the interest of the users.

The enthusiasm of social networking sites has been


expanded and numerous research papers have been
distributed. Some of them examined the security issues of
social networking, investigating the privacy and the threat the
online social networking sites.

The article [6] recognizes the security conduct and


Figure 2. Total number of social networks users (Rapleaf’s attitudes for social network users from various demography
data) gatherings and survey how these behaviors map aligned with
privacy in social networking applications.
In the now days The Internet, sorry to say, offers too
many ways to the virtual criminals and gives many ability to In the article [7], the researcher features the business
hack accounts on social network websites and the right now, and social advantages of safe and well-informed utilization of
there are large numbers of malicious series of programs that social networking sites. It underlines the most essential threats
objective to get the data from the social sites. (Ref: Figure 3) of the users and shows the major factors behind those threats.
In addition, it displays the policy and specialized proposals to
enhance privacy and security without agreement the
advantages of the data sharing through social networking sites.

In [9], creator tends to security issues; network and


security chiefs, which frequently swing to network policy
administration services, for example, firewall, interruption,
perfusion framework, antivirus and information lose. It tends
to security, framework to ensure partnership data against the
threats identified with social networking sites.

Likewise numerous other logical research papers


have been distributed [10, 11] where the new innovation and
methodologies were examined identified with the privacy and
security issues of social networking sites.
Figure 3: Number of malicious programs targeting popular
social networking sites III. TAXONOMY OF SOCIAL NETWORKS

The rest of the paper is composed as follows. Section Generally, a social network is a social structure made
2 outlines the related works on security and threats of social up of people or associations which are connected by at least
networking sites, In Section 3, we introduce the different kinds one particular sorts of interdependency, for example,
of social networks. We talk about and study the cyber threats fellowship, normal interest, and transfer of fund, connections
in social sites in Section 4. In Section 5, it has been prescribed of convictions, learning or esteem. Social networks can

Page | 126 www.ijsart.com


IJSART - Volume 4 Issue 4 – APRIL 2018 ISSN [ONLINE]: 2395-1052

likewise be characterized as those sites that empower bullying. Hackers make false profiles and copy identities or
individuals to frame online interchanges and trade a wide marks, or to defame a known individual inside a network of
range of information. It consists of the following. companions.

Initially, Social networking destinations, for example, V. ANTI THREATS STRATEGIES


MySpace, Facebook, Windows Live Spaces, Habbo, and so
more and the second Social media locales, for example, In this section we display the distinctive sorts of
Youtube, Flicker, Digg ,Metacafe, and so more. cyber threats in social networks and found the most of threats
occurs because of the components which are recorded as
IV. CYBER THREATS IN SOCIAL NETWORKING underneath:
WEBSITES
a) Most of the users are not worry with the significance
Recently, social networks attract thousands of users of the individual information declaration and in this
who represent potential victims to attackers from the manner they are under the danger of over revelation
following types (Ref: Figure 4) [3, 4]. and security invasions.
b) Users, who are aware of the threats, shockingly pick
Generally, a social network is a social structure made inappropriate protection setting and oversee security
up of people or associations which are connected by at least inclination appropriately.
one particular sorts of interdependency, for example, c) The approach and performing are not sufficiently
fellowship, recently, social networks pull in a huge number of furnished to manage a wide range of social networks
users who speak to potential victims to attackers. To start with threats which are increase step by step with more
Phishes and spammers who utilize social networks for sending difficulties, present day and modern advances.
fraudulent messages to victims "friend", Cybercriminals and
fraudsters who utilize the social networks for catching clients d) Lack of instruments and proper authentication system
information at that point completing their social-building to deal with and manage diverse security and
assaults and Terrorist gatherings and sexual stalkers who make protection issues.
online groups for spreading their considerations, purposeful
publicity, perspectives and leading enrollment. Due to the previously mentioned factors that reason
threats, we prescribed the following procedures for
Cyber threats that may the clients face can be circumventing threats related with social site:
arranged into two classes.
a) Building awareness the information divulgence:-
4.1.1 Privacy Related Threats clients most fare thee well and exceptionally
cognizant regarding the revealing of their own
Privacy concerns request that user profiles never information in profiles in social sites.
distribute and circulate data over the web. Assortment of data b) Encouraging awareness: - raising and instructive
on individual home pages may contain extremely personal battles: governments need to give and offer
information, for example, birth dates, places of residence, and instructive classes about awareness - raising and
individual cell numbers et cetera. This data can be utilized by security issues.
hackers who utilize social designing strategies to get c) Modifying the existing enactment: existing enactment
advantages of such delicate data and take cash. should be adjusted identified with the new innovation
and new fakes and assaults.
4.1.2. Traditional Networks Threats d) Empowering the authentication: - get to control and
authentication must be exceptionally solid so
Generally, there are two sorts of security issues: One cybercrimes done by programmers, spammers and
is the security of individuals. Another is the security of the other cybercriminals could be decreased however
PCs persons utilize and information they store in their system. much as could reasonably be expected.
Since social networks have huge quantities of clients and store e) Using the most capable antivirus tools: - clients must
huge measure of information, they are regular targets utilize the most capable antivirus tools with normal
spammers, phishing and malevolent assaults. Moreover, online updates and should keep the fitting default setting, so
social hackers incorporate wholesale fraud, phishing and that the antivirus tools could work all the more
hateful attacks and harms to individual respect and cyber successfully.

Page | 127 www.ijsart.com


IJSART - Volume 4 Issue 4 – APRIL 2018 ISSN [ONLINE]: 2395-1052

f) Providing appropriate security tools: - here, we offer VII. RISKS PREVENTION AND THREATS
proposal to the security software providers and is VULNERABILITIES
that: they need to offers some unique tools for clients
that empower them to evacuate their records and to In this Section, we supply with some essential
oversee and control the distinctive privacy and suggestions to enable social system networks to stay spare by
security issues. applying the followings:

VI. FUTURE TRENDS OF SOCIAL NETWORKING 1. Always have exceptionally solid passwords on your
WEBSITES messages and other social sites.
2. Limiting gave personal information in the social sites
In spite of the improvement and propelled as much as you can.
advancements in social networking sites modification, couples 3. Change your passwords consistently, with the goal
are recorded as beneath: that your information can be distant by programmers.
4. Provide with the minimum measure of information to
1. Requirement for more changes for social networks the site and internet because of the reputation of the
with the goal that they can enable users to deal with internet.
their profiles and connecting tools. 5. Don't confide in online others and don’t reply on
2. A requirement for joining and integration of social uncommon inquiries from obscure clients or
networks and future virtual universes. organizations i.e. be wary.
3. Needs for information integration from various 6. Check privacy policies and know about obscure
networks, i.e. recognizable proof of all substance messages and links gives by obscure clients.
identified with particular theme. This needs specific 7. To anticipate detecting messages address by
guidelines and refined innovation upheld by social spammer strategies, compose the email:
networks suppliers. xyz@hotmail.com as xyz at hotmail website.
4. Many social networks require standard application
programming interfaces, so clients can import and VIII. CONCLUSION
fare their profiling information by using standard
tools. (For instance, Facebook and Google have Although social networking sites offer propelled
connected new innovations that permit client technology of interaction and communication, they likewise
information versatility among social sites, raise new difficulties regarding privacy and security issues. In
representing another wellspring of rivalry among this paper, we quickly depicted the social networking sites,
social networking administration). compressed their scientific classification, and featured the
critical privacy and security issues giving some basic anti
We trust that sooner rather than later, one can by threats systems with the point of view without bounds of the
single sign-in usefulness use over sites, that is, the user IDs are social networking sites.
convenient to other sites.
We think that the headway of new technology as a
Also, virtual universes have distinct virtual economies and rule and social sites specifically will bring new security risks
money that in light of the trading of virtual commodities. that may show open doors for vindictive performing artists,
Diversions are one of the freshest and most well known online key lumberjacks, Trojan horses, phishing, spies, viruses and
application writes on social sites. Here, we need to specify the attackers. Information security professionals, government
significance of privacy and security to spare clients from officials and other intelligence officers must grow new tools
fraudsters who endeavor to take social networking that counteract and adjust to the future potential risks and
qualifications and online cash. threats. It can likewise securely control the colossal measure
of information in the internet and in the social sites too.
Finally, we need to say that the advances in the social
sites and cell phone utilization will impact on the growing of REFERENCES
using portable social networking by adding more highlights
and application to mobiles, as well as to social TVs for future [1] http://www.onlineschools.org/blog/history-of-social-
talk, email, gatherings, and video conferencing [5, 6]. networking/
[2] B. Stone, Is Facebook growing up too fast, The New York
Times, March 29, 2009.

Page | 128 www.ijsart.com


IJSART - Volume 4 Issue 4 – APRIL 2018 ISSN [ONLINE]: 2395-1052

[3] www.securelist.com, «”Instant” threats», Denis


Maslennikov, Boris Yampolskiy, 27.05.2008.
[4] Won Kim, Ok-Ran Jeong, Sang-Won Lee, "On Social
Websites”, Information Systems 35 (2010), 215-236.
[5] Kaven William, Andrew Boyd, Scott Densten, Ron Chin,
Diana Diamond, Chris Morgenthaler, " Social
Networking Privacy Behaviors and Risks" ,Seidenberg
School of CSIS, Pace University, White Plains, NY
10606, USA.
[6] Abdullah Al Hasib, “Threats of Online Social Networks",
IJCSNS, Vol. 9, No 11, November 2009.
[7] Anchises M. G. de Paula, “Security Aspects and Future
Trends of Social Networks", IJoFCS (2010) , 1, 60-79.
[8] D. Boyd, N. Ellison, Social network sites: definition,
history, and scholarship, Journal of Computer-Mediated
Communication 13 (1) (2007) article 11.
[9] Gilberto Tadayoshi Hashimoto, Pedro Frosi Rosa, Edmo
Lopes Filho, Jayme Tadeu Machado, A Security
Framework to Protect Against Social Networks Services
Threats, 2010 Fifth International Conference on Systems
and Networks Communications.
[10] “Data Loss Prevention Best Practices”,
http://www.ironport.com/pdf/ironport_dlp_booklet.pdf
05.20.2010.
[11] “The Real Face of KOOBFACE: The Largest
Web 2.0 Botnet Explained”, 05.19.2010.

Page | 129 www.ijsart.com

View publication stats

You might also like