internet safety

internet safety | social network security – social network security issues | Security and Privacy issues in Social Networks

Privacy and security will be the big tech stories of 2018
Security and Privacy issues in Social Networks


As we know that this is the big concern in today’s world. Online social networks (OSNs) have become extremely popular in recent years. And their widespread adoption das led to the presence of huge volumes of user’s personal information on the internet.

The ever-increasing number of the users of the social network, on the other hand. Have encouraged the attacker to develop and use a different technique to collect and analyze such information for a number. Of malicious purposes, including spear-phishing attacks and identity theft.

Clearly, this trend represents a significant challenge for both users and administrators. The widespread adoption of OSNs has raised a wide range of security and privacy concern. Which have not been fully addressed yet. In many cases, users are not even aware of the disclosure of their personal information. Through their profiles. Leakage of a user’s private information can happen in different ways.

We also discuss different strategies and regulation that can prevent disclosure of private information through OSNs.

online social Networks Usages – social media security | social network privacy – social network security issues

social network security

Today many Osns have tens millions of registered users. Facebook, with more than a billion active users. Is currently the largest and most popular OSN in the world. Another word cloud of OSNs with more than 100 millions active users. Other users trust these OSNs and they have trust in the other users within these social networks. This trust leads to information sharing and to develop new relationships.

Moreover, according to recent studies, many OSN users expose personal and intimate details. About themselves, their friends and their relationships, whether by posting photos or by directly providing information. Such as a home address and a phone number, furthermore, according to boshmaf et al. and Yashar et al.

Facebook users have been shown to accept friendship requests from people whom they do not know. But with whom they simply have several friends in common. By accepting these friends requests, users unknowingly disclose their private information to total strangers.

This information could be used maliciously, harming users both in the virtual and in the real world. These risks escalate when the users are young children or teenagers. Who are by nature more exposed and vulnerable than adults.

internet safety | social network security – Security and Privacy issues in Social Networks | online safety – social media and privacy

THREATS – social media security risks | social media privacy

With the increased usage of OSNs, many users have unknowingly become exposed to threats both to their privacy and to their security. These can be divided into four main categories. The first category contains classic threats, namely, privacy, and security threats.

social network security issues

A. Classic threats

Classic threats have been problems ever since the internet gained widespread usage. Often referred to as malware, spam,cross-site scripting(XSS) attacks, or phishing, they continue to be an ongoing issue. Though these threats have been addressed in the past.

They have become viral due to the nature and structure of OSNs and can spread quickly among network users.

Classes threats can take advantages of a user’s personal information published in a social network to attack not only the user but also their friends simply by adjusting the threats to accommodate the user’s personal information.

B. modern threats

Modern threats are typically unique to OSN environments. usually, these threats specifically target users’ personal information as well as the personal information of their friends.

For example, an attacker who is trying to gain access to a Facebook user’s high school name-viewable only by the user’s facebook friends-can create a fake profile with pertinent details. And initial a friends request to the targeted user. if the user accepts the friend request to the targeted user.

If the user accepts the friend’s request, his or her details will be exposed to the attacker. alternatively, the attacker can collect data from the user’s Facebook friends and explore an inference attack to infer the high school name from the user’s Facebook friends and employ an inference attack to infer the high school name from the data collected from the user’s friends.

clickjacking: clickjacking is a malicious technique which tricks users into clicking on something different from what they intended to click. By using clickjacking, the attacker can human behaviors in OSNs. In many cases, fake profiles can be used to harvest users’ personal data from social networks.

By beginning friend request to other users into the OSN, who often accept the request, the socialbots can gather a user’s private data which should be exposed only to the user’s friends. Moreover, fake profiles can be used to initiate Sybil attacks, publish spam messages, or even manipulate OSN statistics. A recent article asserted that the market for buying fake followers and fake retweets is already.

C. combinations threats

Today’s attackers can also combine classic and modern threats in order to create a more sophisticated attack. For example, an attacker can use phishing attacks to collect a targetted user’s facebook password and then post a message containing a clickjacking attack on the target user timeline. Thus during the user’s Facebook friends to click on the posted message and install a hidden virus onto their own computer.

D. threats targeting children

Whether young children or teenagers, certainly experience the classic and modern threats we were discussed above. But there are also threats that intentionally and specifically target younger users of OSNs.

internet safety | online safety | social media and privacy – social network security issues

online safety


In recent year, social network operators, security companies, and academic researchers have tried to deal with above-mentioned threats by proposing a variety of solution.

Social Network Operator Solutions

OSN operators attempt to projects their users by activating safety measures. Such as employing user authentication mechanism and applying user privacy setting. Several of these techniques are describes in detail below.

Authentication mechanisms: in order to make sure the user registering or logging into the social network. Is a real person and not a socialbot or a compromised user account. OSN operators use authentication mechanisms, such as CAPTCHA, photos-of-friends identification, multi-factor authentication and in some cases even requesting that the user sends a copy of his or her government-issued ID.

As an example:

Twitter recently introduced its two-factor authentication mechanism, requiring the user to not only insert a password that was sent to the user’s mobile device.
This mechanism prevents a malicious user from logging in through hijacked accounts and publishing false information through those hijacked accounts.

Such a mechanism would thwart incidents such as when hackers hijacked the associated press twitter account. Resulting in the rapid propagation of false information about explosions in the white house, which caused panic on wall street.

Security and privacy settings: many OSNs support various configurable user privacy settings that enable users to protect their personal data from other users or application facebook users.

For example

can customize their privacy settings and choose which other users in the network (such as friends, friends of friends, and everyone) are able to view their details, pictures, posts and everyone) are ave to view their details, pictures posts, and other personal information.

A similar example of customizable privacy settings exists in google: users place each one f their friends into groups, also known as circles, such as best friends circle work circle and high school friends circle.

Using these circles, Google users can better protect their privacy by deliberately choosing which of their posts are exposed to each circle. Moreover, both Facebook and Google enable their users to approve or revoke the access of applications to the users’ personal data.

Some OSNs also support extra security configurations which enable the user to activate secure browsing, receive login activating the facebook immune system. The FIS is described as an adversarial learning system that performs real-time checks and classifications on read-and-write actions on Facebook’s database

Report users: OSN operators can attempt to protect young children and teenage users from harassment by adding an option to report abuse or policy violations by other users in the network. In some countries, social networks like startup companies, such as online permissions technologies, an open-source solution, such as NoScript security suite.

Internet security solutions: many security companies, such as AVG, Avira Kaspersky, Panda, McAfee, and Symantec, offer OSN USERS INTERNET SECURITY SOLUTION.

These software suites typically include anti-virus, firewall, and other internet protection layers which assist OSN users in shielding their computers against threats such as malware, clickjacking, and phishing attacks.

academic solutions:-

several recently published studies have proposed solutions to various OSN threats. These solutions have primarily focused on identifying malicious users and applications. In this section. We present studies which provide solutions for improving OSN users’ privacy setting” for detecting phishing, spammers, cloned and fake profiles, and software. And for presenting information and location leakage?

Academic solutions provide cutting-edge insight in dealing with social network threats. They can be used by OSN operators to improve their users’ security and privacy. By security companies to offer the customers better OSN protection, or by early-adopter OSN users who want to better protect themselves.


Please enter your comment!
Please enter your name here