top of page

LECTURE 10

         Today, I am going to  analyze about Social Networking Security. At first, you have to understand about security concept. Some service ask you to encrypt something. I will tell you about online Social Network, Mobile Social Network, Threats, Attacks and Defense Measures.

 

Online Social Networking

​         people can have an interaction with each other  by Online Social Networking. You can share some information or some interest and you also have your personal information. Nowadays, Google have an image searching and face detective. Therefore, the criminality are easy to happen because in the past, people can search only from the text but now they can search from your face detection. Normal communication is email or instant message exchanging. The famous Social Network such as Facebook, Twitter, Myspace, LinkedIn(link page between people who have more knowledge or professional) etc. Today, people usually pay attention with their mobile phone. For example, most people on the sky train in Bangkok do not talk to each other because they just only look and play on their mobile phone.

 

 

 

Online Social Popularity

        Facebook is the number one in searching today. Many people stuck in Facebook. About 900 million of people around the world use Facebook. Twitter is also popular. Around 340 million of people tweet the information and 175 million use LinkIn in over 200 countries.

 

 

 

Benefit of Online Social Network communication

          Social Network have advantage more that disadvantage. The last lecture I talk about the marketing and we can use Social Network for advertise or promote something. In order to sale something, you have to know the age or what kind of people who will use your produce. Social Network can support consumer. You can create some forum and corroborate with people, connect friends, play game together, collect the item. By the way, security is very important for those activity.

more information about marketing of Social Network.

 

Social Network Security Threats/Attacks

Malware: Mal= fault/wrong

Cyber harassment: copy your photo or cut your photo with someone else (sexual violent).

Stalking: snooping others

             The important is Online Social Networking is a "Shelf life". Shelf life is mean all information is already keep in shelf (Server will already keep it), you cannot recall. Even you delete the data but the data still in the server. By the way, if the storage is full but maybe your friend copy your photo. it is also call "Shelf life". Some information that you post maybe have an impact to others such as employment, insurance etc.

 

 

Online Social Network  Malware Distribution

Malware (Malicious software):  It is some kind of program that intend to do harm with your computer. It will reduce the resoure of the system or destroy the system. It can be virus, worm, trojan horse etc.

 

Koopface: It is a virus that come from the alternation of the word "Facebook". It will be sent from friend to friend by have an attractive story and invite to that website. The data that sent form Koopface is a fake data. The new virus version of Koopface is call "Boonana". It intend to destroy MAC OS X. The principle of Boonana will disguise into a message and wait for the victim to open it. For example, the message is "Is this you in the video". If the victim click to see the video, program java will bury a virus in the computer. 

 

Hoax:  It is some kind of virus that will disguise as a electronic mail. It will require victim to forward this electronic mail. The data in the electroic mail will be refer to the famous company to get the confidence.It will make the annoying for the victim. For example, the message is "Hotmail is now required to keep the service charge, if you want to get it free!! forward to 100 friends". Therefore, you must to reconsider your electronic mail totally.

 

 

Third Party Application

          The producer will be the first person. The comsumer will be the second person. The third person will have the centrol role between producer and consumer. The Third Party will act like a producer and also can be the competitor or supporter. For the competitor will not in a real losence. On the other hand, for the supporter will produce the plugin to make more ability of the program.

 

 

 

Online Social Network privacy and security

          Number of people who use internet were continue increasing. Website like Facebook, Twitter, LinkIn, Youtube, Google+ etc. make change to the intrnet. Therefore, we have to thinking much about the privacy and security. When you go to some website, a privacy mean that how the Social Network will keep or use the data about the user who visit at that website. Maybe the Socail Network collect your data in invisible mode. You will never know how they do. When you read the document of privacy, you must read from start to the end to clearly understand. If you want to cancle that Social Network, do not forget to delete your account. Find website address that you can have a voice concern. Therefore, you have to clearly understand and review about the privacy of that website.

 

 

URL Shorteners

          The short URL is a serious and dangerous things. Two years ago, when you hook somethings, you wll see a long URL. But right now you do not know the original source that you get from the short URL. If you are a developer and you feed data from another website, you must write source code that not allow the short URL in your website. Because short short URL will make your website fragile. The short URL can be a malware and hook the data from your website. If you are the facebook developer, you have to know how to block the short URL.

 

 

 

Organization Defense Measure

         - Create your password with the unique and strongly password. You should not use your birthday or the information that related to you in your password.

         - Set your sharing in "friend only" mode to protect the the stanger to see our sharing.

         - Set the browser to protect the anti-phishing(deceive the users to show theirs information)

         - Let the contact law enforcement

         - Make your website be the "web strust" ( make users believe in your website )

 

 

 

 

 

Reference

https://docs.google.com/viewer?a=v&q=cache:etInnyU23-gJ:www.cse.ohio-state.edu/~champion/4471/4471_social_network_security_handout.pdf+&hl=th&gl=th&pid=bl&srcid=ADGEESharkOXISA01qPj8P2uvVPIftNPSsJsaE-3K4yb_lYbMXoODA78CxuHiQPsuyqZB4DRc3UBNKKQjTR-ksL3TyJwp8rDYBr-q2XKzrNlb6Mt8lQwL4KPZnlelHwmpC0oM9s_dt00&sig=AHIEtbSYZFglXJBtNBi1uYoWTyN6NyaMsQ

http://boingboing.net/2009/04/04/why-url-shorteners-s.html

http://www.manager.co.th/Cyberbiz/ViewNews.aspx?NewsID=9530000153582

http://www.jabchai.com/main/view_joke.php?id=4554

https://www.privacyrights.org/social-networking-privacy#privacy-policy

What do you think ?

bottom of page