[go: up one dir, main page]

Lehrman, 2010 - Google Patents

The weakest link: the risks associated with social networking websites

Lehrman, 2010

View PDF
Document ID
7385187482032094575
Author
Lehrman Y
Publication year
Publication venue
Journal of Strategic Security

External Links

Snippet

The relatively rapid rise in popularity of social networking services is now well known. MySpace, Twitter, and Facebook have become well known sites and terms. According to the Web traffic tracking site Alexa. com, as of December 2009, Facebook had 350 million …
Continue reading at digitalcommons.usf.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/102Entity profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
    • H04L51/12Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages with filtering and selective blocking capabilities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/105Multiple levels of security

Similar Documents

Publication Publication Date Title
Zeebaree et al. Social media networks security threats, risks and recommendation: A case study in the kurdistan region
Swire et al. Encryption and globalization
US8645478B2 (en) System and method for monitoring social engineering in a computer network environment
Fontanilla Cybercrime pandemic
Afaq et al. A critical analysis of cyber threats and their global impact
Holt Situating the problem of cybercrime in a multidisciplinary context
AlMudahi et al. Social media privacy issues, threats, and risks
Okocha et al. Online social networks misuse, cyber-crimes and counter-mechanisms in Nigeria
Omar A world of cyber attacks (a survey)
Islam et al. Phishing attack detecting system using DNS and IP filtering
Brooks et al. Influence under siege: Safeguarding influencers from cyberthreats
Brooks et al. Influence under siege
Lehrman The weakest link: the risks associated with social networking websites
Adu Michael et al. Mitigating cybercrime and online social networks threats in Nigeria
Elnaim et al. The current state of phishing attacks against Saudi Arabia university students
Wojcicki Phishing attacks: preying on human psychology to beat the system and developing cybersecurity protections to reduce the risks
Norris Mitigating the effects of doxing
Sunhare et al. Study of security vulnerabilities in social networking websites
Dhanalakshmi et al. Detection of phishing websites and secure transactions
Kalio Phishing Attack: Raising Awareness and Protection Techniques
Alsubhi et al. Awareness of Security Threats in Social Media
Hasan et al. Impact of Cybercrime on Enterprises in Cloud Computing Environment: A Review
Arora et al. Threats to Security and privacy of Information due to growing use of social media in India
Beal Social Engineering insiders: threat analysis and mitigation techniques for the financial industry
Bolgouras et al. Enabling qualified anonymity for enhanced user privacy in the digital era