Lehrman, 2010 - Google Patents
The weakest link: the risks associated with social networking websitesLehrman, 2010
View PDF- Document ID
- 7385187482032094575
- Author
- Lehrman Y
- Publication year
- Publication venue
- Journal of Strategic Security
External Links
Snippet
The relatively rapid rise in popularity of social networking services is now well known. MySpace, Twitter, and Facebook have become well known sites and terms. According to the Web traffic tracking site Alexa. com, as of December 2009, Facebook had 350 million …
- 241001669679 Eleotris 0 abstract description 3
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/102—Entity profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
- H04L51/12—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages with filtering and selective blocking capabilities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/105—Multiple levels of security
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Zeebaree et al. | Social media networks security threats, risks and recommendation: A case study in the kurdistan region | |
| Swire et al. | Encryption and globalization | |
| US8645478B2 (en) | System and method for monitoring social engineering in a computer network environment | |
| Fontanilla | Cybercrime pandemic | |
| Afaq et al. | A critical analysis of cyber threats and their global impact | |
| Holt | Situating the problem of cybercrime in a multidisciplinary context | |
| AlMudahi et al. | Social media privacy issues, threats, and risks | |
| Okocha et al. | Online social networks misuse, cyber-crimes and counter-mechanisms in Nigeria | |
| Omar | A world of cyber attacks (a survey) | |
| Islam et al. | Phishing attack detecting system using DNS and IP filtering | |
| Brooks et al. | Influence under siege: Safeguarding influencers from cyberthreats | |
| Brooks et al. | Influence under siege | |
| Lehrman | The weakest link: the risks associated with social networking websites | |
| Adu Michael et al. | Mitigating cybercrime and online social networks threats in Nigeria | |
| Elnaim et al. | The current state of phishing attacks against Saudi Arabia university students | |
| Wojcicki | Phishing attacks: preying on human psychology to beat the system and developing cybersecurity protections to reduce the risks | |
| Norris | Mitigating the effects of doxing | |
| Sunhare et al. | Study of security vulnerabilities in social networking websites | |
| Dhanalakshmi et al. | Detection of phishing websites and secure transactions | |
| Kalio | Phishing Attack: Raising Awareness and Protection Techniques | |
| Alsubhi et al. | Awareness of Security Threats in Social Media | |
| Hasan et al. | Impact of Cybercrime on Enterprises in Cloud Computing Environment: A Review | |
| Arora et al. | Threats to Security and privacy of Information due to growing use of social media in India | |
| Beal | Social Engineering insiders: threat analysis and mitigation techniques for the financial industry | |
| Bolgouras et al. | Enabling qualified anonymity for enhanced user privacy in the digital era |