International Journal of Scientific & Engineering Research, Volume 5, Issue 11, November-2014 986
ISSN 2229-5518
Online social networks threats
Hamza Ahmed
Abstract: (SNSs) Social Networking Sites or online social networks are the most outstanding technological phenomena in the
twenty first century. These are the most visited sites globally with an informal but comprehensive management tools.
SRNs are also used for commercial purposes for instance, MySpace, LinkedIn, Facebook and Twitter. In this study,
various aspects of network, social and physical security associated with online social networks sites have been
discussed beginning with the introduction of the mechanisms related to each threat and the summaries of relevant
solutions that can be adopted to solve these issues amicably (Wang et al., 2009). Each mode of online threat comes
with different risks, therefore, relevant measures can be taken to prevent or solve issues related to them. These
measures have been discussed into details with examples mentioned at each end. However, it is recognized that
individuals and organizations have a legitimate personal and financial uses for online social network, at the same time
it’s recommended that certain measures should be taken to reinforce stronger users’ awareness with more secure
network and software designs (Novak et al., 2013).
Keywords: Facebook, social network security, twitter, LinkedIn, firewall, identity hijacking, phishing, sniffers, keyloggers, DoS
attack, Virus dissemination, worms, Spoofing, Net extortion, malware and cooperate security
Research Questions: In this study, several research questions were obtained as follows: what are the threats that affect online
network sites? How do they interrupt normal user conversations? Who are the most affected when it comes to online
social network threats? How can one identify online network threats? How many individuals or companies can be
affected at the same time or at intervals, who can pose such threats? What are the objectives of online social network
threats? When one is involved in posing threat? What are the penalties? What are the possible solutions that can be
IJSER
implored in case and individual or a company is affected? Who are vulnerable? In the normal operation of social
network, is it possible to prevent any attack or possible threats from taking place (Johnson, 2014)? These research
questions helps in understanding the objective of this research and the details entailed in this paper.
However, this study does not stop at research questions; it elaborates the intention of the whole research paper with
recommendations and conclusions. The research questions have been obtained from online literature reviews with
references made from different writers having similar or different opinions in order to find the facts and compile the
same for study purposes.
—————————— ——————————
Introduction Hackers use different tools to aid their
Having noted that online social network intentions of hijacking network communications.
have become so popular across the world, many These tools include but not limited to keyloggers
users with different intentions use it to pass and sniffers (Fewer et al., 2008). These tools can be
information from one end to another. Users may used to send spam mails, install viruses, send
include; financial institutions such as banks, messages and retrieve data from any given website
pharmaceutical companies, government and (Novak et al., 2013). Currently, Many employers
defense agencies, multinational corporations, hire their employees following their behaviour on
contractors of government agencies, internet social network since much information is relayed
service providers, students, teachers, researchers, on their profiles such as photos, gender, sexual
bloggers and media (Minchev et al., 2013). All orientation, phone numbers, games, interests,
those who have been mentioned above are also favorite music, languages, types of friends and
vulnerable to social network threats that are associates are all checked before employment letter
experienced through the internet. These threats is sent to them (Fewer et al., 2008). With the
include (Fossi, 2010); phishing, spoofing, worm, information at their reach, it is very possible to
child pornography, net extortion, virus breach into someone’s profile without his/her
dissemination, computer vandalism, DoS attack knowledge. Privacy and information security is at
and malware. These threats are passed through the risk if in case such kinds of activities are carried by
internet from one server to the other provided an un-authorized persons or group for any benefit or
individual or company is connected to the internet interest.
(Hasib, 2008).
IJSER © 2014
http://www.ijser.org
International Journal of Scientific & Engineering Research, Volume 5, Issue 11, November-2014 987
ISSN 2229-5518
Security Threats used to prevent any possible attacks and provide
Phishing solutions to these threats. Attacks such as spoofing
Under this attack, the hacker masquerades can be controlled when network IP are set to
as a reliable entity in order to get someone’s defaults in order to hide user identity from
credentials or private information over the internet possible hackers since it takes the form of man-in-
for personal benefit. It is easy to copy someone’s the-middle attack. Users are also advised not to
legitimate website or profile for malicious reasons. put all their vital information on social media
it is a fact that phishing is the second most effective where it can be easily compromised without their
threat after spam when it comes to compromising prior knowledge. Proper authentication and access
systems and PCs where hackers are able to index control is very vital for companies and individuals
someone’s credentials based on different who use social networks for marketing, social and
dimensions (Enisa, 2007). To stop phishing, communication purposes. Users should also
password encapsulation or in simple words, ensure their anti-virus programs are up to date in
changing one’s password with complex letters order to scan the entire system frequently. They
frequently would help to prevent phishing. Also, should also avoid opening attachments any how or
using many defaults IP addresses for a single PC. sites that look attractive with un-necessary pop-
Malware ups that may end up being traps set by hackers.
Currently, about 60,000 to 80,000 number Moreover, users should change their passwords
of malwares is reported monthly (Rand, 2007). frequently to avoid being trapped by hackers
Malwares are sent by a hacker in order to collapse (Rand, 2007). At time, they can use sophisticated
IJSER
the system or damage files of the intended passwords that they are able to remember.
recipient. The often come in terms of adds that
cannot be easily detected by many users. The most References
prominent solution is to train users not to trust Beach, A., Gartrell, M., Han, R. (2009). Solutions to
every link or site or photos that look attractive and Security and Privacy Issues in Mobile
downloading un-licensed software from the Social Networking. Available at: <
internet (Enisa, 2007). http://www.cs.colorado.edu/~rhan/Papers/
Attack Sophistication smw09_solutions_security_privacy.pdf>
Most companies have placed resources Becker, J., Chen, H. (2009). Measuring Privacy Risk
online in their websites for marketing purposes in Online Social Networks. Available at: <
and winning more customers. Most attackers come http://web.cs.ucdavis.edu/~hchen/paper/w
from the back end where many transactions are 2sp2009.pdf >
taking place. DNS servers and DoS vectors abuse Enisa, G.H. (2007). Security Issues and
are common over the internet. Worms can Recommendations for Online Social
compromise over 2 million PCs or systems at the Networks. Available at: <
same time for instance worms such as Conficker http://fredstutzman.com/papers/ENISA20
always attack websites that are not protected with 07.pdf>
a company firewall or internal server settings Fewer, D., Lawson, P., Gosselin, M (2008). Online
(Becker et al., 2009). To prevent such an attack, Privacy Threats: A review and analysis of
companies should adopt sophisticated firewalls current threats. Available at: <
that cannot be broken often by attackers. https://cippic.ca/sites/default/files/publicat
ions/CIPPIC-Online_Privacy_Threats-
Conclusion Final.pdf >
With several online social network attacks Fossi, M. (2010). Online Threats: What Government
being report, many users are at high risk of being needs to know? Available at: <
victims of the same. Privacy and security of data http://www.summitconnects.com/Articles
and information is important to the development _Columns/PDF_Documents/201011/Nov10
of new systems that facilitate these ambitions. With _vol13_i7_05.pdf>
current technologies such as; cloud, mobile Hasib, A.A. (2008). Threats of Online Social
devices, network perimeter and system level are Networks. Available at: <
IJSER © 2014
http://www.ijser.org
International Journal of Scientific & Engineering Research, Volume 5, Issue 11, November-2014 988
ISSN 2229-5518
http://www.cse.hut.fi/en/publications/B/1/
papers/Hasib_final.pdf>
Johnson, M. (2014). Cybercrime: Threats and
Solutions. Available at: < http://www.ark-
group.com/Downloads/Cybercrime-
Threats-and-Solutions-Sample1.pdf>
Minchev, Z., Petkova, M. (2013). Information
Processes and threats in social networks.
A case study. Available at: <
http://www.syssec-project.eu/m/page-
media/3/minchev-social-threats.pdf>
Novak, E., Li, Q. (2013). A Survey of Security and
Privacy in Online Social Networks.
Available at: <
http://www.cs.wm.edu/~liqun/paper/tr12-
2.pdf>
Rand, D. (2007). CSIS Security Research and
Intelligence: Threats when using Online
Social Networks. Available at: <
http://www.csis.dk/downloads/LinkedIn.
IJSER
pdf>
Wang, E., Jain, R. (2009). Social Network Security:
A Brief Overview of Risks and Solutions.
Available at: <
http://www.cse.wustl.edu/~jain/cse571-
09/ftp/social.pdf>
IJSER © 2014
http://www.ijser.org