Abstract:
While the popularity of using online social networks is rising every day, the security threats to the users of these networks also increased dramatically. Many people fin...Show MoreMetadata
Abstract:
While the popularity of using online social networks is rising every day, the security threats to the users of these networks also increased dramatically. Many people find Social networks very interesting, because they offer wide range of online services for socializing between friends and people that have similar interests. However sharing these interests online and using them without considering the security factor can lead a user to become victim of a hacker. There are many different types of threats exists that might put the social network's users at cyber security risk. In this study we discussed different common types of social network threats and provided solutions to mitigate the security risks of using social networks.
Date of Conference: 04-06 September 2013
Date Added to IEEE Xplore: 09 January 2014
Electronic ISBN:978-0-7695-5133-3
Keywords assist with retrieval of results and provide a means to discovering other relevant content. Learn more.
- IEEE Keywords
- Index Terms
- Social Networks ,
- Socialization ,
- Security Risks ,
- Types Of Threats ,
- Twitter ,
- Personal Information ,
- Security Issues ,
- Web Application ,
- Information Leakage ,
- Types Of Attacks ,
- Combined Solution ,
- News Feed ,
- Identity Theft ,
- User Need ,
- Injection Attacks ,
- Examples Of Services ,
- Privacy Settings ,
- Malware
- Author Keywords
- Social Network ,
- Security ,
- Threats ,
- Vulnerability ,
- Phishing ,
- Malware ,
- Cyber Security
Keywords assist with retrieval of results and provide a means to discovering other relevant content. Learn more.
- IEEE Keywords
- Index Terms
- Social Networks ,
- Socialization ,
- Security Risks ,
- Types Of Threats ,
- Twitter ,
- Personal Information ,
- Security Issues ,
- Web Application ,
- Information Leakage ,
- Types Of Attacks ,
- Combined Solution ,
- News Feed ,
- Identity Theft ,
- User Need ,
- Injection Attacks ,
- Examples Of Services ,
- Privacy Settings ,
- Malware
- Author Keywords
- Social Network ,
- Security ,
- Threats ,
- Vulnerability ,
- Phishing ,
- Malware ,
- Cyber Security