SlideShare ist ein Scribd-Unternehmen logo
1 von 46
Downloaden Sie, um offline zu lesen
THE SECURITY AWARNESS OF
SOCIAL NETWORKING SITES USAGE
     DR. MOHAMMAD ALAA AL-HAMAMI
     DELMON UNIVERSITY FOR SCIENCE AND TECHNOLOGY
INTRODUCTION
INTRODUCTION

• Social networking sites enhance our
  life, we can’t count the advantages that
  we could get if we use them in a good
  manner.
• But at the same time these sites could
  be a main security threat if we don’t
  have the awareness to use them in a
  safety way.
THE DANGER OF SOCIAL
     NETWORKS
THE DANGER OF SOCIAL
NETWORKS
• Social networking sites can be:
   – A source of personal & business information leaks.
   – A malware attack vector when not used carefully.
• Users trust their contacts to:
   – Not send bad links.
   – Not trying to infect their computers.
   – And take good care of their personal data.
• URL shorteners are a security concern and
  should be taken very seriously in social
  networks.
SOCIAL NETWORKS PROBLEMS
FROM A LEGAL POINT OF VIEW
SOCIAL NETWORKS PROBLEMS
FROM A LEGAL POINT OF VIEW
 • Violation user’s data protection rights.
 • Identity Fraud.
 • Absence of uniform rule at the international
   level.
WHAT COULD GO WRONG IN
SOCIAL NETWORKING SITES?
WHAT COULD GO WRONG?
• Your contact’s account is compromised
   and somebody else is using it.
• You added somebody to your network that
   you thought you knew but, in fact, you did
   not.
• You added somebody you thought was
   trustworthy but he/she turns out not to be.
• Insufficient use of privacy controls caused
   you to share data with people you never
   intended.
WHAT DATA THAT COULD BE
MINED IN SOCIAL NETWORKS?
Social networks contain a wealth of
          information like:
DATA THAT COULD BE MINED IN
SOCIAL NETWORKS
 • USER IDENTIFIERS AND ATTRIBUTES.
 • CONTACT INFORMATION .
 • WORK.
 • EDUCATION.
 • PERSONAL INFORMATION AND
   INTERESTS .
 • CONNECTION AND USAGE
   INFORMATION .
These information
are treasure for
Attackers and
Criminals !
SO WHAT ATTACKERS WILL
DO WITH THE MINED DATA?
SO WHAT ATTACKERS WILL DO
WITH THE MINED DATA?
• Underground forums sell information:
  – Your data can be mined and stored
    somewhere in the dark corners of the Internet
    waiting for a criminal to pay the right price for
    it.
  – Criminals can use this information to obtain
    birth certificates/passports and other
    documents.
MOST IMPORTANT DATA
  FOR ATTACKERS
MOST IMPORTANT DATA FOR
ATTACKERS
• Email addresses:
  – Used for spam campaigns.
  – Can be categorized to improve the impact of the
    campaign like age, country and other factors so
    that its market price is higher than just any
    normal email address.
  – Can also be a great value for phishing
    campaigns.
MOST IMPORTANT DATA FOR
ATTACKERS
• Real-life addresses:
  – Often shared in social networking sites.
  – They can be used to collect mailing databases
    for advertising purposes in a similar way as
    described above.
MOST IMPORTANT DATA FOR
ATTACKERS
• Date of birth:
  – Used by different companies to confirm
    people’s identities over the telephone.
  – Criminals have tools to automate “date of birth”
    searches in social networking sites.
MOST IMPORTANT DATA FOR
ATTACKERS
• Public Profile:
  – A potential massive data-leak-age.
  – Social networking search engines can search
    all available data about any name in a certain
    region.
  – Public profile makes the lives of stalkers,
    fraudsters, or any other attackers much easier.
PRIVACY IN A CONNECTED
    WORLD: A STORY
PRIVACY IN A CONNECTED WORLD:
A STORY

 • In July 2009, the wife of a high-level government
   executive in the UK published personal data in a social
   networking site.
 • This had get a lot of attention:
    – Not for the confidentiality of the content,
    – But for the lack of awareness about the accessibility of your
      online content.
    – There is also another issue to play here, the fact that once you
      publish anything online, you will lose the control over it,
      people leech and republish it on places you do not even
      know !
HOW CAN ATTACKERS FOOL
SOCIAL NETWORKS USERS?
HOW CAN ATTACKERS FOOL SOCIAL
NETWORKS USERS?

 • Creating a fake celebrity profile.
 • Creating a duplicate of somebody’s
   profile.
 • Creating a profile, adding themselves
   to a medium-sized group or
   community. Then joining a second
   group and starting again.
 • Creating a female profile and
   publishing a pretty picture of “herself”.
WHY ATTACKERS SUCCESS IN FOOLING
    SOCIAL NETWORKS USERS?
WHY ATTACKERS SUCCESS IN FOOLING
SOCIAL NETWORKS USERS?

 - A lot of users don’t realize that:
   - Their contact lists is a circle of trust.
   - And by adding somebody they don’t know
     they are opening their data to untrusted
     parties.
 - Some sites don’t have privacy controls in
   place, or the ones they have do not protect
   all user data.
WHY ATTACKERS SUCCESS IN FOOLING
SOCIAL NETWORKS USERS?


 - The user is often not concern to select who
   can access his/her data.
 - The user don’t use the available controls
   because they appear too complex or time-
   consuming (laziness or lack of knowledge).
WHAT CAN AN ATTACKER DO WITH
 LARGE NETWORK OF USERS?
WHAT CAN AN ATTACKER DO ?

•   Advertise.
•   Collect Contact Information.
•   Phishing.
•   Malware Installation.
WHEN SOCIAL NETWORKING
  SITES CODE BREAKS !
WHEN CODE BREAKS

• Attack vector is the exploitation of programming
  flaws in websites.
• These Web pages have been made by humans
  and they can have errors that could compromise
  the site’s security measures.
• Poor security, weak administration practices, or
  badly written code can all help attackers to
  gather your data or help them stage a bigger
  attack against any number of users.
WHEN CODE BREAKS

• Social networking sites keep adding to their
  security controls and refining their existing ones.
• But as in any development project, they also
  continue to innovate on their platforms and add
  exciting new features.
• These new options need to keep up with the
  security features or they too will suffer from
  security weaknesses.
CODE BREAKS EXAMPLES
Pinterest

• In Pinterest, a cross-site scripting
  vulnerability and an iframe injection issue
  had been identified that could allow
  hackers to hijack user accounts and
  perform other malicious operations.
• It had been found a URL redirection flaw
  that could redirect the site’s visitors to
  other potentially malicious domains.
CODE BREAKS EXAMPLES
Facebook

• There have been instances of security flaws
  on Facebook that allowed anybody to access
  the “basic information” data of any user, no
  matter what their security settings were.
• This attack was released by casual users after
  Facebook ignored the users’ warnings for a
  few days. No great knowledge was needed in
  this case to exploit a security weakness.
CODE BREAKS EXAMPLES
Twitter

• Twitter had “cross-site scripting” attacks
  performed against it. In these attacks, the
  attackers could change the Twitter status
  of any user accessing the attacker’s
  account.
• This meant that the bad guys could make
  you tweet bad links so your Twitter
  followers would be at risk of being
  infected.
CODE BREAKS EXAMPLES
MySpace

• MySpace was attacked in 2007 by a JavaScript
  that would copy itself to the viewer’s profile
  along with a piece of text—“Samy is my hero.”
  This was caused by a security flaw that could
  have caused the victim to run any other
  command like redirecting the page to a
  malicious website.
• Thankfully, the young man who discovered the
  flaw and created the worm only wanted to have
  more friends added to his profile.
WHEN CODE BREAKS:
EXAMPLES
• These Four examples are not the only cases of
  security flaws on social networking sites.
• In fact, such flaws are identified frequently.
• News about such security holes are released
  every month and are a concern for all affected
  web-sites and their users.
• Since their solution is out of the user’s hands, it
  is difficult or impossible to do anything about
  them.
SUMMARY

• There are some simple steps and points
  that we should consider to protect our
  privacy in social networks such as:
  – Keep your information as general as possible.
  – Read the privacy policy of social networking
    sites.
  – Do not add people that you don’t Know or
    trust.
SUMMARY

 – If you are using social networks to meet new
   people you should create a special account
   for that.
 – Do not click any unknown or suspicious
   hyperlinks.
 – Remember that any data you publish in the
   Internet it will be there forever and anyone
   could use and share it.
REFERENCES
[1] http://www.hausarbeiten.de/faecher/vorschau/147360.html

[2] http://us.trendmicro.com/us/trendwatch/current-threat
     activity/undergroundeconomy/index.html

[3] http://www.w3.org/2008/09/msnws/papers/NETWORKS_LEGAL_PROBLEMS.PDF

[4] http://www.dailymail.co.uk/news/article-1197562/MI6-chief-blows-cover-wifes-Facebook-
     account-revealsfamily-holidays-showbiz-friends-links-David-Irving.html

[5] http://www.onrec.com/newsstories/17612.asp

[6] http://www.scmagazineus.com/Facebook-bloggers-reveal-way-to-peek-at-private-
     profiles/article/138867/

[7] http://blogs.computerworld.com/twitter_stalkdaily_mikeyy_xss_worm

[8] http://www.betanews.com/article/CrossSite-Scripting-Worm-Hits-MySpace/1129232391
SOCIAL NETWORK SECURITY

Weitere ähnliche Inhalte

Was ist angesagt?

Social network privacy & security
Social network privacy & securitySocial network privacy & security
Social network privacy & securitynadikari123
 
Cyber security and current trends
Cyber security and current trendsCyber security and current trends
Cyber security and current trendsShreedeep Rayamajhi
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecuritysommerville-videos
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...Edureka!
 
Cyber security
Cyber securityCyber security
Cyber securitymanoj duli
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media SecurityDel Belcher
 
Social media and Security risks
Social media and Security risksSocial media and Security risks
Social media and Security risksParakum Pathirana
 
Presentation on ethical hacking
Presentation on ethical hackingPresentation on ethical hacking
Presentation on ethical hackingSunny Sundeep
 
Incident Response in the age of Nation State Cyber Attacks
Incident Response in the age of Nation State Cyber AttacksIncident Response in the age of Nation State Cyber Attacks
Incident Response in the age of Nation State Cyber AttacksResilient Systems
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security PresentationAllan Pratt MBA
 
introduction to cyber security
introduction to cyber securityintroduction to cyber security
introduction to cyber securitySlamet Ar Rokhim
 
CYBER SECURITY ON SOCIAL MEDIA
CYBER SECURITY ON SOCIAL MEDIACYBER SECURITY ON SOCIAL MEDIA
CYBER SECURITY ON SOCIAL MEDIAcharitha garimella
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hackingchakrekevin
 
Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...ABHAY PATHAK
 

Was ist angesagt? (20)

Social network privacy & security
Social network privacy & securitySocial network privacy & security
Social network privacy & security
 
Cyber security and current trends
Cyber security and current trendsCyber security and current trends
Cyber security and current trends
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media Security
 
Social media and Security risks
Social media and Security risksSocial media and Security risks
Social media and Security risks
 
Cyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptxCyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptx
 
Presentation on ethical hacking
Presentation on ethical hackingPresentation on ethical hacking
Presentation on ethical hacking
 
cyber security
cyber securitycyber security
cyber security
 
Incident Response in the age of Nation State Cyber Attacks
Incident Response in the age of Nation State Cyber AttacksIncident Response in the age of Nation State Cyber Attacks
Incident Response in the age of Nation State Cyber Attacks
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
introduction to cyber security
introduction to cyber securityintroduction to cyber security
introduction to cyber security
 
CYBER SECURITY ON SOCIAL MEDIA
CYBER SECURITY ON SOCIAL MEDIACYBER SECURITY ON SOCIAL MEDIA
CYBER SECURITY ON SOCIAL MEDIA
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...Social Engineering,social engeineering techniques,social engineering protecti...
Social Engineering,social engeineering techniques,social engineering protecti...
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 

Ähnlich wie SOCIAL NETWORK SECURITY

Info Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsInfo Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsGDSCCVR
 
Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235brendaylo
 
Introduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptxIntroduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptxShubhamGupta833557
 
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul Styrvoky
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul StyrvokyNTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul Styrvoky
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul StyrvokyNorth Texas Chapter of the ISSA
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxKevinRiley83
 
Chapter 4 E-Safety and Health & Safety
Chapter 4 E-Safety and Health & SafetyChapter 4 E-Safety and Health & Safety
Chapter 4 E-Safety and Health & SafetyAnjan Mahanta
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteAngelito Quiambao
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media SecurityHem Pokhrel
 
Empowerment technology Romel Padon & Airine Gelos
Empowerment technology Romel Padon & Airine GelosEmpowerment technology Romel Padon & Airine Gelos
Empowerment technology Romel Padon & Airine GelosPadsromel
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationSheryldeVilla2
 
INTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptxINTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptxBHUt6
 
csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBCapyn
 
CYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTYCYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTYFaMulan2
 
Risks and Security of Internet and System
Risks and Security of Internet and SystemRisks and Security of Internet and System
Risks and Security of Internet and SystemParam Nanavati
 
Guideline about responsible use of social networks
Guideline about responsible use of social networksGuideline about responsible use of social networks
Guideline about responsible use of social networksprofesorjulioperez
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awarenessKaran Veer Singh
 

Ähnlich wie SOCIAL NETWORK SECURITY (20)

Info Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsInfo Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study Jams
 
Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235
 
Introduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptxIntroduction to Cybersecurity - Secondary School_0.pptx
Introduction to Cybersecurity - Secondary School_0.pptx
 
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul Styrvoky
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul StyrvokyNTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul Styrvoky
NTXISSACSC2 - Social Media: The Good, The Bad, and The Ugly by Paul Styrvoky
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptx
 
Chapter 4 E-Safety and Health & Safety
Chapter 4 E-Safety and Health & SafetyChapter 4 E-Safety and Health & Safety
Chapter 4 E-Safety and Health & Safety
 
Social media-threats
Social media-threatsSocial media-threats
Social media-threats
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquette
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
 
Empowerment technology Romel Padon & Airine Gelos
Empowerment technology Romel Padon & Airine GelosEmpowerment technology Romel Padon & Airine Gelos
Empowerment technology Romel Padon & Airine Gelos
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentation
 
INTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptxINTERNET SAFETY-WPS Office (1).pptx
INTERNET SAFETY-WPS Office (1).pptx
 
Social networking
Social networkingSocial networking
Social networking
 
Safe social networking tips
Safe social networking tipsSafe social networking tips
Safe social networking tips
 
csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBC
 
CYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTYCYBER ETHICS, CRIMES AND SAFTY
CYBER ETHICS, CRIMES AND SAFTY
 
Risks and Security of Internet and System
Risks and Security of Internet and SystemRisks and Security of Internet and System
Risks and Security of Internet and System
 
Social media-threats
Social media-threatsSocial media-threats
Social media-threats
 
Guideline about responsible use of social networks
Guideline about responsible use of social networksGuideline about responsible use of social networks
Guideline about responsible use of social networks
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awareness
 

Mehr von MarketingatBahrain

Social Media Strategic Planning Process
Social Media Strategic Planning ProcessSocial Media Strategic Planning Process
Social Media Strategic Planning ProcessMarketingatBahrain
 
Getting started with social media strategic planning webinar
Getting started with social media strategic planning webinarGetting started with social media strategic planning webinar
Getting started with social media strategic planning webinarMarketingatBahrain
 
Social Media Toolkit for Entrepreneurs
Social Media Toolkit for EntrepreneursSocial Media Toolkit for Entrepreneurs
Social Media Toolkit for EntrepreneursMarketingatBahrain
 
Social Media Strategies for Entrepreneurs
Social Media Strategies for EntrepreneursSocial Media Strategies for Entrepreneurs
Social Media Strategies for EntrepreneursMarketingatBahrain
 
Mobile for Business - This is the Q?
Mobile for Business - This is the Q?Mobile for Business - This is the Q?
Mobile for Business - This is the Q?MarketingatBahrain
 
Utilizing Social Media for Events Marketing
Utilizing Social Media for Events MarketingUtilizing Social Media for Events Marketing
Utilizing Social Media for Events MarketingMarketingatBahrain
 
Content creation - Let us blog!
Content creation - Let us blog!Content creation - Let us blog!
Content creation - Let us blog!MarketingatBahrain
 
Social Media Engagement | Social Media Masters Business Seminar
Social Media Engagement | Social Media Masters Business SeminarSocial Media Engagement | Social Media Masters Business Seminar
Social Media Engagement | Social Media Masters Business SeminarMarketingatBahrain
 
The Social Business | Social Media Masters Business Seminar
The Social Business | Social Media Masters Business SeminarThe Social Business | Social Media Masters Business Seminar
The Social Business | Social Media Masters Business SeminarMarketingatBahrain
 
Social Media Toolset | Social Media Masters Business Seminar
Social Media Toolset | Social Media Masters Business Seminar Social Media Toolset | Social Media Masters Business Seminar
Social Media Toolset | Social Media Masters Business Seminar MarketingatBahrain
 
Social Media Marketing | Social Media Masters Business Seminar
Social Media Marketing | Social Media Masters Business SeminarSocial Media Marketing | Social Media Masters Business Seminar
Social Media Marketing | Social Media Masters Business SeminarMarketingatBahrain
 
Intro to Social Media | Social Media Masters Business Seminar
Intro to Social Media | Social Media Masters Business SeminarIntro to Social Media | Social Media Masters Business Seminar
Intro to Social Media | Social Media Masters Business SeminarMarketingatBahrain
 
Cyberstalking and safety tips for social networks
Cyberstalking and safety tips for social networksCyberstalking and safety tips for social networks
Cyberstalking and safety tips for social networksMarketingatBahrain
 
Facebook & instagram case study in ksa
Facebook & instagram case study in ksaFacebook & instagram case study in ksa
Facebook & instagram case study in ksaMarketingatBahrain
 
Growing Active Facebook Communities
Growing Active Facebook CommunitiesGrowing Active Facebook Communities
Growing Active Facebook CommunitiesMarketingatBahrain
 

Mehr von MarketingatBahrain (20)

Social Media Strategic Planning Process
Social Media Strategic Planning ProcessSocial Media Strategic Planning Process
Social Media Strategic Planning Process
 
Getting started with social media strategic planning webinar
Getting started with social media strategic planning webinarGetting started with social media strategic planning webinar
Getting started with social media strategic planning webinar
 
Social Media Toolkit for Entrepreneurs
Social Media Toolkit for EntrepreneursSocial Media Toolkit for Entrepreneurs
Social Media Toolkit for Entrepreneurs
 
Social Media Strategies for Entrepreneurs
Social Media Strategies for EntrepreneursSocial Media Strategies for Entrepreneurs
Social Media Strategies for Entrepreneurs
 
The Evolution of Event Apps
The Evolution of Event AppsThe Evolution of Event Apps
The Evolution of Event Apps
 
Mobile for Business - This is the Q?
Mobile for Business - This is the Q?Mobile for Business - This is the Q?
Mobile for Business - This is the Q?
 
Utilizing Social Media for Events Marketing
Utilizing Social Media for Events MarketingUtilizing Social Media for Events Marketing
Utilizing Social Media for Events Marketing
 
Set up your Corporate Blo
Set up your Corporate BloSet up your Corporate Blo
Set up your Corporate Blo
 
Marketing your blog
Marketing your blogMarketing your blog
Marketing your blog
 
Content creation - Let us blog!
Content creation - Let us blog!Content creation - Let us blog!
Content creation - Let us blog!
 
Corporate blogging intro
Corporate blogging introCorporate blogging intro
Corporate blogging intro
 
Social Media Engagement | Social Media Masters Business Seminar
Social Media Engagement | Social Media Masters Business SeminarSocial Media Engagement | Social Media Masters Business Seminar
Social Media Engagement | Social Media Masters Business Seminar
 
The Social Business | Social Media Masters Business Seminar
The Social Business | Social Media Masters Business SeminarThe Social Business | Social Media Masters Business Seminar
The Social Business | Social Media Masters Business Seminar
 
Social Media Toolset | Social Media Masters Business Seminar
Social Media Toolset | Social Media Masters Business Seminar Social Media Toolset | Social Media Masters Business Seminar
Social Media Toolset | Social Media Masters Business Seminar
 
Social Media Marketing | Social Media Masters Business Seminar
Social Media Marketing | Social Media Masters Business SeminarSocial Media Marketing | Social Media Masters Business Seminar
Social Media Marketing | Social Media Masters Business Seminar
 
Intro to Social Media | Social Media Masters Business Seminar
Intro to Social Media | Social Media Masters Business SeminarIntro to Social Media | Social Media Masters Business Seminar
Intro to Social Media | Social Media Masters Business Seminar
 
My love story
My love storyMy love story
My love story
 
Cyberstalking and safety tips for social networks
Cyberstalking and safety tips for social networksCyberstalking and safety tips for social networks
Cyberstalking and safety tips for social networks
 
Facebook & instagram case study in ksa
Facebook & instagram case study in ksaFacebook & instagram case study in ksa
Facebook & instagram case study in ksa
 
Growing Active Facebook Communities
Growing Active Facebook CommunitiesGrowing Active Facebook Communities
Growing Active Facebook Communities
 

Kürzlich hochgeladen

Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...amitlee9823
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...Sheetaleventcompany
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangaloreamitlee9823
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableSeo
 
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLBAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLkapoorjyoti4444
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptxnandhinijagan9867
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...amitlee9823
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxpriyanshujha201
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...lizamodels9
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...rajveerescorts2022
 
Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)-  A new venture conceptBusiness Model Canvas (BMC)-  A new venture concept
Business Model Canvas (BMC)- A new venture conceptP&CO
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with CultureSeta Wicaksana
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...Aggregage
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Sheetaleventcompany
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noidadlhescort
 

Kürzlich hochgeladen (20)

Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLBAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 
Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)-  A new venture conceptBusiness Model Canvas (BMC)-  A new venture concept
Business Model Canvas (BMC)- A new venture concept
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
 

SOCIAL NETWORK SECURITY

  • 1. THE SECURITY AWARNESS OF SOCIAL NETWORKING SITES USAGE DR. MOHAMMAD ALAA AL-HAMAMI DELMON UNIVERSITY FOR SCIENCE AND TECHNOLOGY
  • 3. INTRODUCTION • Social networking sites enhance our life, we can’t count the advantages that we could get if we use them in a good manner. • But at the same time these sites could be a main security threat if we don’t have the awareness to use them in a safety way.
  • 4. THE DANGER OF SOCIAL NETWORKS
  • 5. THE DANGER OF SOCIAL NETWORKS • Social networking sites can be: – A source of personal & business information leaks. – A malware attack vector when not used carefully. • Users trust their contacts to: – Not send bad links. – Not trying to infect their computers. – And take good care of their personal data. • URL shorteners are a security concern and should be taken very seriously in social networks.
  • 6. SOCIAL NETWORKS PROBLEMS FROM A LEGAL POINT OF VIEW
  • 7. SOCIAL NETWORKS PROBLEMS FROM A LEGAL POINT OF VIEW • Violation user’s data protection rights. • Identity Fraud. • Absence of uniform rule at the international level.
  • 8. WHAT COULD GO WRONG IN SOCIAL NETWORKING SITES?
  • 9. WHAT COULD GO WRONG? • Your contact’s account is compromised and somebody else is using it. • You added somebody to your network that you thought you knew but, in fact, you did not. • You added somebody you thought was trustworthy but he/she turns out not to be. • Insufficient use of privacy controls caused you to share data with people you never intended.
  • 10. WHAT DATA THAT COULD BE MINED IN SOCIAL NETWORKS?
  • 11. Social networks contain a wealth of information like:
  • 12. DATA THAT COULD BE MINED IN SOCIAL NETWORKS • USER IDENTIFIERS AND ATTRIBUTES. • CONTACT INFORMATION . • WORK. • EDUCATION. • PERSONAL INFORMATION AND INTERESTS . • CONNECTION AND USAGE INFORMATION .
  • 13. These information are treasure for Attackers and Criminals !
  • 14. SO WHAT ATTACKERS WILL DO WITH THE MINED DATA?
  • 15. SO WHAT ATTACKERS WILL DO WITH THE MINED DATA? • Underground forums sell information: – Your data can be mined and stored somewhere in the dark corners of the Internet waiting for a criminal to pay the right price for it. – Criminals can use this information to obtain birth certificates/passports and other documents.
  • 16. MOST IMPORTANT DATA FOR ATTACKERS
  • 17. MOST IMPORTANT DATA FOR ATTACKERS • Email addresses: – Used for spam campaigns. – Can be categorized to improve the impact of the campaign like age, country and other factors so that its market price is higher than just any normal email address. – Can also be a great value for phishing campaigns.
  • 18. MOST IMPORTANT DATA FOR ATTACKERS • Real-life addresses: – Often shared in social networking sites. – They can be used to collect mailing databases for advertising purposes in a similar way as described above.
  • 19. MOST IMPORTANT DATA FOR ATTACKERS • Date of birth: – Used by different companies to confirm people’s identities over the telephone. – Criminals have tools to automate “date of birth” searches in social networking sites.
  • 20. MOST IMPORTANT DATA FOR ATTACKERS • Public Profile: – A potential massive data-leak-age. – Social networking search engines can search all available data about any name in a certain region. – Public profile makes the lives of stalkers, fraudsters, or any other attackers much easier.
  • 21. PRIVACY IN A CONNECTED WORLD: A STORY
  • 22. PRIVACY IN A CONNECTED WORLD: A STORY • In July 2009, the wife of a high-level government executive in the UK published personal data in a social networking site. • This had get a lot of attention: – Not for the confidentiality of the content, – But for the lack of awareness about the accessibility of your online content. – There is also another issue to play here, the fact that once you publish anything online, you will lose the control over it, people leech and republish it on places you do not even know !
  • 23. HOW CAN ATTACKERS FOOL SOCIAL NETWORKS USERS?
  • 24. HOW CAN ATTACKERS FOOL SOCIAL NETWORKS USERS? • Creating a fake celebrity profile. • Creating a duplicate of somebody’s profile. • Creating a profile, adding themselves to a medium-sized group or community. Then joining a second group and starting again. • Creating a female profile and publishing a pretty picture of “herself”.
  • 25. WHY ATTACKERS SUCCESS IN FOOLING SOCIAL NETWORKS USERS?
  • 26. WHY ATTACKERS SUCCESS IN FOOLING SOCIAL NETWORKS USERS? - A lot of users don’t realize that: - Their contact lists is a circle of trust. - And by adding somebody they don’t know they are opening their data to untrusted parties. - Some sites don’t have privacy controls in place, or the ones they have do not protect all user data.
  • 27. WHY ATTACKERS SUCCESS IN FOOLING SOCIAL NETWORKS USERS? - The user is often not concern to select who can access his/her data. - The user don’t use the available controls because they appear too complex or time- consuming (laziness or lack of knowledge).
  • 28. WHAT CAN AN ATTACKER DO WITH LARGE NETWORK OF USERS?
  • 29. WHAT CAN AN ATTACKER DO ? • Advertise. • Collect Contact Information. • Phishing. • Malware Installation.
  • 30. WHEN SOCIAL NETWORKING SITES CODE BREAKS !
  • 31. WHEN CODE BREAKS • Attack vector is the exploitation of programming flaws in websites. • These Web pages have been made by humans and they can have errors that could compromise the site’s security measures. • Poor security, weak administration practices, or badly written code can all help attackers to gather your data or help them stage a bigger attack against any number of users.
  • 32. WHEN CODE BREAKS • Social networking sites keep adding to their security controls and refining their existing ones. • But as in any development project, they also continue to innovate on their platforms and add exciting new features. • These new options need to keep up with the security features or they too will suffer from security weaknesses.
  • 34. Pinterest • In Pinterest, a cross-site scripting vulnerability and an iframe injection issue had been identified that could allow hackers to hijack user accounts and perform other malicious operations. • It had been found a URL redirection flaw that could redirect the site’s visitors to other potentially malicious domains.
  • 36. Facebook • There have been instances of security flaws on Facebook that allowed anybody to access the “basic information” data of any user, no matter what their security settings were. • This attack was released by casual users after Facebook ignored the users’ warnings for a few days. No great knowledge was needed in this case to exploit a security weakness.
  • 38. Twitter • Twitter had “cross-site scripting” attacks performed against it. In these attacks, the attackers could change the Twitter status of any user accessing the attacker’s account. • This meant that the bad guys could make you tweet bad links so your Twitter followers would be at risk of being infected.
  • 40. MySpace • MySpace was attacked in 2007 by a JavaScript that would copy itself to the viewer’s profile along with a piece of text—“Samy is my hero.” This was caused by a security flaw that could have caused the victim to run any other command like redirecting the page to a malicious website. • Thankfully, the young man who discovered the flaw and created the worm only wanted to have more friends added to his profile.
  • 41. WHEN CODE BREAKS: EXAMPLES • These Four examples are not the only cases of security flaws on social networking sites. • In fact, such flaws are identified frequently. • News about such security holes are released every month and are a concern for all affected web-sites and their users. • Since their solution is out of the user’s hands, it is difficult or impossible to do anything about them.
  • 42. SUMMARY • There are some simple steps and points that we should consider to protect our privacy in social networks such as: – Keep your information as general as possible. – Read the privacy policy of social networking sites. – Do not add people that you don’t Know or trust.
  • 43. SUMMARY – If you are using social networks to meet new people you should create a special account for that. – Do not click any unknown or suspicious hyperlinks. – Remember that any data you publish in the Internet it will be there forever and anyone could use and share it.
  • 44.
  • 45. REFERENCES [1] http://www.hausarbeiten.de/faecher/vorschau/147360.html [2] http://us.trendmicro.com/us/trendwatch/current-threat activity/undergroundeconomy/index.html [3] http://www.w3.org/2008/09/msnws/papers/NETWORKS_LEGAL_PROBLEMS.PDF [4] http://www.dailymail.co.uk/news/article-1197562/MI6-chief-blows-cover-wifes-Facebook- account-revealsfamily-holidays-showbiz-friends-links-David-Irving.html [5] http://www.onrec.com/newsstories/17612.asp [6] http://www.scmagazineus.com/Facebook-bloggers-reveal-way-to-peek-at-private- profiles/article/138867/ [7] http://blogs.computerworld.com/twitter_stalkdaily_mikeyy_xss_worm [8] http://www.betanews.com/article/CrossSite-Scripting-Worm-Hits-MySpace/1129232391