SlideShare ist ein Scribd-Unternehmen logo
1 von 22
Downloaden Sie, um offline zu lesen
Security in Social Networks 1
“SECURITY IN SOCIAL NETWORKS”
Hernández Castro Araceli
Tenorio Martínez Arlethe
February, 2014
Security in Social Networks 2
ABSTRAC
Social networking has had a great impact today, have grown exponentially and
store a lot of private information about its users and their interactions, data stored
with all these social networks can attract malicious persons to harass, defame, do
spam and phishing.
The respective advantages of social networks are known well worldwide but talk
about privacy and security on them is of little people, which is why it is necessary
to talk about safety, how to optimize how and the proper use thereof, subject of this
article. To mention security in the social web is a key point in the passwords we
use for our accounts, which must be combined with numbers, letters and
characters for your safety.
A simple option is to make good use of social networks and not creating a very
personal inquisition, the protection is paramount importance in social network
research as private users, may cause undesirable or harmful effects on the
personal life.
Security in Social Networks 3
KEYWORDS
Internet ---------------------- Internet
Inseguridad ---------------- Insecurity
Privacidad ----------------- Privacy
Seguridad ----------------- Security
Redes Sociales ---------- Social Networks
Security in Social Networks 4
INTRODUCTION
Social networks are based on the Theory of Six Degrees of Separation, as this
anyone can be connected elsewhere in the world through a chain of acquaintances
that has no more than five intermediaries, connecting two people with only six
bonds. The theory was first proposed in 1929 by Frigyes Karinthy. The concept is
based on the idea that the known number grows exponentially with the number of
links in the chain, and only a small number of links are required for known
assembly becomes the entire human population.
The number of users in social networks has increased considerably in recent
years, to be part of social networks the user must register, usually for free, and
then complete a series of forms with your personal data, hobbies, personal photo
etc. We see this as a simple means of maintaining communication with our
surroundings, we see and publish photos, share feelings and thoughts, but do you
really know about the people who will see the other side of the computer or some
other means are?
In recent years, the popularity and the trust of social networks are being exploited
by cybercriminals, who have found a new way of exploiting their fraudulent
activities. The rise of social networking has taken the concept of privacy to a
dangerous terrain in which the vulnerability of each person on the network
increases. It is advisable to consider some points that can protect our data if we
use online social networks.
Security in Social Networks 5
CHAPTER I: NETWORKS
ANTECEDENTS
Social networks are based on the Theory of Six Degrees of Separation, whereby
anyone can be connected to any other in the world through a chain of
acquaintances that has no more than five intermediaries, connecting people with
only two six bonds. This theory attempts to prove that our grandparents saying "the
world is a handkerchief," that is, that anyone on Earth can be connected to any
other person through a chain of acquaintances that has no more than five levels
intermediaries. (PANDA, 2008, p. 4)
Figure 1.1.1 theory of six degrees of separation.
The origin of social networks goes back to 1995 when Randy Conrads
classmates.com website created with the objective that people could regain or
maintain contact with former classmates from school, college or university.
(PANDA, 2008, p. 3)
With the advent of Internet, network par excellence, has given rise to hundreds of
sites that facilitate the formation of social networks in relation to their academic
status, your workplace, your geographic region, interests, hobbies, taste, among
others.
Security in Social Networks 6
SOCIAL NETWORK
A network is an abstract way to visualize a number of systems, and in general,
almost all complex systems.
Figure 1.1.2 The Rise of Social Networks
When talking about social networks refers to those services where users can
create a personal profile and interact with other users is. These platforms allow you
to interact through messages, share information, pictures or videos, so that these
publications are immediately visible for all the users form their group of contacts.
To join them you must register by filling out a series of forms with personal details,
photographs, etc. Normally just create a basic profile, and from there to provide all
the information about yourself that you want to increase the data provided to the
network. (INTECO, 2010)
Figure 1.1.3 The Rise of Social Networks2
Security in Social Networks 7
Social networks show clear network effects, the greater the number of users and
the more rich and complex profiles are created, more capacity has the social
network to get new users, and present value as an advertising platform or as a
platform for submission of applications or services.
In this sense, Privacy management represents one of the key elements for social
networking, not only by the need to comply with relevant legal obligations, but by
the perception of users regarding the use and visibility of their data, which can put
the privacy policies employed as a competitive factor among different social
networks.
ADVANTAGES
 Revisiting known.
 Opportunity to join Flashmobs (short meetings via online for games and
entertainment in order to mobilize thousands of people).
 Excellent for promoting new contacts affective as matchmaking, friendship
or sharing interests nonprofit.
 Share special moments with those close to our lives.
 Dilute geographical boundaries and serve to connect people regardless of
distance.
 Perfect for connections to the professional world.
 Get updates on topics of interest information, and let you attend events,
participate in events and conferences.
 Communication can be in real time.
 Can generate mass movements of solidarity in a crisis situation.
Security in Social Networks 8
Figure 1.1.4 Advantages of Social Networking
DISADVANTAGES
Apart from the general disadvantages (invasion of privacy, lack of security,
addiction) has emerged a new disadvantage arising from boredom or boredom of
some who have proposed anti social networks such as travesty to authentic.
 In the same way the happy customers to write good reviews of a product,
annoying customers also write about their bad experience. These comments
can be viewed by thousands of people in a short time and affect the image
of any business in weeks or even days.
 A further disadvantage is the loss of privacy. Suddenly we become
accessible to anyone and is not always good. Avoid revealing sensitive
information how phone numbers, addresses not to mention bank accounts
and passwords.
Figure 1.1.5 Disadvantages of Social Networks
Security in Social Networks 9
CHAPTER II: PRIVACY
SECURITY
Joined this public display of your privacy is a lack of security. There is too much
personal information rolling around, and little assurance that is well protected.
Participation in social networks is not without risks, such as identity theft. Even the
most careful users may provide personal information to strangers without realizing
it, to download and install an application designed by third parties that include
games, contests, contests of knowledge and virtual gifts. People entering these
networks think that information is considered private, can see only friends or
specific groups, but programmers sometimes used to bring together users with
similar interests. Sometimes used to broadcast advertising aimed at specific
sectors, taking into account things like age and gender.
The magnificent growth of social networking sites has changed the way of
communication, creating messages often unintelligible to users. Shared ideas and
dysfunction of the information is difficult to understand. Although the process of
transmitting information is perhaps easier and more comfortable, the amount of
information that can be run from one country to another in seconds is unlimited and
cannot control. Another disadvantage found in social networks, we can not be
certain that the information set out is there genuine or true.
Many companies have made the move to the new era and have established social
networks have caution when carrying a message. The companies aim networks,
but many managers and owners of the same fear for what employees can say
about them and the reputation that you provide to them. Public relations company
can not control what your employees commenting, but if you teach ethics and
responsibility that each must have.
Security in Social Networks 10
PRIVACY
Today, the rise of social networks has led to the concept of privacy dangerous
territory in which the vulnerability of each person on the network increases. If we
use them, you should keep in mind some points that can protect our data online.
Privacy is a set of practices that divide public and private things. In this regard, let
us start from the point of view that privacy and confidentiality are imperative part of
computational activity. Thus, the problems that surround conflict systematically for
information security become, in many cases go beyond computer science.
At first glance, these problems would not impact such a sensitive issue as the
consequences of social engineering attacks, or maybe a little more dangerous as it
can be the subject of kidnapping, extortion and even "bullying" or "bullying" to
children and youth. (BOURBON Sanabria, 2012)
Intimacy and privacy is a right that anyone has. But with social networking privacy
is in check. Having a profile on social networks is almost a necessity to keep in
touch with family, friends or work. Few people who are not on Facebook, Twitter or
other social network. The problem that arises with these is privacy affected.
Numbers, ideology, religion or directions are some of the data they can get to
appear in the profiles of social networks. That's why you have to be more cautious
about sharing personal information. Public sharing of sensitive information that
may be more dangerous, beyond that there are few confirmed cases of
kidnappings, theft or fraud cases generated from the networks. (GRIVA, 2011)
The issue of privacy in social networks has increased relative to other online
services due to the ease with which users reveal personal information, as well as
the lack of awareness of these on the risks involved and the difficulty of some
users configured appropriately for such tools. (RODOTA, 2011)
Security in Social Networks 11
PRIVACY IN THE CONTEXT OF SOCIAL NETWORKS
Anonymity of the user's identity
Protecting the actual identity of users, changes depending on which social network
we are registered. In social networks like Facebook, people use their own name as
such listing, to make them easier to locate users and especially to locate them
within the social network.
Everything we put on the net, stays on the net, so we must be careful what we do
not harm us or get into problematic situations.
But on social networks like Twitter, usually people can put aliases or addresses of
your own web page as a profile.
Privacy of personal space
The visibility of the user profile in a social network to another varies, in some
networks profiles can be found by doing a search on Google, such as Facebook or
Twitter; however the social network Tuenti this is not possible, is completely closed
to people registered on the website. This part also entered the profiles that may or
may not see people.
Depending on a social network or another, the default permissions are public or
private. Facebook takes a different approach by default; users who are on the
same subnet can view other profiles, unless a profile has decided to deny
permission for your subnet. As mentioned above, most social networks allow
friends to see aggregate profiles you're seeing.
As we have said, in most networks, you can see the list of friends we have,
although there are exceptions either because the social network itself gives you the
option to hide your friends list or because you hacked the profile from exit.
Security in Social Networks 12
Privacy of user communication
A part of the data we provide to the social networks, as our photos, our comments
etc. A user of the social network discloses additional data, such as connection
time, the IP address used (and of course, their geographical location), visited
profiles, messages sent and received, i.e., a whole log of personal information
about what we've done while we were in the social network. All this should be
private, remember that an IP address in a period is unique, identifying a single
person, and it is illegal publication without user consent.
All this is summarized in that privacy must be present in both the social network
and information sharing (photos, messages etc.), and logs that are recorded in this
social network. Unauthorized entities should not know the contents of private data
sent and received via the network.
This aspect of the privacy of the data involves data confidentiality and anonymity of
homeowners, and must have access control. Access to information about a user
can only be granted by the user. Unauthorized entities, nor should they be able to
link the private data with the profile owner.
Security in Social Networks 13
FRAUD IN SOCIAL NETWORKS
Identity Theft
Identity theft is a crime in which a person appropriates personal information to
commit fraud or other crimes. This a problem that affects millions of people
annually in the United States, including children who are victims of child identity
theft.
 We can all take steps to prevent identity theft, but unfortunately sometimes
it depends on vulnerability in the computer systems or carelessness of
others who have access to our personal data.
 If you think someone has stolen your personal information without your
permission, know what steps to take to report identity theft and protect your
money and your credit and reputation.
 It is also important to learn how to protect your privacy, both personal and
financial, medical and Internet, to control what information is shared with
others and what it is used. Take care of your personal data in transactions
and avoid becoming a victim of identity theft.
Malware
Malware (malicious software) is a term that describes a variety of programs that
are installed on the computers of users usually through deception. The malware
can multiply quickly through social networks, infected user's computer and then
expand to the computers of your contacts. This is because the malware may
appear to come from a trusted contact, and therefore users are more likely to click
on links or downloading malicious software.
Some of the most common techniques for propagation of malware are:
Security in Social Networks 16
 Short URLs, especially those that appear in the area of updates or news
updates. This may cause the user to download a virus or visit a site that
attempts to download malware onto your computer.
 Messages that appear to come from reliable sources that invite the user to
click on a link, view a video or download a file.
 An email that appears to come from the same social networking site, which
requests information or asks the user to click on a link.
 Third-party applications that infect computers with malicious software,
which spreads through contact.
 False security alerts. These are applications that are passed by a virus
protection program and informs the user that your safety program is expired
or has detected a threat.
Social Engineering
An absolute truth, in terms of information security, is the weakest link in the chain is
the user human. This means that it is easier to attack a person and obtain
information or actions of this that violate achieve an information system that is
secured, shielded and protected against possible attackers. This leads to the
definition of social engineering:
"Art and science of manipulating people into performing actions that may be of
interest or goal" Chris Hadnagy.
"An act of manipulating people and develop actions or disclose".
In short one can speak of social engineering as a kind of human hacking.
Now and in the hacking work is performed to obtain information (Information
Gathering) of a possible target, just as obtaining information is the basis of social
engineering attacks, with the difference that normally the objective of attack will be
a person, a human, and for this you need to delve into every possible media
Security in Social Networks 16
containing target information possible, this containing target information possible,
this is where the Internet and social networks appears.
From the perspective of a social engineer, any information about the person aims,
can contribute to form a profile or outline of tastes, haunts, activities performed,
place of work and activities, among other data. That is why without a doubt; social
media can provide a lot of information that can be useful. Next, let's look at a short
table that spans some data can get to get through these information systems:
Table 1. Data obtained through social networks
SOCIAL NETWORK /
PLATFORM
INFORMATION OBTAINED UTILITY
Facebook / G+ / Hi5/Badoo
/ ...
• moods
• Visits
• pictures
• Interests
• Family
•
Relationships
• Etc.
These
networks
provide a lot of
general
information
about the
person and
their contacts.
Twitter / Myspace / BBM /
...
• moods
• Visits
• pictures
• Interests
Establish a list
of activities,
psychological
profile, sites
visited,
information
consulted and
tastes of the
individual.
MySpace / Grooveshark /
LastFM / ...
• Music heard
• Musical
Tastes
Set a profile of
preferences
and musical
tastes.
Linkedin/... • State labor
• Knowledge
• Wage
Assignment
• Studies in
process
Identify job
profile of the
person, current
job, past,
education,
knowledge,
interests, work,
etc..
Security in Social Networks 16
Foursquare / ... • Visits
• Gourmet
Tastes
Allows
geoposicionar
people and
places
frequented
identify
possible
demonstrations
or through
travel.
Flickr / Picasa / ... • Visits
• individual
tastes
• Environment
in which the
individual
develops
Establish a list
of activities,
psychological
profile, visited
places and
tastes of the
individual.
Now, knowing that I usually have information published by these systems, taking
into account that this information can be indexed in search engines with or without
the consent of the user, it is necessary to validate both being shared.
Security in Social Networks 17
SAFETY STANDARDS
To understand the challenge of balancing security and privacy, sociability and
usability have to see the main standards of network security.
 Notice: Requires that information is accessible only to authorized entities. It
is vital in social networking misuse because information could have serious
consequences on the lives of people.
 Integrity: Requires that information be modified only by authorized entities.
 Availability: Requires that system resources are always available.
 Non-repudiation: To provide protection against a user other then denying he
made some communication.
Security in Social Networks 18
RESULTS
According to statistics based on a September 2013 report of eBizMBA Rank, one
of the largest networks is visited Facebook than 750 million unique visitors per
month.
As for the surveys conducted by ESET Latin America in July 2013, noted that the
total Latin American users surveyed 51.4% said using social networks to work.
Although communication with friends and family (85.6%), and the study (53.6%)
are the reasons most often cited by users regarding the use of social networks, the
fact that a little over half share corporate data and the job position as the third
largest in the graph (51.4%) reason, shows that companies and corporate users
also use these media for business purposes:
Security in Social Networks 19
On the other hand, face the question about the level of security of information
stored on the servers of social networks, 52.2% think that their information is
slightly insecure:
Security in Social Networks 20
DISCUSSION
Today, most people is recessed in the world of technology, make use of the tools
offered by Web 2.0 and is favorable because they remain on the advantages they
offer, but hey that is the problem we focus on the benefits, we settle for being
communicated with our friends, colleagues or even knowing other people. Most are
not aware of what we publish and if there are no privacy in the media, such
information can be read or take any user on the network and to misuse it in order
to cause any damage to our person.
The security and privacy begins with ourselves, of what we publish, we discuss
and permissions that grant, we are aware of our attitudes toward the media is true
has many advantages if we give the proper use but it is also appropriate to provide
for the consequences resulting for inappropriate behavior.
In conclusion, the study of security and privacy in social networks allows us to be
alert to himself about our behaviors to make use of them, as we all realize the
problems appear for privacy by the lack of knowledge by the user options that can
be enabled to restrict certain account data. The technology is advancing, social
networks evolve but we must focus regarding security and privacy to our person to
make use of them.
Security in Social Networks 21
GRATITUDE
This article is written with an expression of gratitude to teacher Valeriano Orozco
Meztli and our fellow reviewers who provided moral support for writing this.
Araceli&Arlethe
Security in Social Networks 22
REFERENCES
BORBÓN Sanabria , J. S. (2012). Seguridad.
FUNDACIÓN TELEFÓNICA. (2012). El debate sobre la privacidad y seguridad en
la Red: Regulación y mercados. Fundación Telefónica.
GOUJON, A. (21 de Agosto de 2013). welivesecurity. Recuperado el 15 de Mayo
de 2014, de http://www.welivesecurity.com/la-es/2013/08/21/51-usuarios-
latinoamericanos-utiliza-redes-sociales-fines-corporativos/
RODOTÁ, S. (2011). Social Networks and children's privacy. Reus.
INTECO, I. (17 de 05 de 2010). Seguridad de La Información y Redes Sociales.
GRIVA, J. P. (19 de 09 de 2011). Privacidad en las redes Sociales. Recuperado el
12 de 04 de 2014, de http://redaccion1.bligoo.com.ar/la-privacidad-en-las-
redes-sociales
PANDA, S. (28 de 08 de 2008). PandaLabs. Recuperado el 10 de Abril de 2014,
de http://www.pandasecurity.com/img/enc/Red_Soc_punto_mira.pdf

Weitere ähnliche Inhalte

Was ist angesagt?

Cfadw presentation
Cfadw presentationCfadw presentation
Cfadw presentationguestf8d4d6f
 
Cfadw Presentation
Cfadw PresentationCfadw Presentation
Cfadw Presentationguest09025b
 
Misuse of social media
Misuse of social mediaMisuse of social media
Misuse of social mediaAM Oh
 
How Safe Is YOUR Social Network?
How Safe Is YOUR Social Network?How Safe Is YOUR Social Network?
How Safe Is YOUR Social Network?Blue Coat
 
Professional and Ethical Impact of Using Social Networking in a Professional ...
Professional and Ethical Impact of Using Social Networking in a Professional ...Professional and Ethical Impact of Using Social Networking in a Professional ...
Professional and Ethical Impact of Using Social Networking in a Professional ...Claudia Romeo GurreaNozaleda
 
Social network privacy guide
Social network privacy guideSocial network privacy guide
Social network privacy guideYury Chemerkin
 
Final presentation future of personal relationships
Final presentation  future of personal relationshipsFinal presentation  future of personal relationships
Final presentation future of personal relationshipsJaya1gy
 
Social network privacy & security
Social network privacy & securitySocial network privacy & security
Social network privacy & securitynadikari123
 
SOCIAL Networking Sites
SOCIAL Networking SitesSOCIAL Networking Sites
SOCIAL Networking SitesAshley Surabhi
 
The pros and cons of social media
The pros and cons of social mediaThe pros and cons of social media
The pros and cons of social mediaSally Loan
 
Privacy and social media
Privacy and social mediaPrivacy and social media
Privacy and social mediaAbirAhmed48
 
Multi facet trust model for online social network environment
Multi facet trust model for online social network environmentMulti facet trust model for online social network environment
Multi facet trust model for online social network environmentIJNSA Journal
 
Security threats in social networks
Security threats in social networksSecurity threats in social networks
Security threats in social networksTannistho Ghosh
 
How to study trust online
How to study trust onlineHow to study trust online
How to study trust onlineTina Guenther
 
We Didn't Say That! - Minimizing Risk Via Social Media Policies
We Didn't Say That! - Minimizing Risk Via Social Media PoliciesWe Didn't Say That! - Minimizing Risk Via Social Media Policies
We Didn't Say That! - Minimizing Risk Via Social Media PoliciesDave Tinker, CFRE
 
Minimizing Risk Via Social Media Policies
Minimizing Risk Via Social Media PoliciesMinimizing Risk Via Social Media Policies
Minimizing Risk Via Social Media PoliciesDave Tinker, CFRE
 
Social Media In The Workplace - CASLIS Workshop Jan2009
Social Media In The Workplace - CASLIS Workshop Jan2009Social Media In The Workplace - CASLIS Workshop Jan2009
Social Media In The Workplace - CASLIS Workshop Jan2009Hamilton Public Library
 
Social Media and Inclusion
Social Media and InclusionSocial Media and Inclusion
Social Media and InclusionJason Scott
 

Was ist angesagt? (19)

Cfadw presentation
Cfadw presentationCfadw presentation
Cfadw presentation
 
Cfadw Presentation
Cfadw PresentationCfadw Presentation
Cfadw Presentation
 
Misuse of social media
Misuse of social mediaMisuse of social media
Misuse of social media
 
How Safe Is YOUR Social Network?
How Safe Is YOUR Social Network?How Safe Is YOUR Social Network?
How Safe Is YOUR Social Network?
 
Professional and Ethical Impact of Using Social Networking in a Professional ...
Professional and Ethical Impact of Using Social Networking in a Professional ...Professional and Ethical Impact of Using Social Networking in a Professional ...
Professional and Ethical Impact of Using Social Networking in a Professional ...
 
Social network privacy guide
Social network privacy guideSocial network privacy guide
Social network privacy guide
 
Final presentation future of personal relationships
Final presentation  future of personal relationshipsFinal presentation  future of personal relationships
Final presentation future of personal relationships
 
Social network privacy & security
Social network privacy & securitySocial network privacy & security
Social network privacy & security
 
Social Media and Identity
Social Media and IdentitySocial Media and Identity
Social Media and Identity
 
SOCIAL Networking Sites
SOCIAL Networking SitesSOCIAL Networking Sites
SOCIAL Networking Sites
 
The pros and cons of social media
The pros and cons of social mediaThe pros and cons of social media
The pros and cons of social media
 
Privacy and social media
Privacy and social mediaPrivacy and social media
Privacy and social media
 
Multi facet trust model for online social network environment
Multi facet trust model for online social network environmentMulti facet trust model for online social network environment
Multi facet trust model for online social network environment
 
Security threats in social networks
Security threats in social networksSecurity threats in social networks
Security threats in social networks
 
How to study trust online
How to study trust onlineHow to study trust online
How to study trust online
 
We Didn't Say That! - Minimizing Risk Via Social Media Policies
We Didn't Say That! - Minimizing Risk Via Social Media PoliciesWe Didn't Say That! - Minimizing Risk Via Social Media Policies
We Didn't Say That! - Minimizing Risk Via Social Media Policies
 
Minimizing Risk Via Social Media Policies
Minimizing Risk Via Social Media PoliciesMinimizing Risk Via Social Media Policies
Minimizing Risk Via Social Media Policies
 
Social Media In The Workplace - CASLIS Workshop Jan2009
Social Media In The Workplace - CASLIS Workshop Jan2009Social Media In The Workplace - CASLIS Workshop Jan2009
Social Media In The Workplace - CASLIS Workshop Jan2009
 
Social Media and Inclusion
Social Media and InclusionSocial Media and Inclusion
Social Media and Inclusion
 

Ähnlich wie Security in social network araceli&arlethe

Social network privacy.
Social network privacy.Social network privacy.
Social network privacy.STO STRATEGY
 
Social Networking Websites and Image Privacy
Social Networking Websites and Image PrivacySocial Networking Websites and Image Privacy
Social Networking Websites and Image PrivacyIOSR Journals
 
Social Network: Good or Bad
Social Network: Good or BadSocial Network: Good or Bad
Social Network: Good or Badmanesh Makheja
 
Social network privacy
Social network privacySocial network privacy
Social network privacySTO STRATEGY
 
advantagesanddisadvantagesofsocialmedia-151211192046.pdf
advantagesanddisadvantagesofsocialmedia-151211192046.pdfadvantagesanddisadvantagesofsocialmedia-151211192046.pdf
advantagesanddisadvantagesofsocialmedia-151211192046.pdfRinkiSharma51
 
advantagesanddisadvantagesofsocialmedia-151211192046.pptx
advantagesanddisadvantagesofsocialmedia-151211192046.pptxadvantagesanddisadvantagesofsocialmedia-151211192046.pptx
advantagesanddisadvantagesofsocialmedia-151211192046.pptxHimabindu905359
 
Advantages and disadvantages of social media
Advantages and disadvantages of social mediaAdvantages and disadvantages of social media
Advantages and disadvantages of social mediaAlan Raj
 
Advantages and disadvantages of social media
Advantages and disadvantages of social mediaAdvantages and disadvantages of social media
Advantages and disadvantages of social mediaAlan Raj
 
Effects of Social Media on Young Adults
Effects of Social Media on Young AdultsEffects of Social Media on Young Adults
Effects of Social Media on Young AdultsRatan Rajpal
 
Social Network Service
Social Network ServiceSocial Network Service
Social Network ServiceMary Stevenson
 
Social networking boon or a bane
Social networking boon or a baneSocial networking boon or a bane
Social networking boon or a baneAbhishek Sharma
 
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docxRunning Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docxtodd521
 
Social Media & Enterprise Security Whitepaper
Social Media & Enterprise Security WhitepaperSocial Media & Enterprise Security Whitepaper
Social Media & Enterprise Security WhitepaperSchleighS
 
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...IRJET Journal
 
IE business school slide
IE business school slideIE business school slide
IE business school slideAvi Levy
 

Ähnlich wie Security in social network araceli&arlethe (20)

Social network privacy.
Social network privacy.Social network privacy.
Social network privacy.
 
Social Networking Websites and Image Privacy
Social Networking Websites and Image PrivacySocial Networking Websites and Image Privacy
Social Networking Websites and Image Privacy
 
Social Network: Good or Bad
Social Network: Good or BadSocial Network: Good or Bad
Social Network: Good or Bad
 
L017146571
L017146571L017146571
L017146571
 
Social network privacy
Social network privacySocial network privacy
Social network privacy
 
Social Networking Sites Essay
Social Networking Sites EssaySocial Networking Sites Essay
Social Networking Sites Essay
 
IS SOCIAL PRIVACY POSSIBLE?
IS SOCIAL PRIVACY POSSIBLE?IS SOCIAL PRIVACY POSSIBLE?
IS SOCIAL PRIVACY POSSIBLE?
 
advantagesanddisadvantagesofsocialmedia-151211192046.pdf
advantagesanddisadvantagesofsocialmedia-151211192046.pdfadvantagesanddisadvantagesofsocialmedia-151211192046.pdf
advantagesanddisadvantagesofsocialmedia-151211192046.pdf
 
advantagesanddisadvantagesofsocialmedia-151211192046.pptx
advantagesanddisadvantagesofsocialmedia-151211192046.pptxadvantagesanddisadvantagesofsocialmedia-151211192046.pptx
advantagesanddisadvantagesofsocialmedia-151211192046.pptx
 
Advantages and disadvantages of social media
Advantages and disadvantages of social mediaAdvantages and disadvantages of social media
Advantages and disadvantages of social media
 
Advantages and disadvantages of social media
Advantages and disadvantages of social mediaAdvantages and disadvantages of social media
Advantages and disadvantages of social media
 
Effects of Social Media on Young Adults
Effects of Social Media on Young AdultsEffects of Social Media on Young Adults
Effects of Social Media on Young Adults
 
Social Network Service
Social Network ServiceSocial Network Service
Social Network Service
 
Social networking boon or a bane
Social networking boon or a baneSocial networking boon or a bane
Social networking boon or a bane
 
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docxRunning Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
Running Head SOCIAL NETWORKS DATA PRIVACY POLICIES1.docx
 
Case Study Of RHEAL
Case Study Of RHEALCase Study Of RHEAL
Case Study Of RHEAL
 
Social Media & Enterprise Security Whitepaper
Social Media & Enterprise Security WhitepaperSocial Media & Enterprise Security Whitepaper
Social Media & Enterprise Security Whitepaper
 
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
 
IE business school slide
IE business school slideIE business school slide
IE business school slide
 
Ppt2
Ppt2Ppt2
Ppt2
 

Mehr von tecnologico de tuxtepec (12)

SEGURIDAD EN LAS REDES SOCIALES_Araceli&Arlethe
SEGURIDAD EN LAS REDES SOCIALES_Araceli&ArletheSEGURIDAD EN LAS REDES SOCIALES_Araceli&Arlethe
SEGURIDAD EN LAS REDES SOCIALES_Araceli&Arlethe
 
PROYECTO FINAL
PROYECTO FINALPROYECTO FINAL
PROYECTO FINAL
 
Proyecto exposición
Proyecto exposiciónProyecto exposición
Proyecto exposición
 
Proyecto exposición
Proyecto exposiciónProyecto exposición
Proyecto exposición
 
Proyecto exposición
Proyecto exposiciónProyecto exposición
Proyecto exposición
 
Justificación
JustificaciónJustificación
Justificación
 
Justificación
JustificaciónJustificación
Justificación
 
Proyecto cbta (1)
Proyecto cbta (1)Proyecto cbta (1)
Proyecto cbta (1)
 
Codigo etico de un ingeniero en sistemas computacionales
Codigo etico de un ingeniero en sistemas computacionalesCodigo etico de un ingeniero en sistemas computacionales
Codigo etico de un ingeniero en sistemas computacionales
 
Codigo etico de un ingeniero en sistemas computacionales
Codigo etico de un ingeniero en sistemas computacionalesCodigo etico de un ingeniero en sistemas computacionales
Codigo etico de un ingeniero en sistemas computacionales
 
Resumen
ResumenResumen
Resumen
 
Fund. investigacion 25-agosto-2010[1]subir al blog
Fund. investigacion 25-agosto-2010[1]subir al blogFund. investigacion 25-agosto-2010[1]subir al blog
Fund. investigacion 25-agosto-2010[1]subir al blog
 

Kürzlich hochgeladen

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 

Kürzlich hochgeladen (20)

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 

Security in social network araceli&arlethe

  • 1. Security in Social Networks 1 “SECURITY IN SOCIAL NETWORKS” Hernández Castro Araceli Tenorio Martínez Arlethe February, 2014
  • 2. Security in Social Networks 2 ABSTRAC Social networking has had a great impact today, have grown exponentially and store a lot of private information about its users and their interactions, data stored with all these social networks can attract malicious persons to harass, defame, do spam and phishing. The respective advantages of social networks are known well worldwide but talk about privacy and security on them is of little people, which is why it is necessary to talk about safety, how to optimize how and the proper use thereof, subject of this article. To mention security in the social web is a key point in the passwords we use for our accounts, which must be combined with numbers, letters and characters for your safety. A simple option is to make good use of social networks and not creating a very personal inquisition, the protection is paramount importance in social network research as private users, may cause undesirable or harmful effects on the personal life.
  • 3. Security in Social Networks 3 KEYWORDS Internet ---------------------- Internet Inseguridad ---------------- Insecurity Privacidad ----------------- Privacy Seguridad ----------------- Security Redes Sociales ---------- Social Networks
  • 4. Security in Social Networks 4 INTRODUCTION Social networks are based on the Theory of Six Degrees of Separation, as this anyone can be connected elsewhere in the world through a chain of acquaintances that has no more than five intermediaries, connecting two people with only six bonds. The theory was first proposed in 1929 by Frigyes Karinthy. The concept is based on the idea that the known number grows exponentially with the number of links in the chain, and only a small number of links are required for known assembly becomes the entire human population. The number of users in social networks has increased considerably in recent years, to be part of social networks the user must register, usually for free, and then complete a series of forms with your personal data, hobbies, personal photo etc. We see this as a simple means of maintaining communication with our surroundings, we see and publish photos, share feelings and thoughts, but do you really know about the people who will see the other side of the computer or some other means are? In recent years, the popularity and the trust of social networks are being exploited by cybercriminals, who have found a new way of exploiting their fraudulent activities. The rise of social networking has taken the concept of privacy to a dangerous terrain in which the vulnerability of each person on the network increases. It is advisable to consider some points that can protect our data if we use online social networks.
  • 5. Security in Social Networks 5 CHAPTER I: NETWORKS ANTECEDENTS Social networks are based on the Theory of Six Degrees of Separation, whereby anyone can be connected to any other in the world through a chain of acquaintances that has no more than five intermediaries, connecting people with only two six bonds. This theory attempts to prove that our grandparents saying "the world is a handkerchief," that is, that anyone on Earth can be connected to any other person through a chain of acquaintances that has no more than five levels intermediaries. (PANDA, 2008, p. 4) Figure 1.1.1 theory of six degrees of separation. The origin of social networks goes back to 1995 when Randy Conrads classmates.com website created with the objective that people could regain or maintain contact with former classmates from school, college or university. (PANDA, 2008, p. 3) With the advent of Internet, network par excellence, has given rise to hundreds of sites that facilitate the formation of social networks in relation to their academic status, your workplace, your geographic region, interests, hobbies, taste, among others.
  • 6. Security in Social Networks 6 SOCIAL NETWORK A network is an abstract way to visualize a number of systems, and in general, almost all complex systems. Figure 1.1.2 The Rise of Social Networks When talking about social networks refers to those services where users can create a personal profile and interact with other users is. These platforms allow you to interact through messages, share information, pictures or videos, so that these publications are immediately visible for all the users form their group of contacts. To join them you must register by filling out a series of forms with personal details, photographs, etc. Normally just create a basic profile, and from there to provide all the information about yourself that you want to increase the data provided to the network. (INTECO, 2010) Figure 1.1.3 The Rise of Social Networks2
  • 7. Security in Social Networks 7 Social networks show clear network effects, the greater the number of users and the more rich and complex profiles are created, more capacity has the social network to get new users, and present value as an advertising platform or as a platform for submission of applications or services. In this sense, Privacy management represents one of the key elements for social networking, not only by the need to comply with relevant legal obligations, but by the perception of users regarding the use and visibility of their data, which can put the privacy policies employed as a competitive factor among different social networks. ADVANTAGES  Revisiting known.  Opportunity to join Flashmobs (short meetings via online for games and entertainment in order to mobilize thousands of people).  Excellent for promoting new contacts affective as matchmaking, friendship or sharing interests nonprofit.  Share special moments with those close to our lives.  Dilute geographical boundaries and serve to connect people regardless of distance.  Perfect for connections to the professional world.  Get updates on topics of interest information, and let you attend events, participate in events and conferences.  Communication can be in real time.  Can generate mass movements of solidarity in a crisis situation.
  • 8. Security in Social Networks 8 Figure 1.1.4 Advantages of Social Networking DISADVANTAGES Apart from the general disadvantages (invasion of privacy, lack of security, addiction) has emerged a new disadvantage arising from boredom or boredom of some who have proposed anti social networks such as travesty to authentic.  In the same way the happy customers to write good reviews of a product, annoying customers also write about their bad experience. These comments can be viewed by thousands of people in a short time and affect the image of any business in weeks or even days.  A further disadvantage is the loss of privacy. Suddenly we become accessible to anyone and is not always good. Avoid revealing sensitive information how phone numbers, addresses not to mention bank accounts and passwords. Figure 1.1.5 Disadvantages of Social Networks
  • 9. Security in Social Networks 9 CHAPTER II: PRIVACY SECURITY Joined this public display of your privacy is a lack of security. There is too much personal information rolling around, and little assurance that is well protected. Participation in social networks is not without risks, such as identity theft. Even the most careful users may provide personal information to strangers without realizing it, to download and install an application designed by third parties that include games, contests, contests of knowledge and virtual gifts. People entering these networks think that information is considered private, can see only friends or specific groups, but programmers sometimes used to bring together users with similar interests. Sometimes used to broadcast advertising aimed at specific sectors, taking into account things like age and gender. The magnificent growth of social networking sites has changed the way of communication, creating messages often unintelligible to users. Shared ideas and dysfunction of the information is difficult to understand. Although the process of transmitting information is perhaps easier and more comfortable, the amount of information that can be run from one country to another in seconds is unlimited and cannot control. Another disadvantage found in social networks, we can not be certain that the information set out is there genuine or true. Many companies have made the move to the new era and have established social networks have caution when carrying a message. The companies aim networks, but many managers and owners of the same fear for what employees can say about them and the reputation that you provide to them. Public relations company can not control what your employees commenting, but if you teach ethics and responsibility that each must have.
  • 10. Security in Social Networks 10 PRIVACY Today, the rise of social networks has led to the concept of privacy dangerous territory in which the vulnerability of each person on the network increases. If we use them, you should keep in mind some points that can protect our data online. Privacy is a set of practices that divide public and private things. In this regard, let us start from the point of view that privacy and confidentiality are imperative part of computational activity. Thus, the problems that surround conflict systematically for information security become, in many cases go beyond computer science. At first glance, these problems would not impact such a sensitive issue as the consequences of social engineering attacks, or maybe a little more dangerous as it can be the subject of kidnapping, extortion and even "bullying" or "bullying" to children and youth. (BOURBON Sanabria, 2012) Intimacy and privacy is a right that anyone has. But with social networking privacy is in check. Having a profile on social networks is almost a necessity to keep in touch with family, friends or work. Few people who are not on Facebook, Twitter or other social network. The problem that arises with these is privacy affected. Numbers, ideology, religion or directions are some of the data they can get to appear in the profiles of social networks. That's why you have to be more cautious about sharing personal information. Public sharing of sensitive information that may be more dangerous, beyond that there are few confirmed cases of kidnappings, theft or fraud cases generated from the networks. (GRIVA, 2011) The issue of privacy in social networks has increased relative to other online services due to the ease with which users reveal personal information, as well as the lack of awareness of these on the risks involved and the difficulty of some users configured appropriately for such tools. (RODOTA, 2011)
  • 11. Security in Social Networks 11 PRIVACY IN THE CONTEXT OF SOCIAL NETWORKS Anonymity of the user's identity Protecting the actual identity of users, changes depending on which social network we are registered. In social networks like Facebook, people use their own name as such listing, to make them easier to locate users and especially to locate them within the social network. Everything we put on the net, stays on the net, so we must be careful what we do not harm us or get into problematic situations. But on social networks like Twitter, usually people can put aliases or addresses of your own web page as a profile. Privacy of personal space The visibility of the user profile in a social network to another varies, in some networks profiles can be found by doing a search on Google, such as Facebook or Twitter; however the social network Tuenti this is not possible, is completely closed to people registered on the website. This part also entered the profiles that may or may not see people. Depending on a social network or another, the default permissions are public or private. Facebook takes a different approach by default; users who are on the same subnet can view other profiles, unless a profile has decided to deny permission for your subnet. As mentioned above, most social networks allow friends to see aggregate profiles you're seeing. As we have said, in most networks, you can see the list of friends we have, although there are exceptions either because the social network itself gives you the option to hide your friends list or because you hacked the profile from exit.
  • 12. Security in Social Networks 12 Privacy of user communication A part of the data we provide to the social networks, as our photos, our comments etc. A user of the social network discloses additional data, such as connection time, the IP address used (and of course, their geographical location), visited profiles, messages sent and received, i.e., a whole log of personal information about what we've done while we were in the social network. All this should be private, remember that an IP address in a period is unique, identifying a single person, and it is illegal publication without user consent. All this is summarized in that privacy must be present in both the social network and information sharing (photos, messages etc.), and logs that are recorded in this social network. Unauthorized entities should not know the contents of private data sent and received via the network. This aspect of the privacy of the data involves data confidentiality and anonymity of homeowners, and must have access control. Access to information about a user can only be granted by the user. Unauthorized entities, nor should they be able to link the private data with the profile owner.
  • 13. Security in Social Networks 13 FRAUD IN SOCIAL NETWORKS Identity Theft Identity theft is a crime in which a person appropriates personal information to commit fraud or other crimes. This a problem that affects millions of people annually in the United States, including children who are victims of child identity theft.  We can all take steps to prevent identity theft, but unfortunately sometimes it depends on vulnerability in the computer systems or carelessness of others who have access to our personal data.  If you think someone has stolen your personal information without your permission, know what steps to take to report identity theft and protect your money and your credit and reputation.  It is also important to learn how to protect your privacy, both personal and financial, medical and Internet, to control what information is shared with others and what it is used. Take care of your personal data in transactions and avoid becoming a victim of identity theft. Malware Malware (malicious software) is a term that describes a variety of programs that are installed on the computers of users usually through deception. The malware can multiply quickly through social networks, infected user's computer and then expand to the computers of your contacts. This is because the malware may appear to come from a trusted contact, and therefore users are more likely to click on links or downloading malicious software. Some of the most common techniques for propagation of malware are:
  • 14. Security in Social Networks 16  Short URLs, especially those that appear in the area of updates or news updates. This may cause the user to download a virus or visit a site that attempts to download malware onto your computer.  Messages that appear to come from reliable sources that invite the user to click on a link, view a video or download a file.  An email that appears to come from the same social networking site, which requests information or asks the user to click on a link.  Third-party applications that infect computers with malicious software, which spreads through contact.  False security alerts. These are applications that are passed by a virus protection program and informs the user that your safety program is expired or has detected a threat. Social Engineering An absolute truth, in terms of information security, is the weakest link in the chain is the user human. This means that it is easier to attack a person and obtain information or actions of this that violate achieve an information system that is secured, shielded and protected against possible attackers. This leads to the definition of social engineering: "Art and science of manipulating people into performing actions that may be of interest or goal" Chris Hadnagy. "An act of manipulating people and develop actions or disclose". In short one can speak of social engineering as a kind of human hacking. Now and in the hacking work is performed to obtain information (Information Gathering) of a possible target, just as obtaining information is the basis of social engineering attacks, with the difference that normally the objective of attack will be a person, a human, and for this you need to delve into every possible media
  • 15. Security in Social Networks 16 containing target information possible, this containing target information possible, this is where the Internet and social networks appears. From the perspective of a social engineer, any information about the person aims, can contribute to form a profile or outline of tastes, haunts, activities performed, place of work and activities, among other data. That is why without a doubt; social media can provide a lot of information that can be useful. Next, let's look at a short table that spans some data can get to get through these information systems: Table 1. Data obtained through social networks SOCIAL NETWORK / PLATFORM INFORMATION OBTAINED UTILITY Facebook / G+ / Hi5/Badoo / ... • moods • Visits • pictures • Interests • Family • Relationships • Etc. These networks provide a lot of general information about the person and their contacts. Twitter / Myspace / BBM / ... • moods • Visits • pictures • Interests Establish a list of activities, psychological profile, sites visited, information consulted and tastes of the individual. MySpace / Grooveshark / LastFM / ... • Music heard • Musical Tastes Set a profile of preferences and musical tastes. Linkedin/... • State labor • Knowledge • Wage Assignment • Studies in process Identify job profile of the person, current job, past, education, knowledge, interests, work, etc..
  • 16. Security in Social Networks 16 Foursquare / ... • Visits • Gourmet Tastes Allows geoposicionar people and places frequented identify possible demonstrations or through travel. Flickr / Picasa / ... • Visits • individual tastes • Environment in which the individual develops Establish a list of activities, psychological profile, visited places and tastes of the individual. Now, knowing that I usually have information published by these systems, taking into account that this information can be indexed in search engines with or without the consent of the user, it is necessary to validate both being shared.
  • 17. Security in Social Networks 17 SAFETY STANDARDS To understand the challenge of balancing security and privacy, sociability and usability have to see the main standards of network security.  Notice: Requires that information is accessible only to authorized entities. It is vital in social networking misuse because information could have serious consequences on the lives of people.  Integrity: Requires that information be modified only by authorized entities.  Availability: Requires that system resources are always available.  Non-repudiation: To provide protection against a user other then denying he made some communication.
  • 18. Security in Social Networks 18 RESULTS According to statistics based on a September 2013 report of eBizMBA Rank, one of the largest networks is visited Facebook than 750 million unique visitors per month. As for the surveys conducted by ESET Latin America in July 2013, noted that the total Latin American users surveyed 51.4% said using social networks to work. Although communication with friends and family (85.6%), and the study (53.6%) are the reasons most often cited by users regarding the use of social networks, the fact that a little over half share corporate data and the job position as the third largest in the graph (51.4%) reason, shows that companies and corporate users also use these media for business purposes:
  • 19. Security in Social Networks 19 On the other hand, face the question about the level of security of information stored on the servers of social networks, 52.2% think that their information is slightly insecure:
  • 20. Security in Social Networks 20 DISCUSSION Today, most people is recessed in the world of technology, make use of the tools offered by Web 2.0 and is favorable because they remain on the advantages they offer, but hey that is the problem we focus on the benefits, we settle for being communicated with our friends, colleagues or even knowing other people. Most are not aware of what we publish and if there are no privacy in the media, such information can be read or take any user on the network and to misuse it in order to cause any damage to our person. The security and privacy begins with ourselves, of what we publish, we discuss and permissions that grant, we are aware of our attitudes toward the media is true has many advantages if we give the proper use but it is also appropriate to provide for the consequences resulting for inappropriate behavior. In conclusion, the study of security and privacy in social networks allows us to be alert to himself about our behaviors to make use of them, as we all realize the problems appear for privacy by the lack of knowledge by the user options that can be enabled to restrict certain account data. The technology is advancing, social networks evolve but we must focus regarding security and privacy to our person to make use of them.
  • 21. Security in Social Networks 21 GRATITUDE This article is written with an expression of gratitude to teacher Valeriano Orozco Meztli and our fellow reviewers who provided moral support for writing this. Araceli&Arlethe
  • 22. Security in Social Networks 22 REFERENCES BORBÓN Sanabria , J. S. (2012). Seguridad. FUNDACIÓN TELEFÓNICA. (2012). El debate sobre la privacidad y seguridad en la Red: Regulación y mercados. Fundación Telefónica. GOUJON, A. (21 de Agosto de 2013). welivesecurity. Recuperado el 15 de Mayo de 2014, de http://www.welivesecurity.com/la-es/2013/08/21/51-usuarios- latinoamericanos-utiliza-redes-sociales-fines-corporativos/ RODOTÁ, S. (2011). Social Networks and children's privacy. Reus. INTECO, I. (17 de 05 de 2010). Seguridad de La Información y Redes Sociales. GRIVA, J. P. (19 de 09 de 2011). Privacidad en las redes Sociales. Recuperado el 12 de 04 de 2014, de http://redaccion1.bligoo.com.ar/la-privacidad-en-las- redes-sociales PANDA, S. (28 de 08 de 2008). PandaLabs. Recuperado el 10 de Abril de 2014, de http://www.pandasecurity.com/img/enc/Red_Soc_punto_mira.pdf