CFP last date
20 June 2024
Call for Paper
July Edition
IJCA solicits high quality original research papers for the upcoming July edition of the journal. The last date of research paper submission is 20 June 2024

Submit your paper
Know more
Reseach Article

Social Media� A Mode for Cyber Attacks

Published on August 2018 by Surbhi Jain, Ashwarya Arora, Shelja Sharma
National Conference on Networking, Cloud Computing, Analytics and Computing Technology
Foundation of Computer Science USA
NCNCCACT2017 - Number 1
August 2018
Authors: Surbhi Jain, Ashwarya Arora, Shelja Sharma
1ea8b4e7-3771-4aa6-aba4-fc217d45c01f

Surbhi Jain, Ashwarya Arora, Shelja Sharma . Social Media� A Mode for Cyber Attacks. National Conference on Networking, Cloud Computing, Analytics and Computing Technology. NCNCCACT2017, 1 (August 2018), 14-23.

@article{
author = { Surbhi Jain, Ashwarya Arora, Shelja Sharma },
title = { Social Media� A Mode for Cyber Attacks },
journal = { National Conference on Networking, Cloud Computing, Analytics and Computing Technology },
issue_date = { August 2018 },
volume = { NCNCCACT2017 },
number = { 1 },
month = { August },
year = { 2018 },
issn = 0975-8887,
pages = { 14-23 },
numpages = 10,
url = { /proceedings/ncnccact2017/number1/29778-7010/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Networking, Cloud Computing, Analytics and Computing Technology
%A Surbhi Jain
%A Ashwarya Arora
%A Shelja Sharma
%T Social Media� A Mode for Cyber Attacks
%J National Conference on Networking, Cloud Computing, Analytics and Computing Technology
%@ 0975-8887
%V NCNCCACT2017
%N 1
%P 14-23
%D 2018
%I International Journal of Computer Applications
Abstract

Online networking is a platform, used to portray the collaboration of people in which they produce and share their views. The effect about social networks with respect to youngsters may be critical. Kids are experiencing childhood encompassed by versatile gadgets like tabs, mobile phones, laptops etcetera. Consequently, sites such as Twitter, MySpace and Facebook have become a regular part of their life. The social system is transforming those ways, over which youngsters connect to their parents & peers. The impacts of social media are twofold. The positive side is that, one can improve their skills, be more expressive and seek business opportunities. On the other hand, its negative side includes cyber crimes like cyber bullying, identity theft, loss and misuse of credentials. The purpose of this paper is to bridge the gap in the existing literature by exploring the predecessors of information disclosure of social media users. We present a systematic study of various Security Issues and Challenges in Social Networks. This paper also, throws light on the Procedure of Execution of various Attacks, Actions, Effects, Examples & Various Protective measures, pertaining to risks and crimes observed in social media platforms. Further, work can be done in the direction of developing an efficient mitigation technique to prevent various attacks.

References
  1. Kim, H. J. (2012). Online social media networking and assessing its security risks. International Journal of Security and Its Applications. 6 (3). 11-18.
  2. Internet. (2017, May 15). Retrieved May 17, 2017, from https://en. wikipedia. org/wiki/Internet.
  3. Hendricks, D. (2013, May 06). Complete History of Social Media: Then And Now. Retrieved May 17, 017, from https://smallbiztrends. com/2013/05/the-complete-history-of-social-media-infographic. html.
  4. Kumar, A. , Gupta, S. K. , Rai, A. K. , & Sinha, S. (2013). Social networking sites and their security issues. International Journal of Scientific and Research Publications. 3(4). 1-5.
  5. Yang, W. , Cui, X. , Liu, J. , & Liu, Y. (2016). Identification of Potential Collective Actions Using Enhanced Gray System Theory of Social Media. IEEE Access. 4. 9184-9192.
  6. Hao, J. , Hao, J. , Dai, H. , & Dai, H. (2016). Social media content and sentiment analysis on consumer security breaches. Journal of Financial Crime. 23(4). 855-869.
  7. J. O' Donovan and Barry Smyth, "Trust in Recommenders Systems, "IUI'05, pp. 167-174, ACM, 2005, New York, USA.
  8. Bo Fu, "Trust Management in Online Social Networks, "M. Sc. Dissertation, Department of Computer Science, University of Dublin, Trinity College, pp. 5-12, 2007.
  9. He, W. (2012). A review of social media security risks and mitigation techniques. Journal of Systems and Information Technology, 14(2), 171-180.
  10. Wüest, C. (2010). The risks of social networking. Symantec Corporation.
  11. Kunwar, R. S. , & Sharma, P. (2016, April). Social media: A new vector for cyber attack. In Advances in Computing, Communication, & Automation (ICACCA) (Spring), International Conference on (pp. 1-5). IEEE.
  12. Magee, T. (2017, February 15). Most dangerous new cyber security threats 2017. Retrieved May 17, 2017, from http://www. computerworlduk. com/galleries/security/most-dangerous-new-cyber-security-threats-2017-3654719/.
  13. What is Ransomware and 15 Easy Steps To Keep Your System Protected [Updated]. (2017, May 15). Retrieved May 17, 2017, from https://heimdalsecurity. com/blog/what-is-ransomware-protection/.
  14. Staff, S. X. (2017, May 10). Hospitals must be prepared for ransomware attacks. Retrieved May 17, 2017, from https://medicalxpress. com/news/2017-05-hospitals-ransomware. html.
  15. Security 101: Business Process Compromise. (n. d. ). Retrieved May 17, 2017, from https://www. trendmicro. com/vinfo/us/security/news/cybercrime-and-digital-threats/security-101-business-process-compromise.
  16. What is a Botnet & How to Your PC From Being Enslaved. (2016, November 04). Retrieved May 17, 2017, from https://heimdalsecurity. com/blog/all-about-botnets/.
  17. Dima Bekerman (2017, March 30). New Mirai Variant. Retrieved March 30, 2017, from https://www. incapsula. com/blog/new-mirai-variant-ddos-us-college. html.
  18. Schneier, B. (2017, April 06). Why website takedowns and other Internet mischief are still increasing. Retrieved May 17, 2017, from https://www. technologyreview. com/s/603500/10-breakthrough-technologies-2017-botnets-of-things/.
  19. Mitigate botnets in five steps. (n. d. ). Retrieved May 17, 2017, from http://searchsecurity. techtarget. com/tip/Mitigate-botnets-in-five-steps.
  20. CEO. (n. d. ). Retrieved May 17, 2017, from http://www. thecsuite. co. uk/ceo/information-technology-ceo/protecting-your-employees-from-spear-phishing-attacks/.
  21. Spear Phishing Attacks and Countermeasures. (2016, October 04). Retrieved May 18, 2017, from http://resources. infosecinstitute. com/spear-phishing-attacks-and-countermeasures-to-mitigate-against-them/.
  22. How Ransomware Spreads and Works. (n. d. ). Retrieved May 17, 2017, from http://combofix. org/how-ransomware-spreads-and-works. php.
  23. What is the possible impact of Ransomware? (n. d. ). Retrieved May 18, 2017, from https://security. berkeley. edu/faq/ransomware/what-possible-impact-ransomware.
  24. Catalin Cimpanu (2016, October 27). Botnet of 100,000 IoT Devices Behind Dyn DDoS Attack. Retrieved October 27, 2016, from news. softpedia. com › News › Security › Incidents.
  25. A. (2017, February 28). Phishing, vishing and smishing. Retrieved May 18, 2017, from http://www. actionfraud. police. uk/fraud-az-vishing.
  26. C. (2016, April 14). Survey Reveals Spear Phishing as a Top Security Concern to Enterprises. Retrieved May 18, 2017, from https://blog. cloudmark. com/2016/01/13/survey-spear-phishing-a-top-security-concern-to-enterprises/.
  27. WannaCry Ransomware Attack. Retrieved May 12, 2017, from https://en. wikipedia. org/wiki/WannaCry_ransomware_attack.
  28. Gambhir, M. , & Doja, M. N. (2015, February). Novel Trust Computation Architecture for Users Accountability in Online Social Networks. In Computational Intelligence & Communication Technology (CICT), 2015 IEEE International Conference on (pp. 725-731). IEEE.
  29. Al Hasib, A. (2009). Threats of online social networks. IJCSNS International Journal of Computer Science and Network Security. 9(11). 288-93.
  30. Spear Phishing: Real Life Examples. (2017, March 02). Retrieved June 14, 2017, from http://resources. infosecinstitute. com/spear-phishing-real-life-examples/#gref.
  31. The Five Step Ransomware Defence Playbook. (n. d. ). Retrieved June 15, 2017, from http://itspmagazine. com/from-the-newsroom/the-five-step-ransomware-defence-playbook. 7 steps hackers take to execute a successful cyber attack. (2016, February 03). Retrieved June 15, 2017, from http://www. information-age. com/7-steps-hackers-take-execute-successful-cyber-attack-123460872.
  32. 7 Steps hackers take to execute a successful cyber attack. (2016, February 2003). Retrieved June 15, 2017, from http://www. information-age. com/7-steps-hackers-take-execute-successfule-cyber-attack-123460872.
  33. Nijhuis, J. W. (2017). Effect of IoT botnets on Cryptocurrency from semanticsScholar. org.
  34. M. , Zavarsky, P. & Lindskog, D. (2016). Experimental Analysis of Ransomware on Windows and Android Platforms: Evolution and Characterization. Procedia Computer Science. 94. 465-472.
  35. Halevi, T. , Memon, N. & Nov, O. Spear-Phishing in the Wild: A Real-World Study of Personality, Phishing Self-efficacy and Vulnerability to Spear-Phishing Attacks.
  36. Barjis, J. (2008). The importance of business process modelling in software system design. Science of Computer Programming. 71. 73-87.
Index Terms

Computer Science
Information Sciences

Keywords

Social Networking Iot Botnet Spear Phishing Ransomware Mitigation Techniques