DOC PREVIEW
WUSTL CSE 571S - Social Network Security: A Brief Overview of Risks and Solutions

This preview shows page 1-2-3-4-5 out of 14 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 14 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 14 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 14 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 14 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 14 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 14 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Social Network Security: A Brief Overview of Risksand SolutionsEdward Wang, [email protected] (A project report written underthe guidance of Prof. Raj Jain)DownloadAbstractIn this study, we present the various aspects of social, network and physical security related with the use ofsocial networks, by introducing the mechanisms behind each and summarizing relevant security studies andevents related to each topic. It has been long understood that the widespread use of social networking sites canprovide attackers with new and devastating attack vectors. In this study we attempt to dive deeper into eachmode of security threat, as well as confirm the security risk associated with each topic by providing real worldfinancial / social consequences. We recognize that while organizations and individuals may have legitimatebusiness / personal uses for social networks, we recommend specific actions be taken to bolster stronger userawareness, more secure software designs as well as better organizational accountability.KeywordsSocial network security, social engineering, XSS, CSRF, DoS, stalking, OpenID, Facebook, twitter, LinkedIn,phishing, information theft, identity, identity hijacking, malware, worms, firewall, corporate securityContents1 Abstract2 Keywords3 Contents4 Introduction5 Social Engineering 5.1 Information Leakage & Theft 5.1.1 Mechanism 5.1.2 Consequences 5.1.3 Possible Remedy 5.2 Phishing 5.2.1 Mechanism 5.2.2 Consequences 5.2.3 Possible Remedy 5.3 Identify Hijacking 5.3.1 Mechanism 5.3.2 Consequences 5.3.3 Possible RemedySocial Network Security: A Brief Overview of Risks and Solutionshttp://www.cse.wustl.edu/~jain/cse571-09/ftp/social/index.html 1 of 146 Physical Security 6.1 Stalking 6.1.1 Mechanism 6.1.2 Consequences 6.1.3 Possible Remedy7 Malware 7.1 Cross-Site Reference Forgery (CSRF) & Cross-Site Scripting (XSS) 7.1.1 Mechanism 7.1.2 Consequences 7.1.3 Possible Remedy8 Conclusion and Advice9 Bibliography10 List of Acronyms11 Last Date ModifiedIntroductionFor a newcomer to the internet arena, social networking sites are an ever more popular way for people to stayconnected. Some might even venture to say business opportunities are formed and lost online, as our webpresence becomes an integral part of our personal lives. In an era where our online identity not onlyovershadows our actual identity, but other key financial and personal systems as well, the potential securityrisks associated with these social networks cannot be stressed enough.Over the years, researchers and hackers alike have identified a handful of security risks ranging from people,process to application. The purpose of this study is to give a sweeping overview of the major security topicssurrounding social networks today, and introduce the underlying mechanisms behind each. We follow up withsome tangible consequences that each risk might have, and finally provide a direction to look at in terms ofsolutions.Social EngineeringInformation Leakage & TheftMechanismScope of VisibilityMost people when asked will agree that not everyone they know is their best friend; there are the mereacquaintances all the way to those with whom we share our deepest secrets, along with many shades inbetween. However the widespread phenomena of social networking sites has added new meaning to friends:two people are often "friends or not" (D, 2004). While social networks may not necessarily increase strongties, it certainly does very little for weak ties. One may have a couple of close friends and thousands of distantfriends, and a social network may simply categorize them all as "friends."More contacts aren't necessarily a bad thing; the problem is who has access to our information? Socialnetworking sites provide a certain level of access control, but most people do not take the effort to configureSocial Network Security: A Brief Overview of Risks and Solutionshttp://www.cse.wustl.edu/~jain/cse571-09/ftp/social/index.html 2 of 14these properly. As a result, everyone ends up with equal access rights. To make matters worse, oftentimesinformation travels through several hops of "friends," and by the idea of six degrees of separation it seemsunreasonable to assume we are far from the bad guys.Use of Real Names and Personal InformationAs an added bonus, social networking sites contain information that is either mostly real or easily identified asfake. For the sole purpose of keeping up with friends in a seemingly trustworthy domain, people have verylittle incentive to falsify information on Facebook. The same idea goes for sites like MySpace and LinkedIn.See figure 1 for a recent study at Carnegie Melon University (Gross & Acquisti, 2005).Similar results exist for other sensitive information, such as birthdates, education history and hometown. Infact, a group of Taiwanese researchers have gone on to propose automated identification systems for name,age and education record inference on a different social network with good results (Lam, Chen, & Chen,2008)Breadth of Available InformationIn the same CMU study, Gross and Acquisti go on to show the sheer amount of information available simplywithin the CMU Facebook realm. (Gross & Acquisti, 2005) Again, most users make very little effort tosubdivide access privileges to different parts of their profile. By the same line of logic as names and birthdates,we have very little reason to doubt the validity of this information.Social Network Security: A Brief Overview of Risks and Solutionshttp://www.cse.wustl.edu/~jain/cse571-09/ftp/social/index.html 3 of 14Promiscuous Trust RelationshipsWithout taking into account the registration requirement relaxation for Facebook in the last year, users used toneed a valid academic e-mail address in order to enroll. The bulk of Facebook users still operate under thisassumption (as far as I can tell, the open Facebook doesn't bother the newcomers either), and we automaticallytrust whoever is in our network. Most campus networks are open and gaining a mail address is not difficult.Moreover, many users will gladly accept friend requests from people that aren't even in their network. (Jump,2005)As soon as a stranger connects with someone in a new network, he more or less inherits his friend's credentialswhen it comes to dealing with others in the same realm, giving him easy access to other users. As a bonus, thismay allow a malicious user to circumvent realm-based privacy settings.Data Protection CircumventionThose who are more privacy


View Full Document

WUSTL CSE 571S - Social Network Security: A Brief Overview of Risks and Solutions

Documents in this Course
IP sec

IP sec

28 pages

Load more
Download Social Network Security: A Brief Overview of Risks and Solutions
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Social Network Security: A Brief Overview of Risks and Solutions and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Social Network Security: A Brief Overview of Risks and Solutions 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?