Wa0009
Wa0009
Introduction
to
Online Social Networks
Faculty:
Dr. Brijesh Kr. Gupta
Professor, MCA Dept.
CoE- Cyber Security
Introduction:
Professor J. A. Barnes has introduced the term
"Social Network" in 1967 to describe the
associations of people drawn together by family,
work, hobby etc.; for emotional, instrumental,
appraisal and information support.
● TikTok
Founded in 2016 by Chinese tech company Bytem Dance,
this short-form video-sharing site was merged with the
U.S.-based mobile app Musical.ly in 2018 and became
popular with American teens and young adults. As of early
2020, it had more than 800 million users worldwide.
Benefits of Social Media
Organization’s
Strengthens & Builds
message will reach a Engages Constituents
Relationships
wider audience
Mobilizes constituents
Easier and broader
Facilitates around issues that are
dissemination of
Collaboration important to them
information
and creates advocates
Purposes
Education
There are endless benefits of the social media for the
teachers and students. With the help of social media, the
students can easily educate the professionals and
experts in the field.
Connectivity
The biggest benefit of the social media is connectivity.
The users can connect with the people from any part of
the world.
Promotion
The users can promote their business to a bigger
audience. It doesn’t matter they have an offline or online
business, the social media can help them in many ways.
Help
The users can share their issues with the online
community for getting help and suggestions.
Security Issues in On Line
Social Media
About the Problem:
As the area of online social networking develops and many
online services add social features to their offerings, the
definition of online social networking services broadens.
Online social networking services range from social interaction
centered sites such as Facebook or MySpace, to information
disseminationcentric services such as Twitter or Google
Buzz, to social interaction features added to existing sites and
services such as Flickr or Amazon.
Each of these services has different characteristics of social
interaction and different vulnerabilities to attack.
The value of online social networking sites stems from the fact
that people spend large amounts of time on these networks
updating their personal profiles, browsing for social or
professional interactions, or taking part in socialoriented online
applications and events
People nowadays have become immersed in their
preferred online social environments, creating an
exciting entanglement between their real and virtual
identities.
However, this immersion also holds great peril for
users, their friends, and their employers, and may
even endanger national security.
There is much information in the patterns of
communication between users and their peers.
These patterns are affected by many relationship
and context factors and can be used in a reverse
direction to infer the relationship and context.
Later on, these relationships can be further used to deduce
additional private information which was intended to remain
undisclosed.
In other cases, this problem can become even worse due to
the (false) assumption
of users that information marked as “private” will remain
private and will not be disclosed by the network. Indeed,
although the operators of social networks rarely betray the
confidence of their users, no security mechanism is perfect.
Because these networks often use standard (and not
necessarily updated) security methods, a determined attacker
can sometimes gain access to such unauthorized information.
The combination of sensitive private information managed by
users who are not securityaware in an environment that is
not hermetically sealed is a sure cause of frequent leaks of
private information and identity thefts.
Problem in Organizational Perspectives:
This problem becomes even more threatening
when viewed from the corporate (or even national)
perspective. Users who possess sensitive
commercial or security related information are
expected to be under strict control in their
workplaces.
However, while interacting virtually in social
networks, these same people often tend to ignore
precautions due to a false sense of intimacy and
privacy, all the while being unaware of the damage
their naive behavior may cause.
Because it is hard (and sometimes illegal) to
monitor the behavior of online social network
users, these platforms constitute a significant
threat to the safety and privacy of sensitive
information.
Hard to detect and almost impossible to prevent,
leaks of business, military, or government data
through social networks could become the
security epidemic of the twenty-first century
Security-Guidelines for OSNs User
• Nowadays, online social media and network have
become an integral part of everyone’s life. As the
reputation of these social sites grows, so do the risks of
using them.
• The number of users increases exponentially every
year. So, it becomes a necessity to secure users on
these platforms.
• Below are some security-guidelines for users which
they can practice keeping themselves reasonably
secure. We have tried to give security-guidelines in two
ways. First, it has been described in a general form and
then it is described platform-wise.
For Social Connection Platform
(1)Users should learn about the privacy and security setting for
different social media platforms and use them. Each platform has its
own privacy and security setting. Every platform provides settings,
configuration, and privacy sections to limit who and what groups can
see various aspects of the user’s profile. The privacy setting provided
by the sites as default should not be adopted as it is.
(2)The more details provided, the easier it is for an adversary to use
that information to steal identity or to commit other cybercrimes.
Thus, information sharing should be limited.
(3)Before accepting a friend request, one should
completely check the profile of the requester. One can
make different groups for sharing different kinds of
information like a different group for colleagues and family.
(4)Before posting any information on the profile,
employees should know their company’s policy over
sharing any content online on social networks.
Reasons for Social Media Security
Issues:
Trust Management in Online Social
Networks
In recent years, there is a dramatic
growth in number and popularity of
online social networks.
There are many networks available with
more than I00 million regis tered users
such as Facebook, MySpace, QZone,
Windows Live Spaces etc.
within the networks about an item which
may be a product or service.
People may connect, discover and
share by using these online social
networks.
The exponential growth of online
communities in the area of social
networks attracts the attention of the
researchers about the importance of
managing trust in online environment.
Users of the online social networks
may share their experiences and
opinions
The user faces the problem of
evaluating trust in a service or
service provider before making a
choice.
Recommendations may be
received through a chain of
friends net work, so the
problem for the user is to be
able to evaluate various types of
trust opinions and
recommendations.
● We have seen that trust plays an extremely
important role in online social communities, as
well as in people’s lives; however, there are
some challenges in applying trust in online
social communities First of all, we have to
represent trust in a computational model.
● Trust is not easy to model in a computational
way because of its subjective property.
● Also, it cannot be applied directly in online
social communities due to different features
that online social communities have from
traditional social networks.
• For example in real life, people only have a
limited number of friends to evaluate, but this
number explodes in online social communities.
On Facebook and Twitter, users can have
thousands of friends.
• Apart from this, in real life, trust is developed
slowly over time, based on face-to-face social
experiences; however, this is very difficult in
online social communities due to the large
number of potential friends.
• Therefore, trust in online social communities
must be computational such that it can be
processed by computers.
Identity Management
in
On line Social Networks
Identity management (IdM) generally describes
the management of user identities and their rights
to access resources throughout the identity life
cycle, according to users' rights and restrictions
associated with the established identities. Identity
management systems provide services and
technologies for controlling user access to critical
information.
● Among these services and technologies, the
most well known include Active Directory,
Identity Providers, Digital Identities, Password
Managers, Single Sign-on, Security Tokens,
Security Token Services (STS), Open ID, WS
Security, WS-Trust, SAML 2.0, and OAuth.
● The development of Web 2.0 technologies has
led to the definition of the concept of Online
Identity Management (OIM), whose meaning it
twofold.
• When it refers to online image management or
online personal branding or personal reputation
management (PRM), OIM is a set of methods for
generating a distinguished Web presence of a
person on the Internet.
That presence could be reflected in any kind of
content that refers to the person, including news,
participation in blogs and forums, personal
websites, social media presence, pictures, videos,
etc.
But online identity management also refers to identity
disclosure and identity theft, and has particularly been
developed in the management of online identity in social
network services.
In OSNs, aspects belonging to both meanings constitute an
integral part of the identity construction process on these sites.
Due to impression management, i.e., "the process through
which people try to control the impressions other people form
of them"-one of whose objectives is in particular to increase the
online reputation of the person-users provide a lot of personal
information concerning their identities.
This identity disclosure brings to mind several identity attacks
which are particularly insidious in online social networks.
Sensitive personal data" means such personal
data, which may, reveal, be related to, or
constitute:
• (i) financial data;
• (ii) health data;
• (iii) official identification
• (vi) biometric data;
• (vii) genetic data;
• (viii) transgender status;
• (x) caste or tribe;
• (xi) religious or political belief or affiliation; or
• (xii) any other data categorized as sensitive
personal data under section 15.
What Information is Public?
There are two kinds of information that can be gathered about a user from a
social network: information that is shared and information gathered through
electronic tracking.
Strategize Listen
BE CREATIVE
Social Network APIs
• Social media websites were initially designed to
confined user experience within four walls of their
web page. However, to increase their user base
and to expand beyond only desktop accessible
websites, these social networks started developing
API.
• Those who are into social media programming
must be aware of term Social Network API
(Application Programming Interface), that majority
of social media platforms are providing these days
for a developer to interact with the social network,
get some demographic data, find out details about
a users, posts etc, or to create a new service like
Tweetdeck (Twitter).
Application Programming Interface
(API)
• This is a platform provided by the social networks
allowing other applications and websites to pull the social
media data and integrate with their site or application.
Since social network is itself providing this platform so we
can obviously assume that it’s just a puppet.
• They are providing limited features, call or queries that
can be performed by developer and they require
developer to generate an API Key before using the API.
This key is like your Aadhaar Card.
• If someone does anything wrong or we can say if
someone try to do anything malicious using an API,
he/she will be caught using this API Key.
Developments Leads by API Access
• Developers used API to develop browser-based
games or game applications that allow users to sign
in using social media credentials and thus allowing
the user to compete with any other person using
that platform.
• Have you ever seen Candy Crush Request on
Facebook Notification Page, or ever wondered why
games like Subway surfers allow the user to get
more points/coins by signing up using Facebook
credentials? Just to get the user social data to be
more effective in targeting the customer
• These days barely there is any website or web
application that doesn’t provide the option to sign-in
using the social media account (Facebook, Google etc.)
credentials.
• The main motive is to get the social media data, for
advertising their website or application using user’s
account or to display advertisements on the website or
application as per the demographic data collected from
linked social media account.
• Have you ever seen a Google Map embedded on a web
page? This all is feasible with the advent of Google Maps
API, that allows developers to embed Google Maps on
any webpage or any page of an application using
JavaScript or Flash Interface.
• This API is designed to work on both desktop and mobile
devices.
Major Players:
Major Players in the market like Facebook, Google etc
released the first iteration of their API in the early 2000s.
• Ebay released its first developer toolset in 2000 in the
hope that it will expand its business but it was not until
2005 that the API was fully open for the use.
• Amazon released its first API in 2002 allowing developers
to extract data regarding wishlist of a customer, product
reviews etc. Since then Amazon has also released API for
its web services and Alexa.
• Google has released first API for its search engine in April
2002 allowing developers to do approx 1000 automated
search queries. Today there are thousands of API are
available for different google services. Thus, resulting in
thousands of applications.
• Facebook launched its API in the year 2006. Facebook Developer API
was one of the first API to be released as platform specific API. Today
Facebook provides Graph API with the Open Stream API being the
latest.
• YouTube first released it’s API in 2008. It lets you add YouTube videos
to your website or application, analyse a YouTube channels
demographics. YouTube API includes YouTube Data API, YouTube
Analytics API, YouTube Live Streaming API and many more.
• Twitter API was first released in September 2006. Twitter offers two
sets of API: REST API and Search API. REST API allows to access core
Twitter Data and the job of Search API is to provide access to search
and Trends Data.
• Instagram API was first released in April 2014. It allows developer to
build applications that can analyse user posts and help users to
manage their own posts.
There are so many other social media sites like Pinterest, Flickr, LinkedIn
etc. Each having their own API’s, supporting developer to build
application that can integrate data from these social media sites on a
website or in an application.
Report for Security and Privacy in Social
Networks / 201507
India: The Personal Data Protection Bill 2019
On Line Related Research Papers
Gupta Brijesh Kr., FDP Session on “ Data
Protection & Social Media”, 22nd Dec., 2020
Sri Aurobindo Institute of Technology, Indore
References: Gupta Brijesh Kr., “ GDPR & Governance”,
ITU Course on Cyber Security for
Enterprises , 10th 15th Oct., 2019, India
Gupta, Brijesh Kr., Lecture Series on
“Securing Cyber Space”
Pics from Google Search Engine
Contact Details
brijesh.gupta@miet.ac.in
Mob. +91-9958598789