{"title":"在线社交网络的安全风险评估:一项详细调查","authors":"Piyali De, Sandip Dey","doi":"10.1109/ICRCICN.2017.8234523","DOIUrl":null,"url":null,"abstract":"Millions of users harvest their personal information (photo, video, status) on different online social networks (OSNs). Hence, these rich repositories of sensitive information attract the eyes of adversary to launch variety of cyber attacks on OSN. Here we have identified all crucial threats on social network that may lead to severe risks. In this paper, we have formalized possible social network risks into two types depending upon the origin of risk. Risks are presented here along with impact factor and control measures to mitigate the outcome of the security threats. The relationship between risks and basic security properties has been presented in tabular format. Finally we provide three case studies on identity theft.","PeriodicalId":166298,"journal":{"name":"2017 Third International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Security risk assessment in online social networking: A detailed survey\",\"authors\":\"Piyali De, Sandip Dey\",\"doi\":\"10.1109/ICRCICN.2017.8234523\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Millions of users harvest their personal information (photo, video, status) on different online social networks (OSNs). Hence, these rich repositories of sensitive information attract the eyes of adversary to launch variety of cyber attacks on OSN. Here we have identified all crucial threats on social network that may lead to severe risks. In this paper, we have formalized possible social network risks into two types depending upon the origin of risk. Risks are presented here along with impact factor and control measures to mitigate the outcome of the security threats. The relationship between risks and basic security properties has been presented in tabular format. Finally we provide three case studies on identity theft.\",\"PeriodicalId\":166298,\"journal\":{\"name\":\"2017 Third International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN)\",\"volume\":\"8 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 Third International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICRCICN.2017.8234523\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 Third International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICRCICN.2017.8234523","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Security risk assessment in online social networking: A detailed survey
Millions of users harvest their personal information (photo, video, status) on different online social networks (OSNs). Hence, these rich repositories of sensitive information attract the eyes of adversary to launch variety of cyber attacks on OSN. Here we have identified all crucial threats on social network that may lead to severe risks. In this paper, we have formalized possible social network risks into two types depending upon the origin of risk. Risks are presented here along with impact factor and control measures to mitigate the outcome of the security threats. The relationship between risks and basic security properties has been presented in tabular format. Finally we provide three case studies on identity theft.