194 research outputs found

    Cyber Security Concerns in Social Networking Service

    Get PDF
    Today’s world is unimaginable without online social networks. Nowadays, millions of people connect with their friends and families by sharing their personal information with the help of different forms of social media. Sometimes, individuals face different types of issues while maintaining the multimedia contents like, audios, videos, photos because it is difficult to maintain the security and privacy of these multimedia contents uploaded on a daily basis. In fact, sometimes personal or sensitive information could get viral if that leaks out even unintentionally. Any leaked out content can be shared and made a topic of popular talk all over the world within few seconds with the help of the social networking sites. In the setting of Internet of Things (IoT) that would connect millions of devices, such contents could be shared from anywhere anytime. Considering such a setting, in this work, we investigate the key security and privacy concerns faced by individuals who use different social networking sites differently for different reasons. We also discuss the current state-of-the-art defense mechanisms that can bring somewhat long-term solutions to tackling these threats

    Security, Privacy and Safety Risk Assessment for Virtual Reality Learning Environment Applications

    Full text link
    Social Virtual Reality based Learning Environments (VRLEs) such as vSocial render instructional content in a three-dimensional immersive computer experience for training youth with learning impediments. There are limited prior works that explored attack vulnerability in VR technology, and hence there is a need for systematic frameworks to quantify risks corresponding to security, privacy, and safety (SPS) threats. The SPS threats can adversely impact the educational user experience and hinder delivery of VRLE content. In this paper, we propose a novel risk assessment framework that utilizes attack trees to calculate a risk score for varied VRLE threats with rate and duration of threats as inputs. We compare the impact of a well-constructed attack tree with an adhoc attack tree to study the trade-offs between overheads in managing attack trees, and the cost of risk mitigation when vulnerabilities are identified. We use a vSocial VRLE testbed in a case study to showcase the effectiveness of our framework and demonstrate how a suitable attack tree formalism can result in a more safer, privacy-preserving and secure VRLE system.Comment: Tp appear in the CCNC 2019 Conferenc

    Major Security Issue That Facing Social Networks with Its Main Defense Strategies

    Get PDF
    The Social Network Service "SNS" has enabled significant advancements in a wide variety of scientific fields, and as a result, it has become an extremely popular subject in both academia and business. SNSs can be extremely beneficial to users because they eliminate economic and geographical barriers and can be used for job searching, entertainment and education. Regardless of the economic and social benefits, protecting businesses and users\u27 security and privacy remains a critical issue that must be addressed. It is critical to address and evaluate social network service challenges, as they vary according to the variety of SNS sites. Thus, by discussing SNS challenges alongside available and potential solutions, users, developers, and businesses can identify relevant and timely responses to specific threats, resulting in the best SNS-based services possible. The objective of this article is to discuss the inherent challenges of social networking sites and some critical solutions for resolving them. We extracted and analyzed seminal papers to add to the corpus of literature by focusing on several critical challenges in the social network service domain and shedding light on how these challenges affect a variety of domains, including users, sites, and business. The most frequently mentioned difficulties concerned privacy risks, anonymity risks, malware, spam, identity theft, phishing, business data, social content, technical issues, and psychological difficulties. By incorporating previously discovered solutions, this paper addressed these issues. The implications for both researchers and practitioners have been discussed

    Security issues and defences for Internet of Things

    Get PDF
    The Internet of Things (IoT) aims at linking billions of devices using the internet and other heterogeneous networks to share information. However, the issues of security in IoT environments are more challenging than with ordinary Internet. A vast number of devices are exposed to the attackers, and some of those devices contain sensitive personal and confidential data. For example, the sensitive flows of data such as autonomous vehicles, patient life support devices, traffic data in smart cities are extremely concerned by researchers from the security field. The IoT architecture needs to handle security and privacy requirements such as provision of authentication, access control, privacy and confidentiality. This thesis presents the architecture of IoT and its security issues. Additionally, we introduce the concept of blockchain technology, and the role of blockchain in different security aspects of IoT is discussed through a literature review. In case study of Mirai, we explain how snort and iptables based approach can be used to prevent IoT botnet from finding IoT devices by port scanning

    Smart City Open Data Network System: Openness, Security, and Privacy

    Get PDF
    Title from PDF of title page viewed July 12, 2018Thesis advisor: Baek-Young ChoiVitaIncludes bibliographical references (pages 54-58)Thesis (M.S.)--School of Computing and Engineering. University of Missouri--Kansas City, 2018The increasing concentration of population around the cities poses challenges in their operation and services. On the other hand, the current technological revolution allows scalable and innovative means to better serve the public. Many city governments are collecting, publishing and analyzing more data from diverse sources including IoT sensors. City government’s open data provides multiple values such as improving transparency of the government, enhancing the efficiency of its operations and services and attracting more businesses to the region. However, the resulting data systems, called Open Data Portals (ODPs) become more complicated and create the issues of accessibility, security, and privacy. Extensive analyses of ODPs of many cities around the world using diverse methodologies have been performed. We find that the extent of openness of data and popularity, and the level of security of ODPs are highly diverse across the cities. We then provide the recommendations for improving security measures of ODPs. Considering the privacy issues of data in ODPs, we provide a tool to automatically filtering Personally Identifiable Information (PII).Introduction -- Related work -- Smart City Open Data System internetworking -- Smart City Open System security -- Smart City Open Data (SCOD) openness -- Privacy issue analysis -- Conclusion and future work -- Appendix A. Security comparison ranking data for all cities -- Appendix B. Security comparison figures for all citie

    An Investigation into Possible Attacks on HTML5 IndexedDB and their Prevention

    Get PDF
    This thesis presents an analysis of, and enhanced security model for IndexedDB, the persistent HTML5 browser-based data store. In versions of HTML prior to HTML5, web sites used cookies to track user preferences locally. Cookies are however limited both in file size and number, and must also be added to every HTTP request, which increases web traffic unnecessarily. Web functionality has however increased significantly since cookies were introduced by Netscape in 1994. Consequently, web developers require additional capabilities to keep up with the evolution of the World Wide Web and growth in eCommerce. The response to this requirement was the IndexedDB API, which became an official W3C recommendation in January 2015. The IndexedDB API includes an Object Store, indices, and cursors and so gives HTML5 - compliant browsers a transactional database capability. Furthermore, once downloaded, IndexedDB data stores do not require network connectivity. This permits mobile web- based applications to work without a data connection. Such IndexedDB data stores will be used to store customer data, they will inevitably become targets for attackers. This thesis firstly argues that the design of IndexedDB makes it unavoidably insecure. That is, every implementation is vulnerable to attacks such as Cross Site Scripting, and even data that has been deleted from databases may be stolen using appropriate software tools. This is demonstrated experimentally on both mobile and desktop browsers. IndexedDB is however capable of high performance even when compared to servers running optimized local databases. This is demonstrated through the development of a formal performance model. The performance predictions for IndexedDB were tested experimentally, and the results showed high conformance over a range of usage scenarios. This implies that IndexedDB is potentially a useful HTML5 API if the security issues can be addressed. In the final component of this thesis, we propose and implement enhancements that correct the security weaknesses identified in IndexedDB. The enhancements use multifactor authentication, and so are resistant to Cross Site Scripting attacks. This enhancement is then demonstrated experimentally, showing that HTML5 IndexedDB may be used securely both online and offline. This implies that secure, standards compliant browser based applications with persistent local data stores may both feasible and efficient

    TAXONOMY OF SECURITY AND PRIVACY ISSUES IN SERVERLESS COMPUTING

    Get PDF
    The advent of cloud computing has led to a new era of computer usage. Networking and physical security are some of the IT infrastructure concerns that IT administrators around the world had to worry about for their individual environments. Cloud computing took away that burden and redefined the meaning of IT administrators. Serverless computing as it relates to secure software development is creating the same kind of change. Developers can quickly spin up a secure development environment in a matter of minutes without having to worry about any of the underlying infrastructure setups. In the paper, we will look at the merits and demerits of serverless computing, what is drawing the demand for serverless computing among developers, the security and privacy issues of serverless technology, and detail the parameters to consider when setting up and using a secure development environment based on serverless computin
    corecore