8 research outputs found

    Attack vectors against social networking systems : the Facebook example

    Get PDF
    Social networking systems (SNS&rsquo;s) such as Facebook are an ever evolving and developing means of social interaction, which is not only being used to disseminate information to family, friends and colleagues but as a way of meeting and interacting with &quot;strangers&quot; through the advent of a large number of social applications. The attractiveness of such software has meant a dramatic increase in the number of frequent users of SNS&rsquo;s and the threats which were once common to the Internet have now been magnified, intensified and altered as the potential for criminal behaviour on SNS&rsquo;s increases. Social networking sites including Facebook contain a vast amount of personal information, that if obtained could be used for other purposes or to carry out other crimes such as identity theft. This paper will focus on the security threats posed to social networking sites and gain an understanding of these risks by using a security approach known as &ldquo;attack trees&rdquo;. This will allow for a greater understanding of the complexity associated with protecting Social Networking systems with a particular focus on Facebook.<br /

    Information Security Disclosure: A Victorian Case Study

    No full text
    This paper will focus upon the impact of Generation Y and their attitudes to security. The paper will be based around discussing the findings of a recent report by the Office of Police Integrity (OPI) on “Information Security and the Victoria Police State Surveillance Unit”. Issues that will be discussed include the context of Generation Y and how they contribute to the case study, their attitudes, or their perceived attitudes to security of information. A discussion of the OPI report itself, and the issues that have arisen. A brief overview of the key findings within this report and the implications of these findings

    Wikileaks : the truth or not?

    Get PDF
    We live in the Information Age, an age where information is shared in a global context and in real time. The issue is whether all information should be disclosed. In the &lsquo;Information Age&rsquo; do secrets still exist? Another major issue is whether groups of vigilantes are the ones who should be disclosing this information, should these vigilante groups be trusted? This paper will focus upon the impact of Wikileaks and the problem of Information disclosure especially when that information is confidential. It will identify cases for discussion. In the main these cases will be of a military flavour.<br /

    Information security disclosure : a Victorian case study

    Get PDF
    This paper will focus upon the impact of Generation Y and their attitudes to security. The paper will be based around discussing the findings of a recent report by the Office of Police Integrity (OPI) on &ldquo;Information Security and the Victoria Police State Surveillance Unit&rdquo;.Issues that will be discussed include the context of Generation Y and how they contribute to the case study, their attitudes, or their perceived attitudes to security of information. A discussion of the OPI report itself, and the issues that have arisen. A brief overview of the key findings within this report and the implications of these findings.<br /

    Loss of data : reflective case studies

    Full text link
    This chapter will focus upon the impact of Generation F - the Facebook Generation - and their attitudes to security. The chapter is based around discussing the loss of data, the prevention approaches and enforcement policies that are currently being investigated, and the implications that this has upon the modern, working environment. The changing landscape of work presents the issue of the Need to Know against the modern, working practises of Need to Share, a conflict that needs to be resolved as a matter of urgency. Many hold the view that it would be wrong to return to the Cold War scenario, however the modern position of Need to Share leads to a steadily rising fear of Information Insecurity. Accepting this situation means that working practises within large organisations need to be reviewed without ignoring the benefits of the new and emerging technologies and yet still be vigilant with regards to Information security.<br /
    corecore