A Threat Model Approach to Threats and Vulnerabilities in On-line Social Networks

نویسندگان

  • Carlos Laorden
  • Borja Sanz
  • Gonzalo Álvarez
  • Pablo García Bringas
چکیده

On-line Social Networks (OSN) have become one of the most used Internet services. However, as happens with every new technology, they are prone to several security issues. Despite privacy concerns begin to emerge, there are still other dangerous vulnerabilities that affect security and threaten organisations and users assets. In this paper, we present the first Threat Modelling approach in Online Social Networks that intends to identify the threats and vulnerabilities that can be exploited. Next, we define what we call the Circle of Risk (CoR), a graphical definition of every security aspect involved in the threat modelling.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

ملزومات امنیتی پیاده‌سازی IMS SIP سرور امن

IMS (IP Multimedia Subsystem) network is considered as an NGN (Next Generation Network) core networks by ETSI. Decomposition of IMS core network has resulted in a rapid increase of control and signaling message that makes security a required capability for IMS commercialization. The control messages are transmitted using SIP (Session Initiation Protocol) which is an application layer protocol. ...

متن کامل

A Threat Model Approach to Attacks and Countermeasures in On-line Social Networks

On-line Social Networks (OSN) have become the most popular Internet service today. OSN are being embraced by companies and organisations to help connecting people, assist dealing with cooperative tasks, and develop marketing and public relations campaigns. Despite all their benefits and advantages, as happens with every new technology, they are prone to several security issues. In addition to p...

متن کامل

Explaining Social-Economic Strategies of Urban Regeneration in Historical Contexts (Case Study: Semnan's Historical Context)

The historic core is part of the city's integrity that has not grown and worn out in the process of urban development in line with the needs of the day. In order to solve the problems caused by the phenomenon of urban burnout, several approaches have been proposed, none of which have been able to permanently eliminate or control this phenomenon. Meanwhile, the urban regeneration approach has be...

متن کامل

On Industrial Networks and Intelligent System

The Online Social Networks (OSN) open a new vista serving millions of users and have reshaped the way people interacts. Unfortunately these networks are an emerging platform for cybercrimes such as sending malicious URLs, spams, etc. which causes a huge financial loss and social damage. In this paper, it is reviewed that OSN is a new cybercrime platform for threating agents because of the secur...

متن کامل

A Taxonomy of Cyber Attacks on 3G Networks

Cross Network Services are a new breed of services that have spawned from the merger of the Internet and the previously isolated wireless telecommunication network. These services act as a launching pad for a new type of security threat the Cross Infrastructure Cyber Attack. This paper is the first to propose attack taxonomy for 3G networks. The uniqueness of this taxonomy is the inclusion of C...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010