A Threat Model Approach to Threats and Vulnerabilities in On-line Social Networks
نویسندگان
چکیده
On-line Social Networks (OSN) have become one of the most used Internet services. However, as happens with every new technology, they are prone to several security issues. Despite privacy concerns begin to emerge, there are still other dangerous vulnerabilities that affect security and threaten organisations and users assets. In this paper, we present the first Threat Modelling approach in Online Social Networks that intends to identify the threats and vulnerabilities that can be exploited. Next, we define what we call the Circle of Risk (CoR), a graphical definition of every security aspect involved in the threat modelling.
منابع مشابه
ملزومات امنیتی پیادهسازی IMS SIP سرور امن
IMS (IP Multimedia Subsystem) network is considered as an NGN (Next Generation Network) core networks by ETSI. Decomposition of IMS core network has resulted in a rapid increase of control and signaling message that makes security a required capability for IMS commercialization. The control messages are transmitted using SIP (Session Initiation Protocol) which is an application layer protocol. ...
متن کاملA Threat Model Approach to Attacks and Countermeasures in On-line Social Networks
On-line Social Networks (OSN) have become the most popular Internet service today. OSN are being embraced by companies and organisations to help connecting people, assist dealing with cooperative tasks, and develop marketing and public relations campaigns. Despite all their benefits and advantages, as happens with every new technology, they are prone to several security issues. In addition to p...
متن کاملExplaining Social-Economic Strategies of Urban Regeneration in Historical Contexts (Case Study: Semnan's Historical Context)
The historic core is part of the city's integrity that has not grown and worn out in the process of urban development in line with the needs of the day. In order to solve the problems caused by the phenomenon of urban burnout, several approaches have been proposed, none of which have been able to permanently eliminate or control this phenomenon. Meanwhile, the urban regeneration approach has be...
متن کاملOn Industrial Networks and Intelligent System
The Online Social Networks (OSN) open a new vista serving millions of users and have reshaped the way people interacts. Unfortunately these networks are an emerging platform for cybercrimes such as sending malicious URLs, spams, etc. which causes a huge financial loss and social damage. In this paper, it is reviewed that OSN is a new cybercrime platform for threating agents because of the secur...
متن کاملA Taxonomy of Cyber Attacks on 3G Networks
Cross Network Services are a new breed of services that have spawned from the merger of the Internet and the previously isolated wireless telecommunication network. These services act as a launching pad for a new type of security threat the Cross Infrastructure Cyber Attack. This paper is the first to propose attack taxonomy for 3G networks. The uniqueness of this taxonomy is the inclusion of C...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2010