Advertisement

Social Networking Sites

  • Ramjee PrasadEmail author
  • Vandana Rohokale
Chapter
Part of the Springer Series in Wireless Technology book series (SSWT)

Abstract

Social networking sites such as Facebook, WhatsApp, Twitter, Instagram, etc. have become the heart of the worldwide wireless network users. These sites are becoming the new weapons for the malicious users. Merely searching with the name of the person, every single detail about that person can be found on the profiles of these sites. This readily available information makes the work of the hackers easier. Cyber world is being compromised by the unauthorized users or hackers. The mainstream news comes in a newspaper how hackers are breaking security for their personal profit or some entertainment. This chapter deals with the cyber security related issues in the usage of social networking sites.

References

  1. Al-Hamadi H, Chen I-R (2013) Redundancy management of multipath routing for intrusion tolerance in heterogeneous wireless sensor networks. IEEE Trans Netw Serv Manage 19(2):189–203CrossRefGoogle Scholar
  2. Ali KM, Venus W, Al Rababaa MS (2009) The effect of fuzzification on neural networks intrusion detection system. In: Proceedings of the 4th conference on industrial electronics and applications, China, pp 1236–1241Google Scholar
  3. Asfaw B, Bekele D, Eshete B, Villafiorita A, Weldemariam K (2010) Host-based anomaly detection for pervasive medical systems. In: Proceedings of the 5th international conference on risks and security of internet and systems, Montreal, QC, Canada, pp 1–8Google Scholar
  4. Asian Schools of Cyber Law (2010) A to Z of cybercrimes. Department of Science and Technology, Government of India, Lexcode Education and Assessment Platform (LEAP)Google Scholar
  5. Ghosh S (2019) Top seven social media threats. Computer weekly blog. https://www.computerweekly.com/tip/Top-seven-social-media-threats
  6. Karuppanan K (2012) Security, privacy, and trust in social networks. In: Computational social networks: security and privacy. Springer, LondonCrossRefGoogle Scholar
  7. Leidigh C (2005) Fundamental principles of network security. White paper no. 101, American power conversionGoogle Scholar
  8. Lohrmann D (2010) 5 reasons cyber security should be a top priorityGoogle Scholar
  9. SEO (2015) Archive for the ‘social media’ category, interview with Mike Ellsworth about social media for B2B, Apr 2015. http://www.seo-writer.com/blog/category/social-media/#ixzz3Yln8mY6E
  10. Wolfe S (2017) The top 10 worst social media cyber-attacks. Blog from info-security magazine. https://www.infosecurity-magazine.com/blogs/top-10-worst-social-media-cyber/

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Department of Business Development and Technology, CTIF Global CapsuleAarhus UniversityHerningDenmark
  2. 2.Department of Electronics and TelecommunicationSinhgad Institute of Technology and SciencePuneIndia

Personalised recommendations