Reference Hub14
Information and Password Attacks on Social Networks: An Argument for Cryptography

Information and Password Attacks on Social Networks: An Argument for Cryptography

Enrico Franchi, Agostino Poggi, Michele Tomaiuolo
Copyright: © 2015 |Volume: 8 |Issue: 1 |Pages: 18
ISSN: 1938-7857|EISSN: 1938-7865|EISBN13: 9781466676497|DOI: 10.4018/JITR.2015010103
Cite Article Cite Article

MLA

Franchi, Enrico, et al. "Information and Password Attacks on Social Networks: An Argument for Cryptography." JITR vol.8, no.1 2015: pp.25-42. http://doi.org/10.4018/JITR.2015010103

APA

Franchi, E., Poggi, A., & Tomaiuolo, M. (2015). Information and Password Attacks on Social Networks: An Argument for Cryptography. Journal of Information Technology Research (JITR), 8(1), 25-42. http://doi.org/10.4018/JITR.2015010103

Chicago

Franchi, Enrico, Agostino Poggi, and Michele Tomaiuolo. "Information and Password Attacks on Social Networks: An Argument for Cryptography," Journal of Information Technology Research (JITR) 8, no.1: 25-42. http://doi.org/10.4018/JITR.2015010103

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Online social networks have changed the way people interact, allowing them to stay in touch with their acquaintances, reconnect with old friends, and establish new relationships with other people based on hobbies, interests, and friendship circles. Unfortunately, the regrettable concurrence of the users' carefree attitude in sharing information, the often sub-par security measures from the part of the system operators and, eventually, the high value of the published information make online social networks an interesting target for crackers and scammers alike. The information contained can be used to trigger attacks to even more sensible targets and the ultimate goal of sociability shared by the users allows sophisticated forms of social engineering inside the system. This work reviews some typical social attacks that are conducted on social networking systems, carrying real-world examples of such violations and analysing in particular the weakness of password mechanisms. It then presents some solutions that could improve the overall security of the systems.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.