Reference Hub3
Information Attacks on Online Social Networks

Information Attacks on Online Social Networks

Enrico Franchi, Agostino Poggi, Michele Tomaiuolo
Copyright: © 2014 |Volume: 7 |Issue: 3 |Pages: 18
ISSN: 1938-7857|EISSN: 1938-7865|EISBN13: 9781466657700|DOI: 10.4018/jitr.2014070104
Cite Article Cite Article

MLA

Franchi, Enrico, et al. "Information Attacks on Online Social Networks." JITR vol.7, no.3 2014: pp.54-71. http://doi.org/10.4018/jitr.2014070104

APA

Franchi, E., Poggi, A., & Tomaiuolo, M. (2014). Information Attacks on Online Social Networks. Journal of Information Technology Research (JITR), 7(3), 54-71. http://doi.org/10.4018/jitr.2014070104

Chicago

Franchi, Enrico, Agostino Poggi, and Michele Tomaiuolo. "Information Attacks on Online Social Networks," Journal of Information Technology Research (JITR) 7, no.3: 54-71. http://doi.org/10.4018/jitr.2014070104

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Online social networks have changed the way people interact, allowing them to stay in touch with their acquaintances, reconnect with old friends, and establish new relationships with other people based on hobbies, interests, and friendship circles. Unfortunately, the regrettable concurrence of the users' carefree attitude in sharing information, the often sub-par security measures from the part of the system operators and, eventually, the high value of the published information make online social networks an interesting target for crackers and scammers alike. The information contained can be used to trigger attacks to even more sensible targets and the ultimate goal of sociability shared by the users allows sophisticated forms of social engineering inside the system. This work reviews some typical social attacks that are conducted on social networking systems, carrying real-world examples of such violations and analysing in particular the weakness of password mechanisms. It then presents some solutions that could improve the overall security of the systems.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.