A Data-Reachability Model for Elucidating Privacy and Security Risks Related to the Use of Online Social Networks S. Creese, M. Goldsmith, J. Nurse, E.

Slides:



Advertisements
Similar presentations
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Advertisements

Tiffany Phillips CIS What is a Social Networking Website? Social networking websites function like an online community of internet users. Depending.
UnFriendly: Multi-Party Privacy Risks in Social Networks Kurt Thomas, Chris Grier, David M. Nicol.
Social Network Security Issues: Social Engineering and Phishing Attacks Jeffrey Allen, Leon Gomez, Marlon Green, Phillip Ricciardi, Christian Sanabria.
All Your Contacts Are Belong to Us: Automated Identity Theft Attacks on Social Networks Reporter : 鄭志欣 Advisor: Hsing-Kuo Pao Date : 2010/12/06 1.
Christian Vargas. Also known as Data Privacy or Data Protection Is the relationship between collection and spreading or exposing data and information.
Social media threats. Warning! May contain mild peril.
Social Networking And Youth Presented by- Dhrolia Alefya
INFORMATION REVELATION AND PRIVACY IN ONLINE SOCIAL NETWORKS (THE FACEBOOK CASE) Rachid Hamcha IMM.
Effective Communication of Cyber Security Risks: Addressing the Human Element in Security Jason R.C. Nurse (PhD, MSc, BSc) Cyber Security Centre, Department.
Social Networks: Facebook “Facebook Grows Up” by Steven Levy “Information Revelation and Privacy in Online Social Networks (The Facebook Case)” by Ralph.
Privacy in Social Networks CSCE 201. Reading Dwyer, Hiltz, Passerini, Trust and privacy concern within social networking sites: A comparison of Facebook.
 Guarantee that EK is safe  Yes because it is stored in and used by hw only  No because it can be obtained if someone has physical access but this can.
Outline of presentation Brief introduction of Facebook as a social networking tool Research questions Methods Findings and Results Some Experimentation.
Privacy Issues with Social Networking Sites Ai Ho, Abdou Maiga, Esma Aïmeur Département d'informatique et de recherche opérationnelle Université de Montréal.
REVENUE MANAGEMENT GUIDE © Marin Management, Inc. 1 Online Networking Guide, 1570 MySpace ® A. MySpace ® Introduction Social networking sites, such as.
COMM 1010 Presentation By: Gina Haws Information for the presentation obtained from EVERYTHING YOU SAY, POST OR DO ON THE INTERNET CAN PUT YOU AT RISK.
July 25, 2005 PEP Workshop, UM A Single Sign-On Identity Management System Without a Trusted Third Party Brian Richardson and Jim Greer ARIES Lab.
E-Safety Challenge College. Learning Objectives To assess the risks faced when online and how to use the options available to protect yourself.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
Social Networking and On-Line Communities: Classification and Research Trends Maria Ioannidou, Eugenia Raptotasiou, Ioannis Anagnostopoulos.
Team 2 Andrew Boyd Kaven Williams.  Privacy, Security and Compliance Issues  Current State of Research  Implications  Areas of Research Opportunity.
An Insight into the Relationship Between Social Media and the Susceptibility to Malicious Intent Presented by Rebecca Morgan 15/05/2015 >>>>2.
The High School Profiling Attack: How Privacy Laws Can Increase Minors’ Risk Ratan Dey, Yuan Ding, Keith W. Ross Dept. of Computer Science and Engineering.
Overview of Privacy Preserving Techniques.  This is a high-level summary of the state-of-the-art privacy preserving techniques and research areas  Focus.
How can you protect yourself from online identity theft?
You, Me & Technology. Overview Technology –Our relationship with technology Threats –What, Who, When, Where, Why & How Protection –What we can do to protect.
PRIVACY BOOTCAMP YpJU.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
 Facebook  Twitter  MySpace  Windows LiveSpace.
Privacy & Security Online Ivy, Kris & Neil Privacy Threat - Ivy Is Big Brother Watching You? - Kris Identity Theft - Kris Medical Privacy - Neil Children’s.
DIGITAL CITIZENSHIP/CYBER BULLYING.  Privacy - Protect Personal Information  Respect – Avoiding Cyberbullying, Plagiarism, Downloading Music Appropriately.
Códigos y Criptografía Francisco Rodríguez Henríquez Security Attacks: Active and Passive Active Masquerade (impersonation) Replay Modification of message.
Monitoring Employees on Networks: Unethical or Good Business?
KYLE GEORGE JULY 3 RD 2014 EDU-384. DO NOT SHARE ANY PERSONAL INFORMATION ONLINE: NAME, ADDRESS, CITY, STATE OR PHONE NUMBER SOCIAL SECURTIY NUMBER ANY.
Data Warehousing Data Mining Privacy. Reading Bhavani Thuraisingham, Murat Kantarcioglu, and Srinivasan Iyer Extended RBAC-design and implementation.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Social networking. Social networking services A Social networking services : is online community used between people who share the same interests, so.
Bethany Webber. Facebook Facebook is a free worldwide social network service which started in February 2004 Founded by Mark Zuckerberg and his college.
Social Networking and Protecting Your Identity. Popular Social Networks Myspace Facebook Youtube Twitter.
Preventing Private Information Inference Attacks on Social Networks.
Activity 4 Protecting Ourselves. Keeping Safe There are lots of different ways we can be at risk on the Internet. How can we protect ourselves and keep.
CyberSavvy Week Day 1 CyberSavvy Internet Safety and Privacy – Playing it Safe and Smart Grade How to Use the Internet Safely: Social Networks.
Cyber Safety. Protect Your Identity Choose screen names/logins that do not give you away Choose password that cannot be easily guessed Do not give away.
Internet Safety and Productivity Tips Presented by ITS Kerri Sorenson and Sean Hernandez December 11, 8:30-9:00 am.
Online Journalism in Agricultural Communication Agricultural Communication and Leadership.
Computer crimes.
Computer Science and Engineering 1 Mobile Computing and Security.
PRIVACY BOOTCAMP Jack Vale - Social Media Experiement.
Click to edit Master title style © by Nat Sakimura. Coping with Information Asymmetry SESSION G: Managing Risk & Reducing Online Fraud Using New.
Content I. Introduction II. Unique features III. Pros & Cons IV. Extra benefits V. Tips & Conclusion.
Yesai Muňoz Ortiz ENGL 231. Is an online community of people with a common interest who use a website or other technologies to communicate with each other.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Appropriate Online Behavior
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
E-Safety. When using computers, we need to keep our data safe. We also need to keep ourselves safe online. Data security is about making sure that data.
Project Manager – MCESD Project Partner - MEUSAC “ Closer to Europe ” Operational Programme 2 Cohesion Policy Empowering People for More Jobs.
BCS Level 1 Award In e-safety Lesson 4.. e-Safety - Lesson 4 2 Today you will learn to ….. Identify the risks of social networking; Use social networking.
Making the most of new media. Susie Wright Sue Fidler Ltd Find us:
Protecting your search privacy A lesson plan created & presented by Maria Bernhey (MLS) Adjunct Information Literacy Instructor
Common Sense Media FACTS Bell work: How does cyberbullying differ from face to face bullying?
Technological Awareness for Teens and Young Adults.
Hotspot Shield Protect Your Online Identity
Social Media: What You Should Know
INTERNET LITERACY and E-SAFETY.
Privacy Protection for Social Network Services
Data Warehousing Data Mining Privacy
Presentation transcript:

A Data-Reachability Model for Elucidating Privacy and Security Risks Related to the Use of Online Social Networks S. Creese, M. Goldsmith, J. Nurse, E. Phillips 11 th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2012,pp DOI: /TrustCom Presented By - Siddhesh Chandoskar

Summary Information which is shared with online social media and networking sites is exposed to third parties. There are many tools and methods which help in the extraction of online data. Data Reachability Model is used to infer data from the information which is currently shared online. Matrix is used to check, with how much ease and accuracy the data can be accessed.

Online Social Networks Online Social Networks is a source of wide range of personal data. User name, Date of Birth, Address, Phone Numbers, Relationship Status, views and interests, Profile photos, etc are some of the basic details shared by most of the users. Different types of information is revealed by a single person on different networking sites.

Data-Reachability Matrix

Use of Matrix It is used to link data exposed on social media and other sensitive data in online and offline world. Target information is the data which is to be derived from the data points which is already shared online. Data points are nothing but a group of details which are used to reach the target information.

Matrix Explanation Target information obtained from combination of data points. Eg- User’s friends info can be used to derive age and gender. Accuracy specifies about the degree of accuracy to which target information can be derived from the data point. Ease specifies about the degree of ease to which we can use data point to reach target information.

Appreciation Spreading awareness to think before revealing data on the social networks. For eg- Profile cloning and identity thefts can be carried out by an attacker, who has data like photo, name and friend associations, age and gender. This cloned profile can be used to make friendship.

Appreciation Cont. Data Reachability Model can be extended. The value of the model is in the approach, not in the values. Different users can use the matrix to represent their own data.

Criticism Data Reachability matrix is vague and explanation is incomplete. Numbers represent inferences for which published evidence could be found. Letters represent inferences based on general knowledge of field and brainstorming.

Question? What measures can we adapt to keep ourselves away from the threats of online social networks and to protect our privacy?

Thank You!