Email add: baaocommunitycollege@gmail.com College of Education S/Y 2022-2023
Title of the Issue: Privacy and Security
Title of the Article: Privacy and Security for Online Social Networks: Challenges and Opportunities Sources: https://scholar.google.com/scholar? hl=en&as_sdt=0%2C5&q=+article+privacy+and+security&btnG=#d=gs_qabs&t=16632451725 29&u=%23p%3DosU47Haz168J Author/s: Chi Zhang and Jinyuan Sun, University of Florida Xiaoyan Zhu, Xidian University Yuguang Fang, University of Florida and Xidian University Summary Narrative: Online social networks (OSNs) such as Facebook, MySpace, and Twitter enable people to stay in touch with their contacts, reconnect with old acquaintances, and establish new relationships with other people based on shared features such as communities, hobbies, interests, and overlaps in friendship circles. Recent years have seen unprecedented growth in the application of OSNs, with about 300 OSN systems collecting information on more than half a billion registered users. As a result, OSNs store a huge amount of possibly sensitive and private information on users and their interactions. This information is usually private and intended for the eyes of a specific audience only. However, the popularity of OSNs attracts not only faithful users but parties with rather adverse interests as well. The diversification and sophistication of purposes and usage patterns of OSNs inevitably introduce privacy infringement risks to all OSN users because of information exchange and sharing on the Internet. It is therefore not surprising that stories about privacy breaches by Facebook and MySpace appear repeatedly in mainstream media. Regardless of the purpose of an OSN, one of the main motivations for users to join an OSN, create a profile, and use different applications offered by the OSN is the possibility to easily share information with selected contacts or the public, and facilitate social interactions between the users of OSNs. Disclosing personal information in OSNs is a double-edged sword. On one hand, information exposure is usually a plus, even a must, if people want to participate in social communities. They believe that more effective and flexible security mechanisms are therefore required for the safety of OSN users as well as the continued thriving of OSNs. In this article it presents a general framework for assessing the security and privacy of current and next-generation OSNs. There are features of OSNs since the motivation of tis article is to provide the advantages of OSNs without compromising privacy and security in OSNs, the desirable features of traditional OSNs and their possible implementations need to be discussed first: Main Functionalities of OSNs, An OSN is a digital representation of its users and their social connections/relationships in the physical or virtual world, plus networking services for messaging and socializing among its users. It provides a platform to: Allow users to construct digital representations of themselves (usually known as user profiles) and articulate their social connections with other users., Support the maintenance and enhancement of preexisting social connections among users in the physical or virtual world., Help forge new connections based on common interests, location, activities, and so on Based on the above definition, an OSN should provide the following functionalities to facilitate users’ self- representations and online social interactions. Personal Space Management, an OSN should support a user to: Create/cancel an account, Create/edit user profile and upload/edit user generated contents. Means of Communication, communicating with others is the central feature offered by OSN services. There are several possible channels of communication among users. First, one can leave public messages (e.g., blogging) in the form of texts, video, audio, photos, and so on using personal space. Moreover, one can send private messages, which are another form of asynchronous communication, as opposed to synchronous communication such as instant messaging readily available in almost all OSNs. Global Keyword Search (or Social Search) first means to find an unknown user is to conduct a global keyword search. A successful search would produce for the accessing user the search listing of a target user. A user may specify a search policy to allow only a subset of users to be able to reach her search listing through a global name search. There are two paradigms of implementing an OSN in the literature, client-server architecture (This traditional architecture has the advantage of being straightforward and easy to implement, while suffering from all the drawbacks of centralized systems) and peer-to-peer (P2P) architecture (It adopts a decentralized architecture relying on cooperation among several independent parties who are also users of the OSNs. Users’ personal spaces are stored and maintained distributivity.). To understand the unique challenges of balancing security and privacy with usability and sociability, we first review how the standard principles of network security, including confidentiality, integrity, and availability, extend to OSNs. There are Privacy and Security Requirements for OSNs: User’s identity anonymity, User’s personal space privacy and User’s communication privacy. As mentioned earlier, inherent design conflicts exist between some security and privacy goals and traditional design goals such as usability and sociability of OSNs. Social Space Exploring vs. Privacy To support social search and traversal, disclosing some information about users’ profiles and lists of contacts is inevitable. For social search, obviously, more personal data must be disclosed to support more efficient and accurate search in digital social space; thus, there is a trade-off between search capabilities and privacy. Specifically, higher search efficiency also means higher likelihood of potential privacy breaches. For social traversal, public display of social connections also affects OSN users’ privacy. First, social contacts themselves represent sensitive, private information that can be used. In this article we have discussed the security and privacy design issues on online social networks and pointed out a few research directions for mitigating the design conflicts between the various design goals of OSNs. However, an ultimate solution will require experts from the social science and network security communities, industry, regulatory bodies, and all other relevant communities to collaboratively make decisions on both secure mechanisms and policies. This article is intended to provide a starting point for developing effective secure and privacy preserving OSNs. We hope that this work will motivate OSN researchers and developers to move forward with more creative design of OSNs without compromising users’ data security and privacy. What lesson have you learned? We have learned that Online Social Network have grown exponential in the past years, and it had been used as a major platform in any kind of transactions or conversations. Talking about its Security and Privacy OSN seeks to widely understand the arising challenges that might be a big threat also a chance of resolving significant issues for all users. Aside from the challenges under OSN, opportunities may begin to its wide range, where promotes an advance chance of success in dealing with online Platforms, many online forms may be used to promote any significant purposes of user. Yet on the other hand users are very much in need of protection through the of OSN in terms of their confidentiality, integrity, and their availability. We all know that privacy and security are important for our safety and right to control our personal information, we need to know some online security that we can use to protect our information. Also, we need to be careful with how much information we reveal online, sharing address, phone number, birthday and other personal information can mean you are at a greater risk of identity theft, stalking and harassment. Protecting privacy is key to ensuring human dignity, safety, and self-determination. So, all we need to do is always control posting some personal information online for our safety, not sharing password, setting profile to private and not accepting friend requests from random people are good standard practices. What suggestions can you offer? To avoid becoming a victim of any online crimes, we suggest purging unused cellular apps and browser extensions. Purge any software program that you don't use regularly. Having fewer accounts could cause you in a lot less danger, from cellular apps to browser extensions. Once you cease the use of an app delete it, because even the apps that you have forgotten about can remain vigorous with hidden features. As the year passed by, our world is already in a digital world wherein technology exist everywhere. Technology brought both positive and negative on people's lives. Some of the things that technology has been made was the applications, websites, and the internet where make impossible things possible. Since we are already in the digital world, it's expected that most of us already encountered these applications such as Facebook and Messenger. These applications use some of our important details such as our names, place we live and sometimes we didn't notice that we are already over sharing. One of the negative impacts of getting bigger population in online social networks is that it created people who had bad intentions towards other people. One example of this is that they hack and use other people's information and then use that information to create another account and use it to scam and other unnecessary things. In this issue, there are things that we should always keep in mind. In terms of clicking link, be cautious enough and don't click it immediately otherwise it's not suspicious or it comes from the school etc. Keep the emails and phone numbers we used private. Use secure and long passwords, not easy enough to guess and most importantly review permissions when installing applications and websites that we use. It's still on us on how we should be safe on surfing the net. Information that we share were sometimes visible to everyone so, be careful.
Submitted by: Bermas, MA. Cristina B.
Boaquena, Jenilyn Bon, Gloria C. Casano, Mary Grace A. De Dios, Hazel Ann M. Luzon, Clarivel O. Olivares, Joyce A. Raro, Abegail B. Templonuevo, Regine Dacara Rica Julea A.
Cybersecurity: A Simple Beginner’s Guide to Cybersecurity, Computer Networks and Protecting Oneself from Hacking in the Form of Phishing, Malware, Ransomware, and Social Engineering