You are on page 1of 20

IJoFCS (2010) 1, 60-79

The International Journal of


FORENSIC COMPUTER SCIENCE

www.IJoFCS.org

Security Aspects and Future Trends of Social Networks

Anchises M. G. de Paula

Abstract - Social networks represent a new range of online uses that pose a series of
challenges to the security community. While these networks provide new opportunities
for interaction and socialization among users, the overwhelming amount of information
generated, exchanged, and redistributed by users demands the adoption of new tools
and techniques to search, analyze and secure online data, which are the subject of this
paper. An understanding of the implications of online social networking to human social
interaction and societal structure will bring new ideas and challenges to consumers,
businesses, and governments worldwide. This report analyzes the social network
phenomenon, focusing on its security implications and perspectives on potential future
development paths.

Keywords - Social Network, Security, Predictions, Trends

1. Introduction MySpace, Orkut, and Windows Live to more inter-


active platforms, such as wikis, blogs, Twitter,
and online worlds (e.g., Second Life, World of War-
ONLINE social networks have become increas-
craft), hundreds of millions of users are connect-
ingly popular in recent years. These networks
ing with each other and building online commu-
join individuals into groups that, in many ways,
nities. Social networks have changed the ways in
resemble small rural communities or neighbor-
which users interact, share information (personal
hood subdivisions [1]. Such networks quickly be-
data, opinions, news), and conduct business on-
came a global cultural phenomenon by adapting
line, transforming the familiar communication-
the concept of real-life social groups and interac-
focused Internet into a new social platform.
tions to cyberspace. Web 2.0 technologies have
empowered social-network platforms by increas- Several drawbacks are associated with social
ing interactivity; as a result, the majority of online networks. In addition to security risks related to
users is currently attached to one or more social improper usage (e.g., information disclosure, pri-
networks. From the personal spaces of Facebook, vacy issues), these networks have become an at-
Anchises M. G. de Paula 61
tack vector for phishers, online fraudsters, and Many providers also offer music- or video-sharing
sexual predators. Cyber-criminals have adapted capabilities, built-in blogging (e.g., on MySpace)
their strategies and tools to target social-network and instant-messaging technology (e.g., the em-
users and have improved attack technologies to bedded GTalk interface of Orkut).
target Web 2.0 applications. Traditional offline
Social networking benefits strongly from large-
criminals also use social networks to plan criminal
scale coverage; users develop greater interest in
activities or are targeting their activities to online
social-networking services as they are used by
victims; offline criminal activity is thus migrating
more of their friends.
to cyberspace. From the user perspective, issues
of trust and privacy within online social networks
remain unresolved. 2.2. History
The first recognizable social-networking site,
SixDegrees.com, was launched in 1997. It al-
2. Current State of Social Networks lowed users to create profiles, list their friends,
surf friends’ lists, and send messages, repre-
2.1. Main Purpose and Characteristics senting the first provider to combine the most
Social-networking sites allow individuals to popular social- networking features. Although
present themselves in an online profile and to SixDegrees.com attracted millions of users, it
establish or maintain connections with others
(usually known as “friends”). Social networks
consist of two fundamental elements: nodes
(users) and connections (relationships between
users). This structure is similar to real-world in-
teractions, wherein a circle of friends in a social
group consists of people connected by friend-
ships.
Participants use social-networking sites to in-
teract with people they already know in the real
world or to meet new people based on common
interests, including friendship, business, hob-
bies, medical interest, or sexual orientation. Us-
ers can join virtual groups and search for people
with similar characteristics using the information
contained in online profiles. Individuals usually
belong to several social groups simultaneously
and share different personal facets with the mem-
bers of each group.
Because social-networking sites enable users to
articulate and make visible their social networks,
the public display of connections is a crucial com-
ponent of these services. Each user’s “friends list”
contains links to each friend’s online profile, en-
abling viewers to browse users’ networks. Addi-
tional features usually include groups, communi-
ties, message boards, photo albums, comments
(“scrapbooks”), tagging, and private messaging. Figure 2-1: Timeline of Social-Networking Sites
62 Security Aspects and Future Trends of Social Networks
failed to become a sustainable business and the have yielded rich materials that must be appro-
service was discontinued in 2000. priately represented to enable efficient mapping
and research. Folksonomy is manifested in cur-
From 1997 to 2001, several online community
rent social-networking sites and applications by
tools (e.g., AsianAvenue, BlackPlanet, MiGente,
the adoption of collaborative tagging capabilities.
LiveJournal) began supporting various combina-
Social-network analysis (SNA) employs a family of
tions of profiles and publicly articulated friends
methodologies to map and evaluate relationships
(Fig. 2-1) [2]. The first business-oriented network
and data flows between people, groups, commu-
site, Ryze.com, was launched in 2001, followed
nities, and other social structures. SNA utilizes
by Tribe.net, LinkedIn, and Friendster. Friend-
theories and abstract models, such as the “small
ster gained traction among early adopters and
world property,” social graphs, and Semantic
acquired 300,000 users through word of mouth
Web.
before attracting the attention of traditional press
media, paving the road for MySpace and Face-
book. Since 2003, several social-networking sites Digital Identities
have been launched and have proliferated world- Social identities are designated by the names,
wide. nicknames, or aliases that users create to identify
In April 2008, Facebook exceeded MySpace to themselves on online social-networking sites.
become the social-networking website with the Users may adopt different nicknames or aliases
highest number of unique monthly worldwide in each group to which they belong; profiles may
visitors. Facebook has since become the social be public (e.g., artistic or professional profiles)
network of choice in most countries. On July 21, or private (e.g., restricted between friends or
2010, Facebook announced that it had more than family members), and each of these is associated
500 million active users. with different privacy concerns. The ability to
share different social information with different
groups is a key characteristic of social identities.
2.3. Social Network Folksonomy and
Theoretical Models The purposes of users’ identities differ,
The social-networking phenomenon repre- depending on the nature and scope of social
sents a shift in online communities’ organization networks, and may not be associated with real
from interest-oriented to people-oriented. Early identities. For example, users may present their
online communities (e.g., Usenet) and current artistic names in a MySpace music profile for
public-discussion forums have been structured promotional purposes, and these aliases are
topically, with interactions following topical hier- often not linked to real names. In contrast, users
archies. In contrast, social-networking sites are of professional networks (e.g., LinkedIn) share
structured egocentrically through personal net- their entire curriculum vitae using real names
works, with each individual at the center of his and identities.
or her community. Online social networks have The anonymity of the Internet allows users
thus introduced a new organizational framework to choose the personal information they want
for online communities that represent a vibrant to share and helps them to promote false or
new research context. exaggerated attributes. “Fakester” users create
false identities to trick others and do not link
Web 2.0 applications and their relative folk-
these profiles to their real identities. False
sonomies1 have led to new user experiences and
profiles often emulate users’ idols or movie
1
Folksonomy (or collaborative tagging, social classification, characters, or are associated with the use of
social indexing, social tagging), is the practice and method
of collaboratively creating and managing tags to annotate
famous brands. For example, researchers have
and categorize content. found that about half of the female characters in
Anchises M. G. de Paula 63
World of Warcraft are associated with male users SNA uses social graphs to visually and
[3]. Unfortunately, several malicious activities mathematically analyze relationships, facilitating
rely on the use of false profiles by fraudsters and the identification of various roles held by group
sexual predators looking for victims, individuals members (connectors, leaders, bridges, isolates)
seeking revenge, and those who create worms and the characterization of social-network
that spread across social networks. groups. In this way, key structural elements can
be defined through the identification of clusters,
as well as core and peripheral members. The
Six Degrees of Separation Theory comparison of social graphs depicting different
Social networks have a “small world property,” social networks allows researchers to define
known more widely as the “six degrees of node equivalence when the same person belongs
separation” theory [4]. This theory describes to different social networks.
the anecdotal and scientific observation that
anyone on the planet can be connected to any
other person through no more than six people. Dunbar’s Number
Such connectivity is due to the structure of British anthropologist Robin Dunbar first
human networks, which are dense clusters proposed Dunbar’s number [6], which places a
interconnected by shortcuts (“friends of a friend” cognitive limit on the number of stable social
groups). Every individual within a traditional relationships that any individual can maintain.
group of friends knows everyone else in the Stable relationships are defined as those in which
group; if at least one person in a group meets people know each other and through which every
someone from a remote part of the world, a person relates socially. Group sizes exceeding
connection is created between two groups. Dunbar’s number generally require rules, laws,
enforced policies, and restrictive regulations to
maintain stable cohesion. Dunbar’s number is
not defined by a precise value, but is commonly
estimated to be 150 individuals.

Dunbar’s number suggests that there is a


limit to the number of peers with whom a social-
networking member can actively interact and
build strong ties. On the other hand, the use of
modern online social-networking resources may
help people to engage in a number of active
connections that exceeds this theoretical limit.

Figure 2-2: Social Graph Example Representing Social Data with Semantic Web
The application of Semantic Web has provided
Social Graphs models that represent the richness of online
Social graphs (Fig. 2-2) [5] depict social social interactions. As the Web becomes more
structures comprised of nodes (user profiles) social, a vast amount of knowledge is generated,
that represent individuals or organizations. exchanged, and collected online. Researchers
Nodes are linked by one or more specific have used Semantic Web to construct models
interdependencies representing generic levels that capture such activities and track the
of relationships, such as friends, co-workers, or transformation of information into collective
family members. intelligence.
64 Security Aspects and Future Trends of Social Networks
Semantic Web technologies construct formal
models that are useful for the extraction of
knowledge produced by online social interactions
(Fig. 2-3). By connecting social networks to
FOAF and social activities (e.g., blog comments)
to SIOC, Semantic Web provides a complete
interlinked graph that supersedes existing
networks.

Demographics
Social-networking sites are organized
primarily around people, with each individual
Figure 2-3: Social Graph Representation Using managing personal connections from the center
Semantic Web of his or her community. Despite the fact that
Researchers see social data within a two-fold many social-networking services use designs
structure that includes data describing the social that promote wide accessibility, various services
network and those that represent what members attract homogenous populations where these
produce. Several ontologies can be used to link groups commonly use the social networking
data across various social networks, including sites to segregate themselves by nationality, age,
Friend of a Friend (FOAF)2 and Semantically educational level, or other factors that typically
Interlinked Online Communities (SIOC).3 FOAF segment the offline society.
represents individual profiles and links data Because social-networking sites enable
among social networks. SIOC aggregates data users to contact real-life friends, the majority
from various Web-based media (including wikis of online connections are between friends,
and blogs) and presents information to users in family members, colleagues, and professional
the most appropriate manner [7]. acquaintances. A dominant social network can
Existing concepts can be organized and surmount local competition by providing the
linked to SIOC descriptions using the Simple service of choice among existing groups of
Knowledge Organization System (SKOS).4 SKOS friends.
develops specifications and standards to support Figure 2-4 displays the dominant social
the use of knowledge-organization systems, networks by country in November 2008 [8],
such as thesauri, classification schemes, indicating pronounced regional variation in the
subject-heading systems, and taxonomies, most popular social networks. The success of
within the framework of Semantic Web. SKOS social-networking sites relies fundamentally on
represents knowledge-organization systems their cultural relevance to a specific population.
using the Resource Description Framework
(RDF).5 RDF-encoded information can be passed 2.4. Current Problems
interoperable between computer applications.
An RDF-based description of social data forms Decentralization and Interoperability
a rich-typed graph and offers a powerful way to Most social-networking sites provide very
represent online social networks. little interaction with external online services.
They operate as “walled gardens,” wherein user
2
http://foaf-project.org
content is exclusive to the site and cannot be
3
http://sioc-project.org
4
http://www.w3.org/2004/02/skos shared with other Internet applications. This
5
http://www.w3.org/RDF limitation results from the sites’ business
Anchises M. G. de Paula 65

Figure 2-4: Adoption of Social Networks by Country (November 2008)

models, which employ user lock-in as a strategy sharing. Most sites use simple password
for the acquisition of the largest possible user protection and have a simple three-level access-
base. control system similar to that of UNIX systems:
users can choose to keep their information
Many users would prefer an interoperable
completely private, share it with a designated
format that would allow them to transport social
group of friends, or make it publicly available to
interactions across different sites. Users who
all viewers. Most social-networking sites restrict
have struggled to gain a reputation within one
profile access to internal users by requiring
site would like to transfer that reputation to
authentication as a community member.
other contexts. Currently, users who switch to
a new social-networking site must begin anew,
making new contacts and creating another Trust and Reputation Management
online identity. Many users are currently willing As in real-world interactions, trust is a
to join more than one social-networking site; key concept governing the establishment of
nonetheless, social networks could gain more relationships based on the online profiles of known
new subscribers by facilitating interoperability. people or strangers. To build new relationships,
users must be confident that they are connecting
with whom they expect. Reputation management
Managing Social Identities and tagging technologies help users assess the
Because users cannot transport their data trustworthiness of online third-party information.
between social networks, individuals usually
Reputation management is based on a user
subscribe to multiple social networks and must
profile’s accumulation of more positive than
thus maintain many profiles and connections.
negative comments. To build positive online
Distinct logins for each social-networking site
reputations, users must be in as many places
prevent users from proving their identity across
as possible, posting, making friends, building
several platforms.
relationships, staying active in forums, and
Further, social-networking sites have a very sharing information online with other users. The
limited set of features for the protection of digital parallel development of Web 2.0 applications
identity and the restriction of profile information has popularized social tagging, by which users
66 Security Aspects and Future Trends of Social Networks
can rank or categorize Web content, such as eased the process of information publishing to
pictures, videos, and blog posts. A set of tags an extent that overwhelms its consumers. With
built from the use of such applications forms an extremely low entry barrier and almost no
a folksonomy that can be seen as a shared expense, Web 2.0 allows anyone with a computer
vocabulary originated by, and familiar to, its to become an independent publisher. As a result,
primary users. Global tagging and aggregation users publish duplicate or reused content, and
build online trust and facilitate the identification feeds may become hard to track because they
of resources within a trusted social network. provide a tremendous amount of information
within a short period of time.
Privacy Given the time-consuming nature of tracking
Privacy concerns demand that user profiles and reading numerous online publications, blogs
never distribute information that is not explicitly and forums, users must choose what to read and
classified as publicly available. Many users what to avoid. Although information is readily
publish personal information on the Web, aggregated, it is almost impossible to process,
including pictures (e.g., on Flickr, Facebook), analyze, validate, and contextualize in a manner
opinions (e.g., on Twitter, blogs, forums), videos that offers a coherent perspective on the facts
(e.g., on YouTube), and a variety of information behind the stories. As the amount of information
on personal home pages. Such postings may continues to increase, users will require online
contain sensitive information, such as birth relationship-management and data-mining tools.
dates, home addresses, and personal phone
numbers. Because online users typically use query
functions to search profiles, groups, and forums Legal Concerns
for information about other users, the protection Most of the known issues in social networks
of personal privacy is an inherent issue. relate to the need to protect users’ personalities
and images. These social concepts encompass
As in real-life relationships, people engage several factors, including reputation, false
in online networks at different levels of allegations, the right to one’s image, privacy,
confidentiality. Users must thus be in control insults, and discrimination of all sorts. From a
of what they disclose and should be able to legal point of view, social-network risks include
define disclosure rules (e.g., “nobody,” “friends,” the violation of users’ data-protection rights and
“friends of friends,” “everyone”). Most users the perpetration of identity fraud.
have public profiles that are visible to everyone;
these profiles often contain sensitive personal Because Web 2.0 services host user-generated
data that enable skillful attackers to use social- content, service providers must establish a
engineering strategies. The increasing use of detailed “Terms of Service” statement that
microblogging services, such as Twitter, allows covers users’ rights and providers’ ability to
the creation of life streams in which users often police existing content. Social-network and Web
disclose their geographic locations and personal 2.0 service providers are often under pressure
habits. Blog entries about business meetings are to intervene in inappropriate user-generated
another form of privacy risk, as well as a potential content. These interventions may be requested
violation of corporate policies. Competitors can by other users (e.g., copyright holders, victims of
freely read and exploit such information. online harassment), law enforcement authorities
or initiated by service providers. Some of these
actions are acceptable, while others may violate
Content Overload users’ rights; such situations have posed difficult
The proliferation of Web 2.0 applications dilemmas for several providers. Service providers
(e.g., blogs, wikis, forums, social networks) has may typically intervene when a user has posted
Anchises M. G. de Paula 67
inappropriate, illegal, or copyrighted material, proximity and/or phone calls (offline stalking),
or has defamed or published private information but also through electronic means, such as
about another person. e-mail, instant messaging, and social-networking
sites (cyber-stalking). Social networks encourage
Given these legal and awareness requirements,
the publication of personal information, including
social-network providers should be familiar
data that can reveal an individual’s location and
with compliance and governance mandates and
schedule (e.g., home address and phone number,
security frameworks. Unfortunately, we currently
schedule of classes).
lack a framework for uniform international
regulation that guarantees privacy rights and Exposure to problematic content on the
personal data protection across the Internet. Internet constitutes an additional social threat.
Problematic content includes a broad spectrum
of undesirable or illegal material, such as violent
Usage Problems media (movies, music, images) which promote
Online social attacks include identity theft, hate speech, pornography, obscene content, and
defamation, stalking, injuries to personal dignity, websites related to self-harm (sites dedicated to
and cyber-bullying. Attackers create false profiles enabling self-injury and suicide, or those that
to mimic personalities or brands, or to slander encourage anorexic and bulimic lifestyles).
a known individual within a network of friends
(e.g., a celebrity or a member of a school class). An increasingly prevalent threat is represented
While such attacks may be carried out using by sexual messages or nude or suggestive
conventional Web pages, they are particularly photographs sent by teenagers using mobile
damaging within social networks because known phones. With the proliferation of camera-equipped
victims may be targeted within social groups. mobile phones and social-networking sites,
Additionally, a victim’s failure to immediately “sexting”7 has become a concern for parents. The
recognize a defamation attack may prevent him/ issue has gained international attention following
her from accessing the offending content, due multiple incidents in the United States, in which
to the attacker’s restriction of such access to the teenagers have faced child pornography charges
group ridiculing that victim. Teenagers’ extensive for sending nude or scantily clad images to
use of online resources is associated with a other teenagers. Users can post on the Internet
growing risk of abuse, including cyber-bullying6 or forward these images or sexually explicit text
and grooming by adults who intend to commit messages, which can end in harassment or even
sexual abuse. Most teenagers have not received sexual assault charges. A survey conducted in
proper instruction on how to avoid such risks. the United States [9] revealed that one in five
teenagers said they had sent or posted online
Cyber-bullying on social networks includes nude or semi-nude photographs of themselves.
harassment, denigration, outing (sharing
someone’s secrets, embarrassing information, or
images), trickery (talking someone into revealing 3. Future of Social Networking
secrets and then sharing it online), flaming (angry,
critical, or disparaging electronic messages or
Social-networking sites are a relatively new
discussions), exclusion, stalking, and threatening
phenomenon, and as with any other technologi-
behavior. Stalking typically involves threatening
cal innovation, they will require a long period of
behavior in which the perpetrator repeatedly
seeks contact with a victim through physical
7
This term combines the words “sex” and “texting” and
refers to potentially prurient messages and images send
6
Cyber-bullying is a term used to describe repeated over electronic devices, such as mobile phones or laptop
and purposeful acts of harm that are carried out using computers. Source: http://sexoffenderresearch.blogspot.
technology, particularly mobile phones and the Internet. com
68 Security Aspects and Future Trends of Social Networks
technical and social adjustment and improve- players in a hyper-real, richly rendered, three-
ment to fully meet users’ needs and accommo- dimensional space. Players control “avatars,”
date their behaviors. Users will also adjust on- which are in-game characters with defined
line practices to adapt to new social-networking attributes that interact with other avatars and
technologies. with the game’s environment.
Most MOEs share some characteristics with
3.1. Meta-Social Networks and User- popular social-networking sites and promote
Centric Social Universes social interaction among users. The social
Users currently play multiple roles within nature of these environments depends largely
dynamic and fluctuating online social networks; on users’ ability to interact within communities.
thus, the further development of social networks Major research organizations [e.g., International
must allow users to manage their profiles and Business Machines (IBM), Linden Labs] are
connections using meta-social network tools. working to enable the seamless movement
Such tools, such as Explode [10], will allow of MOE avatars among virtual worlds while
users to manage profiles and trust networks maintaining the avatar’s identity in terms of
across distinct social networks using Semantic appearance, personal information, and banking
Web, data portability, and shared-authentication status. In the future, these virtual environments
technologies. Users will thereby be able to may converge to form a metaverse.
maintain cross-network friendships using a
centralized online profile.
3.3. Integrating Social Networks and
Tools for the management of a user’s Data Portability
distributed Web presence and others’ ability to The integration of data from different networks,
view that presence will likely be necessary to movement of information and social graphs
support effective social-network use within a across diverse sites, or identification of all content
distributed set of networks. relevant to a particular topic are complex tasks
that require specific standards and technologies
supported by social-network providers. Although
3.2. Metaverse: Convergence and Inte- many Web 2.0 services currently employ
gration of Social Networks and Virtual application programming interfaces (APIs)
Worlds to promote their integration with third-party
Internet and social-network evolution have applications, most social-network providers do
occurred within an interactive and distributed not. However, some social-networking services
environment. Increasing use of multi-user online have implemented basic features that allow users
environments (MOEs)8 reflects the growing to import and export profiling information using
importance of social networking over gaming. standard tools, such as vCard.9
Often characterized as virtual, persistent worlds,
The number of open protocols designed for or
MOEs connect many simultaneous Internet users.
usable by social-network platforms has increased
The perpetual nature of these environments
exponentially in recent years. Social-network
distinguishes them from those of typical
providers theoretically have the opportunity to
computer gaming. Users may log on, join the
use or compose with a growing number of open
game, build relationships, and leave whenever
protocols and providers. Although a detailed
they wish, but the game continues with other
overview of these protocols is beyond the scope
8
Multi-user online environments (MOEs) are a set of of this paper, they include [11]:
persistent online environments, ranging from massive
multiplayer online role-playing games (MMORPGs;
e.g.,World of Warcraft, City Of Heroes) to virtual worlds 9
vCard is a file format standard for electronic business
(e.g., Habbo Hotel, Second Life). cards.
Anchises M. G. de Paula 69
--Authentication: OpenID, CardSpace, i-card, key Facebook features, such as friend lists, into
Liberty Alliance, Facebook Connect; third-party applications. The third-party sites
--Authorization: Open Authentication (Oauth), can then send data back to Facebook and create
CardSpace, i-card, OpenSocial; news feed.
--Semantic markup and description: Resource
Existing authentication services (e.g.,
Description Framework (RDF), MicroFormats;
OpenID11) further extend interoperability and
--Network description: FOAF, XHTML Friends
single sign-in functionality by making social-
Network (XFN), OpenSocial, DiSo10;
network user IDs portable to other sites.
--Network visualization: TouchGraph, Web
Positioning System (WPS);
--Remote manipulation of data and 3.4. Social Web Bill of Rights
relationships: Representational State In response to a lengthy public discussion
Transfer (REST), SOAP (Simple Object Access of data and privacy rights, the Open Social Web
Protocol,), XML-RPC [a remote procedure call group12 presented the “Bill of Rights for the
(RPC) protocol which uses Extensible Markup Social Web”13 in September 2007. Composed by
Language (XML) standard], DiSo; four Web 2.0 pioneers, this document outlined
--Service description: XRDS (eXtensible the appropriate treatment of data collected
Resource Descriptor Sequence), UDDP by companies from social-network site users,
(Unified Design and Development Platform); including personal data, data describing to
--Service execution: OpenSocial, Facebook whom users are connected, and user-generated
Applications; content. The “Bill of Rights” defined three basic
--Message transport: REST, SOAP, Extensible users’ rights over their data: ownership, control
Messaging and Presence Protocol (XMPP), (the right to share, keep private, or completely
and Simple Mail Transfer Protocol (SMTP); revoke data at user’s discretion), and freedom.
--Application hosting: OpenSocial; These issues arose again following the
--Indexation and search: Google Social Graph. February 2009 Facebook users’ rebellion, which
Facebook, Google, and MySpace have halted the company’s attempt to change its terms
announced technologies that permit user data of service to grant itself a perpetual license to all
portability among social websites, representing member-posted photos, videos, and copyrighted
a new source of competition among social- material [12].
networking services. Google’s Friend Connect
and MySpaceID use open-source code based on
the OpenID, OAuth, and OpenSocial standards. 3.5. Virtual Currency
These standards facilitate social-identity sharing Wikipedia defines virtual economy as the
across the Internet, not just among a few partner emergent economy existing in virtual worlds,
websites. Facebook Connect was the first usually characterized by the exchange of
interoperability protocol to be implemented; it virtual goods within the context of an Internet
features an easy logon, the option to rebroadcast game [13]. Virtual worlds have distinct virtual
activities on a third-party site to Facebook friends, economies and currencies that are based on the
and the matching of existing Facebook friend exchange of virtual goods (e.g., weapons, spells,
relationships with those on a third-party site.
11
OpenID is a universal identification technology in which
Facebook Connect allows third-party developers a user registered with a website (OpenID Provider) is
to let users log onto their websites using their assigned a URL that serves as a personal identifier. The
user may then use the URL on any site that supports
Facebook credentials and to integrate other OpenID, and the logon process is handled through the
provider site. Source: http://openid.net.
12
http://opensocialweb.org
10
http://diso-project.org 13
http://opensocialweb.org/2007/09/05/bill-of-rights
70 Security Aspects and Future Trends of Social Networks
clothes, food, houses). Some virtual currencies such as locational coordinates or listening
are tied to the real world through purchase habits. As features are added to these devices,
from game providers, and some people interact phones become a more complete repository for
with virtual economies for real-world economic personal data linked to a single individual.
benefit. Users can also sell their characters,
The benefits of mobile social networking,
virtual money, and/or goods on online-auction
including enhanced location awareness and
websites for real money.
availability, must be balanced with users’
Games are one of the newest and most requirements for personal privacy.
popular online application types on several
social-networking sites. Because monetization
is an important aspect of games, social-network 3.7. Sensor Networks
providers have begun to distribute virtual By combining social-network- and Web-
currency (e.g., hi5’s “coins”). For example, connected devices, applications can extend
Hi5 users can spend virtual coins to purchase social activities through sensors. User activity
premium content, advanced features, and status is modeled not by voluntary user input, but can
upgrades. Many publishers of Facebook games be automatically generated by sensors. Other
are also using their own virtual currency, in the sources of social data available on the Web could
hope that a unified virtual currency will become be used as sensors to minimize the required
universal and it will engage more gamers and, user input, aggregating online activities and
ultimately, encourage them to spend more user footprints with their social profiles. Using
money on games. semantic representations of information from
The use of money (real or virtual) on social sensors, users could connect through shared
networks, however, attracts fraudsters and activities and interests. More importantly, alerts
cyber-criminals who attempt to steal users’ could be sent to users when abnormal activity
social-networking credentials and online money. patterns were detected.
An increasing number of portable devices
support sensor-based interactions, from
3.6. Mobile Social Networking peripherals (e.g., Nike + iPod sport sensor ) to
14

Given the growing ubiquity of social integrated sensors (e.g., iPhone‘s accelerometer).
networking and mobile-phone usage, the Sensors have recently become more prevalent
overlapping demographics will provide in mobile devices. By supporting Bluetooth
numerous opportunities for future mobile social- and WiFi communication, mobile phones have
networking applications. Given the limitations become sensor gateways for individuals. A wide
of mobile phones (e.g., small screens, limited range of Bluetooth sensors, such as heart and
keyboards, often-poor network connectivity), environmental monitors, can be associated with
the sophisticated native interfaces and rich these mobile phones, enabling a new paradigm
media content offered by social networks cannot —the personal sensor network — in which the
be fully duplicated on mobile devices. However, individual becomes the sensor hub.
smartphones are increasingly been equipped with
sophisticated features and sufficient processing
power for software applications. Some devices
3.8. Social Television
already include a built-in interface or leading
Internet protocol television (IPTV) is the
social networking sites. Mobile phones may
next television market, allowing users to watch
include global positioning system (GPS) tracking
television programming wherever they are. Social
devices and music players, and could supply
valuable user information to social networks, 14
http://www.apple.com/ipod/nike
Anchises M. G. de Paula 71
networking through IPTV technology brings 3.11. Corporate Use
many favorable social services to television Social networks allow the corporate sector to
viewers, based on users’ ability to share their develop closer relationships with customers, since
experiences and opinions. The main features of current Internet consumers are not merely buyers,
social TV include online sharing of TV-watching but also use many opportunities to view, inquire,
experiences, interaction among TV viewers communicate about, and analyze products and
(via chat, e-mail, forums, video-conferencing), services. Consumers readily share their feedback
community-viewing of TV programming (watching and complaints about their favorite products
together through a social television service or by and brands. Web 2.0 applications are useful for
online sharing), and recommendation sharing product development and the establishment of
(via social networks, personal broadcasts). commercial relationships, and allow companies
to learn more about consumers. Business
opportunities that incorporate social networks
3.9. Social e-Government include:
A new generation of politicians has
increasingly adopted social-media tools to --Social advertising: formats that engage
interact with citizens. The 2008 electoral the social context of the viewer and target
campaign of Barack Obama, the President of the advertising using user data;
United States, provides an excellent example --Micro-payment within social networks: enables
of such use. Governments can benefit from the exchange of goods and services within
social networks through three broad areas of the social-networking platform; also applies
interaction: to developers of social software applications;
--Platforms for micro-niches: subscription or
--Government to Citizen: promotion of
access fees could be charged;
online public services and dissemination of
--Resale of marketing and business intelligence
information as “official” advice and support,
based on information collected on the
increasing the transparency of information;
network;
--Citizen to Government: citizen use of the
--Buying clubs: to drive demand, users
Web to express views, highlight politicians’
interested in similar product types could be
work, engage with the government, and
offered coupons;
influence policy makers;
--Interaction with real-world commerce: social
--Citizen to Citizen: interactions that help fel-
platforms could be connected with small- and
low citizens handle public-service outcomes
medium-sized businesses, such as estab-
(e.g., healthcare information, advice about
lished boutiques, coffee shops, restaurants,
tax matters).
and bars.
Companies must adapt their business models
3.10. Political Use of Social Networks
to take advantage of social Web features within
Since the social-media-directed protests
disputing the 2009 election results in Iran, large (e.g. Facebook) and small or focused
Twitter and social-networking sites have social networks. Smaller networks present the
emerged as powerful online tools for the opportunity to reach a niche or distinct group of
organization and dissemination of virtual and customers.
real-world protests. People realized that they
could effectively mobilize local protests and 3.12. E-Learning through Social Net-
inform thousands of others worldwide through working
Internet resources, such as social networks and Schools and higher-education foundations
the Twitter microblogging service. increasingly prefer to use social networking as
72 Security Aspects and Future Trends of Social Networks
a communication and collaboration tool. In the --Spammers and phishers use compromised
near future, it would be beneficial for schools social-network accounts to send fraudulent
to promote online interaction through social- messages to victims’ friends;
networking sites. Such interaction could be used --Fraudsters and cyber-criminals use social
to prepare students by providing them with the networks to capture user data and carry out
adult life-skills they need to succeed. Security social-engineering attacks;
policies remain important, as does instruction --Hacktivists and offline terrorist groups create
for students about online safety and responsible communities to spread their views, promote
online expression. Students may learn these their causes, and frequently to conduct
lessons best while using social-networking tools. recruitment;
--Sexual predators use social networks to share
4. Security aspects illicit content and recruit victims.
of Social Networking Social networks are popular communication
media for many communities, including those
Although new paradigms provide many with malicious intent. Several hacking groups
opportunities, their implementation without have created hacker-themed online communities
consideration for necessary security requirements to promote their malicious activities and tools.
can deter growth and user adoption. Because Many others offer hacking tutorials, news articles,
social networks attract thousands of users who tools, or descriptions of exploitation techniques.
represent potential victims, social-networking Several communities function as marketplaces
sites are desirable targets for mass attackers. to encourage the abuse of stolen credit-card
information and attacks against high-profile
targets, such as banks or e-commerce sites
4.1. Actors and Motivation
(Fig. 4-1). Hacking communities within social-
Several actors and groups target social
networking sites also offer hacking services, often
networks for fun and profit. Malicious actors may
for profit.
adopt several categories of attacks and tools to
target social-network users; the following are a The majority of attackers’ profiles on social
few examples: networks appear to have been created by unso-

Figure 4-1: Example of a Carding Forum on Orkut (no longer available),


Advertising “Trustworthy” Mules and Spammers
Anchises M. G. de Paula 73
phisticated users, since attackers may use these the identities of unsuspecting consumers in
communication media only in the initiation phase. an effort to commit fraud, ruining the financial
Skilled malicious actors usually participate in un- lives of their victims. Searches of existing online
derground forums and use secret communication information may yield social-security numbers,
channels. birth dates, addresses, and other personal data
that help criminals steal or create false identities.
4.2. Current Security Threats Criminals can easily obtain the necessary false
credentials to move throughout the many
With the increasing popularity of social
systems that require identification.
networks, hackers, fraudsters, and malicious users
began using these networks to conduct illegal Attackers use compromised social-network
activities. These activities have been undertaken accounts to launch attacks because they can
by using social networks as attack vectors for readily move from one account to the next.
traditional cyber crimes, by creating specific Inherent trust relationships among users
threats to social-network users, or by conducting improve attackers’ chances of convincing their
direct attacks that disrupt social-networking sites. victims that they are legitimate through social
engineering. Once an attacker gains access to
The intrinsic properties of social networks
an important individual within a community, the
make them ideal for exploitation by online
risk of attack increases for anyone connected to
criminals. These networks represent a huge and
that individual. Social-network credentials can be
highly distributed user base comprised of clusters
stolen using traditional key loggers, by running
of users who share the same social interests and
brute-force attacks, or by social engineering
have thus developed trust with each other.
(usually based on the information available on
users’ profiles).
Privacy iDefense researchers observed attackers
The availability of personal information on abusing a Security Focus Jobs site in December
social networks provides an ideal condition for 2007. The attackers were able to freely register
the abuse and leveraging of such information. The as a recruiter, obtain the resumes and business
inappropriate exposure of sensitive information information of 2,471 registered users, and
allows criminals and terrorists to conduct “criminal send fraudulent e-mail messages to all of those
data mining.” individuals.
Malicious actors may use unflattering material
or personal information from social networks
Malicious Code, Viruses, and Worms
to select targets, profile victims, and plan and
Malware authors have recently noticed that
execute criminal activities. Also described as
malicious code can be efficiently spread using
“knowledge discovery,” data mining and predictive
social-networking sites, due to the ease of
analytics allow fraudsters and terrorists to manage leveraging trust among socially connected users
the large amount of information produced by through social engineering. In this way, victims
their targets, including social-network profiles, can be convinced to install the malicious code.
personal conversations on scrapbooks, blog and Malicious actors target the most popular services,
Twitter posts, and personal photos on online such as Facebook and Twitter, to take advantage
albums. of large user bases.
Malicious code is proliferated through friend
Identity/Password Theft information collected from infected users’
Various forms of identity theft have existed social-network accounts. Many attackers also
for a very long time. Thieves have assumed use social networks to create false profiles and
74 Security Aspects and Future Trends of Social Networks
to publish false links that lead to sites infected Spam, Phishing, and Financial Fraud
with malicious code. Phishers usually collect user information from
compromised social-network accounts to send
Banner advertisements, video content, and
spam and phishing messages. Like phishing
false social-network profiles have increasingly
been used to steal personal information as that targets banks, phishing that targets social
the number of online consumers has risen. networks can have financial impacts and cause
Malicious codes are distributed through pop-up monetary losses. Attackers may set up false
advertisements, some of which do not require a social-network profiles and then establish
click by the user. connections with friends on “buddy lists” to gain
more information and identify potential targets
In some cases, social engineering is not for phishing attacks.
necessary to carry out attacks. For example, the
early MySpace worm “Samy Worm” used JavaScript Several malicious codes target online gamers.
commands to add friends to targeted accounts Hackers typically use these codes to take over
automatically. Such worms spread to new compromised subscription-only gaming accounts
accounts because the content is automatically and access the virtual property deposited
embedded on the profile pages of new victims. therein in order to sell the virtual goods through
the digital underground. Successful attackers
In January 2009, iDefense investigated
of some social gaming sites, such as Second
attackers utilizing the my.barackobama.com
Life, may extract real money from compromised
website, a social network for supporters of
accounts. According to a November 2006 entry
United States President Barack Obama, to
in the official Second Life blog, various phishers
spread malicious code. The attack utilized false
have targeted Second Life to steal in-game money
images that aimed to convince users to install
(Linden dollars) by claiming that the user could
a malicious executable file through false Flash
use a hack to create free money [14]. Attackers
CODEC errors. Attackers injected the same
can convert the in-game money of compromised
URLs into many different websites and forums,
users directly into real money by reselling the
suggesting that they utilized automatic forum-
virtual goods on public or underground forums
crawling and account-creation programs.
or retrieving the existing credits.
Malicious actors have employed increasingly
The increasing use of social networks and
innovative methods to control botnets15,
virtual worlds as social and business platforms,
including the use of social-networking services.
including the use of virtual money in social
iDefense has cataloged hackers who adapted the
environments, attracts cyber-criminals. Financial
protocols of many social-networking sites (e.g.,
fraud has affected online gamers for many years,
Twitter, Google Groups) and URL-shortening
through the theft of online goods (weapons,
services (e.g., bit.ly) to send action messages
objects, virtual money) or “gold farming,”16
to zombie computers. In this way, their actions
which created an underground economy based
appeared as normal user activity and the
on the sale of virtual goods and the transfer of
likelihood of discovery was reduced.
virtual money.

Data Loss
15
A botnet is a group of computers on the Internet that,
although their owners are unaware of it, have been Incidents of data leakage include the loss of
infected and set up to perform malicious activities to other personal, corporate, confidential, or customer
computers on the Internet, including sending spam or
running Distributed Denial of Service (DDoS) attacks. Any information, inappropriate public statements
such computer is referred to as a “zombie,” a “robot” or
“bot.” 16
http://en.wikipedia.org/wiki/Gold_farming
Anchises M. G. de Paula 75
about companies, the use of corporate resources of harm, including harassment and humiliation.
for personal purposes, and harassment of or Like offline bullying, cyber-bullying can lead to
inappropriate behavior toward a customer or depression, anxiety, and low self-esteem.
fellow employee. Social-networking sites are
Hate speech is a specific type of online content
another platform through which data leakage designed to threaten certain groups publicly
may occur, and such incidents have a broader and act as propaganda for offline organizations.
impact on corporate reputations. These hate groups use websites to propagate,
Many companies are currently focused share ideology, recruit new converts, link to
on preventing the loss of confidential and similar sites, advocate violence, and threaten
proprietary information and its access by others. Offline groups use online techniques
unauthorized outsiders. Most data-loss to accomplish their goals and improve
incidents occur through e-mail or file transfers, communication. Law-enforcement organizations
but instant-messaging chat tools, blog posts, are also concerned that a small number of
Twitter messages, and online resume content youths converted online may begin to use social
published on social networking sites may also networks to promote offline hate crimes.
disclose proprietary company information.

Sexual Crimes and Child Safety


Information Control and Censorship Social-networking environments represent a
Administrators cannot realistically or serious risk to children and teenagers, who can
effectively manage the huge amount of become the victims of cyber-bullying, online
information available on social-networking harassment, and sexual predation. Children
sites. Social-networking sites are not likely to who are at risk online are usually those who are
ensure the accuracy, legality, or usefulness of also at risk offline. The most frequent threats to
content before users publish it. For this reason, children on social-networking sites come from
it is difficult to prevent actors from posting peers, young adults, and predatory older adults.
unwanted information; while communities that Child pornography is a particularly horrific
use self-policing mechanisms or moderation crime involving images and videos that depict
are generally more successful. For example, minors in suggestive poses or explicit sex acts.
rating systems allow users to remove erroneous Youth-generated sexual content (photographs
content by popular vote. and videos) intended for viewing by other minors
Future development of social-networking (usually friends and partners) is a related serious
sites should employ thresholds for monitoring issue. Although such content is not intended for
new content published by its users and self- adult consumption, it may unexpectedly spread
moderation capabilities, once users are often through the Internet and potentially embarrass
the first to be aware of content problems. the children.
Security teams that monitor social networks are Social-network providers find it difficult to
an effective reactionary approach to limiting keep their sites entirely free of sex offenders,
malicious content, but decentralized social given the huge number of users and the ease of
networks may not be able to devote sufficient creating false identities.
resources to address such problems.

Attacks on Social Networks


Offense, Hate, and Discrimination As with the providers of any other Web
Cyber-stalking and cyber-bullying involve application, social-networking providers may
repeated contact with victims and purposeful acts represent vulnerable targets for direct attacks.
76 Security Aspects and Future Trends of Social Networks
Security vulnerabilities may allow hackers to Exploitation of Social-Networking Gadgets
attack providers, causing service failures (e.g., The introduction of social-networking
denial of service) or unauthorized access to applications and web gadgets provides a potential
users’ credentials followed by disclosure of vector of malicious attacks. Web widgets are
private information. Such vulnerabilities may also small graphic applications that bring third-party
be used to spread a virus among user accounts. tools and games (e.g., clocks, calculators) to
Cross-site scripting (XSS) or SQL injection social-networking sites. Such applications have a
vulnerabilities on social-network applications rapid adoption rate in desktops, mobile devices,
could cause problems for millions of users. and Web applications because they are easy to
Furtnermore, malicious actors have debilitated create and implement.
social-networking sites through orchestrated The rising popularity of widgets has led to
Distributed Denial of Service (DDoS) attacks. increased targeting by malicious actors, who
Malicious users may take control of visitors use them as spyware, for virus dispersal, for
to social sites by remotely manipulating their hijacking, and might explore existing software
browsers through legitimate Web-control vulnerabilities. Social-network providers release
functionality, such as image-loading HTML tags widget software developers’ kits (SDK) to allow
or JavaScript instructions [15]. developers to create widgets that run in the
social-networking site. However, the availability
Home, a virtual world wherein PlayStation 3
of these SDKs provides system access to users
gamers interact, was hacked in December 2008
with malicious intent, who gain a roadmap for
[16]. Crackers were able to access the Home widget manipulation.
server so that they could upload, download,
or delete any file within the server, leading Widgets may be vulnerable to exploitation
to identity theft and the spread of malicious by hackers and criminals due to inadequate
code. Facebook has also been vulnerable to security models, which may allow malicious code
XSS attacks [17]. In March 2009, the Koobface17 to run freely and spread readily. Vulnerabilities
worm targeted users of Facebook, MySpace, hi5, associated with widgets are similar to those
Bebo, Friendster, and Twitter. Koobface spreads found on the Web, but present a higher risk
because they share a much broader connectivity
through invitations from a user’s contact that
with an underlying application or operating
include a link to view a video. It ultimately
system. This enables a powerful attack vector
attempts to gather sensitive information from
capable of gaining privileged access to local
victims, such as credentials and credit-card
resources by default.
numbers.
Criminals may also create malicious
4.3. Future Security Threats for Social applications to intentionally install malware on
Networks victims’ systems. Legitimate applications, such
The technological evolution and global as the CityFireDepartment Facebook application,
adoption of social-networking services will can be modified to distribute malware. Attackers
bring further security risks that may present compromised this application and used injected
opportunities for malicious actors exploring such IFrames to infect victims with rogue anti-virus
services. Information-security professionals and applications [18].
law-enforcement agencies must adapt to these In September 2009, a security researcher
potential future threats. promoted the “Month of Facebook Bugs,”
an initiative that included the daily posting
of security flaws in Facebook applications
17
http://en.wikipedia.org/wiki/Koobface throughout the month of September. To promote
Anchises M. G. de Paula 77
awareness of social-networking application are built, terrorists may readily spread
security, the researcher reported bugs in third- propaganda, and recruit and instruct converts
party applications available on Facebook. Most in the construction of terrorist cells and the
of these bugs were XSS flaws in various social execution of jihad. In October 2008, authorities
applications, including Facebook’s 10 most arrested two white supremacists who planned to
popular, that potentially affected millions of kill Senator Barack Obama and more than 100
users [19]. African-Americans; they had met online through
a mutual friend.

Social-Network Worms and Phishing Powered Microblogging communities, such as Twitter,


by Semantic Web may also be used as an effective communication
All social-networking sites identify “circles tool for coordinating terrorist attacks and
of friends” based on existing relationships or tracking news in real time. The ability to transfer
common interests within a group or community. virtual money between avatars is also useful for
Malicious actors may use such characteristics criminal activities because that money can then
to harvest large amounts of reliable social- be translated into real currency and it is very
networking information. difficult to track.

The FOAF project provides a machine-readable Second Life currently contains a radical ter-
Semantic Web format specification describing rorist group called the “Second Life Liberation
the links between people. In the absence of Army”18 that has been responsible for computer-
such sources of information, social connections coded atomic bombings of virtual-world stores
can also be inferred by mining Web content using Second Life weapons and armories. Previ-
and links. Worms that incorporated Semantic ous Second Life attacks include the explosion
Web attributes could easily identify connection of the Australian Broadcasting Commission’s
among users and quickly spread across social (ABC) island, attacks on Reebok and American
graphs. Apparel stores, and storming the stage at the
January 2007 virtual meeting of the World Eco-
nomic Forum.
Terrorism Using Social Networks and Online
Communities
Terrorist organizations have begun to use Social-Network Forensics
social networks and virtual worlds in their daily The rising use of social-networking sites
activities. Terrorists may use virtual worlds to and Web 2.0 technologies by cyber-criminals
create exact replicas of targets for the planning demands specific criminal investigation tool
and simulation of attacks, eliminating the need to and procedures by law-enforcement agencies.
travel to the target to carry out reconnaissance. Effective forensic investigation of social-
Instead of sending potential jihadists to train networking threats requires evidence gathered
in military camps in Pakistan, Afghanistan, from social-networking sites and the use of
and Southeast Asia, organizations such as al- technologies that track activities, identify
Qaeda and Jemaah Islamiah could operate perpetrators, and specify the timing of online
online training camps in virtual worlds to evade criminality. Social-network forensics is a set of
detection and avoid prosecution. Second Life specific investigation skills applied to the social-
could easily become a terrorist classroom. networking universe.
Social networks and online communities Information-security professionals must de-
also help terrorists recruit new members and velop specific tools and techniques to detect
may serve as meeting places for the discussion
of plans. Once these groups and communities 18
http://secondlla.googlepages.com
78 Security Aspects and Future Trends of Social Networks
and investigate malicious activities on social net- References
works, and to ensure that information has been
properly secured and examined and that all evi- [1] Website “What is Social Networking”. Available at: http://www.
whatissocialnetworking.com.
dence has been recovered. Information discov- [2] Source: http://jcmc.indiana.edu/vol13/issue1/boyd.ellison.html.
ery requires the ability to search for information [3] The Daedalus Project, “WoW Gender-Bending”. Available at:
http://www.nickyee.com/daedalus/archives/001369.php.
as soon as it is created or distributed by a user. [4] WikiPedia, http://en.wikipedia.org/wiki/Six_degrees_of_
It also demands the ability to measure search separation.
[5] http://www.thenetworkthinker.com.
quality, dynamically classify search results, and [6] WikiPedia, http://en.wikipedia.org/wiki/Dunbar’s_number
properly visualize data according to numerous [7] “Leveraging Social data with Semantics”. Available at: http://www.
w3.org/2008/09/msnws/papers/ereteo_et_al_2008_leveraging.
criteria and within numerous contexts.
html.
[8] http://www.oxyweb.co.uk/blog/socialnetworkmapoftheworld.php.
A new social-networking forensic framework [9] Reuters, “Sexting: The new, dangerous trend among teens.” IBN
must focus on the analysis of online actors Live. May 04, 2009. Available at: http://ibnlive.in.com/news/
sexting-the-new-dangerous-trend-among-teens/91732-19.html.
(profiles) and their activities. It must incorporate
[10] http://blogs.zdnet.com/social/?p=97.
the investigation of suspects’ or victims’ online [11] T. P. Anglade, O. Pekelman, L Montagne. “The Social Web: Small
relationships (past and present), participation Businesses / Big Solutions.” Nov. 20, 2008. Available at : http://
www.w3.org/2008/09/msnws/papers/af83.pdf.
in online communities, and usage patterns on [12] JD Lasica, “Toward a Facebook bill of rights.” SocialMedia.biz. Feb.
social-networking sites, and the forensic analysis 27, 2009. Available at: http://www.socialmedia.biz/2009/02/27/
toward-a-facebook-bill-of-rights.
of intra-social-networking applications [20]. [13] WikiPedia, http://en.wikipedia.org/wiki/Virtual_economy.
[14] http://blog.secondlife.com/2006/11/07/important-free-money-
hack-dont-fall-for-it.
5. Conclusion [15] E. Athanasopoulos, A. Makridakis, D. Antoniades S. Antonatos,
S. Ioannidis, K. G. Anagnostakis, and E. P. Markatos, “Antisocial
Networks: Turning a Social Network into a Botnet”, 2008. Available
at: http://blogs.zdnet.com/security/images/facebotisc08.pdf.
Social networks are growing rapidly and [16] R. Naraine, “PlayStation Home virtual world hacked”, ZDNET. Dec.
incorporate functionality far beyond the initial 22, 2008. Available at: http://blogs.zdnet.com/security/?p=2330.
[17] D. Danchev, “Four XSS flaws hit Facebook”, ZDNET. Dec. 15,
“list of friends” concept. Users wish to express 2008. Available at: http://blogs.zdnet.com/security/?p=2308
their identities and share information in [18] R. Thompson, “Hacked Facebook applications reach out to exploit
sites in Russia”, AVG Blogs, Oct. 14, 2009. http://thompson.blog.
restricted virtual communities. Social networks avg.com/2009/10/hacked-facebook-applications-reach-out-to-
are driving the evolution of the Internet from exploit-sites-in-russia.html.
[19] theharmonyguy, “FAQs on FAXX and the ‘Month of Facebook
a flat Web model toward a number of socially Bugs’”, theharmonyguy blog, Sep. 3, 2009. http://theharmonyguy.
interconnected, user-centric websites. The “way com/2009/09/03/faqs-on-faxx-and-the-month-of-facebook-bugs.
[20] J. Bryner, “Facebook Forensics”, SANS, June 11, 2009. Available
of communicating” online has evolved from at: https://blogs.sans.org/computer-forensics/2009/06/11/facebook-
point-to-point message exchanges between forensics.
isolated users to group-oriented activities.
Social-networking sites must recognize this
basic aspect of human social interaction and find
strong and intuitive methods for implementing
it on a software level, while providing the
necessary levels of protection, privacy, and
trust. Hacking groups continue to attack social
networks, spreading key loggers, Trojan horses,
and other malicious applications.
Governments and intelligence agencies must
adopt new paradigms and technologies to use
and manipulate the amount of information and
interaction in a social Web.
Harwinder Singh and Maninder Singh 79
Anchises M. G. de Paula works as International Cyber Intelligence Analyst at iDefense, a VeriSign company. He has
more than 15 years of experience in the computer security industry, having worked as a Security Officer for Brazilian
telecom companies and a Security Consultant for local resellers and consulting firms. He earned a bachelor’s degree in
Computer Science from the Universidade de São Paulo (USP) and a master’s degree in Marketing from the Escola Superior de
Propaganda e Marketing (ESPM). He is CISSP-, GIAC- (Cutting Edge Hacking Techniques) and ITIL-Foundations certified.
As an active member of the Brazilian information-security community, Anchises served as President of the Brazilian chapter
of the International Systems Security Association (ISSA) in 2008-2009 and Director of the Brazilian chapter of the Cloud
Security Alliance (CSA) in 2010-2011.

You might also like