ISSN

2231-3915 (Online)
2231-3907 (Print)


Author(s): Suman Janghel

Email(s): sumanjanghel8@gmail.com

DOI: 10.5958/2231-3915.2020.00021.8   

Address: Ms. Suman Janghel
Assistant Professor, Dept of Computer Science, Shri Shankaracharya Mahavidyalaya, Juwani, Bhilai CG.
*Corresponding Author

Published In:   Volume - 10,      Issue - 1,     Year - 2020


ABSTRACT:
Social networks are a natural part of today’s Internet and used by more than a billion people international. A social network is a public configuration made up of people or links called nodes, which are associated by at least one particular sorts of inter dependence, for example, friendship, normal interest, and exchange of fund, connections of confidence, information or dishonor. Social media security is the procedure of analyze dynamic social media data in arrange to save from harm against security and business threats. A cyber risk can be unexpected and focused, directed or non-targeted, and it can derive from a collection of sources, including outside countries occupied with secret activities and data aggressive, criminals, programmers, hackers, virus code writer, unsatisfied representatives and contractual workers working inside an society. Social networking destinations are not only communicated with other individuals all inclusive, yet additionally one successful route for business promotion. In This paper will illustrate and discuss the most established issues and threats targeting different social networks today and picture the future patterns of such hoppy popular sites.


Cite this article:
Suman Janghel. A Study of Security Risks and Attacks on Social Network. Int. J. Tech. 2020; 10(1):106-112. doi: 10.5958/2231-3915.2020.00021.8


REFERENCES:
1.    Scarpino, J. J., and Alshif, A. A. (2013). The impact of social networks on Saudi residents living in the United States. Issues in Information Systems, 14(1), 72-81.
2.    Lilley, S., Grodzinsky, F. S., and Gumbus, A. (2012). Revealing the commercialized and compliant Facebook user. Journal of Information, Communication and Ethics in Society.
3.    Kaven William, Andrew Boyd, Scott Densten, Ron Chin, Diana Diamond, Chris Morgenthaler, " Social Networking Privacy Behaviors and Risks", Seidenberg School of CSIS, Pace University, White Plains, NY 10606, USA.
4.    Anchises M. G. de Paula, “Security Aspects and Future Trends of Social Networks", IJoFCS (2010), 1, 60-79.
5.    Ellison, N. B., Steinfield, C., and Lampe, C. (2011). Connection strategies: Social capital implications of Facebook-enabled communication practices. New media and society, 13(6), 873-892.
6.    Gilberto Tadayoshi Hashimoto, Pedro Frosi Rosa, Edmo Lopes Filho, Jayme Ta
7.    deu Machado, A Security Framework to Protect Against Social Networks Services Threats, 2010 Fifth International Conference on Systems and Networks Communications.
8.    Sharma, S., and Sahu, D. (2013). Effect of social networking sites on self confidence. International Journal of Information and Computation Technology, 3(11), 1211-1216.
9.    Gharibi, W., and Shaabi, M. (2012). Cyber threats in social networking websites. arXiv preprint arXiv:1202.2420.
10.    Ai Ho, Abdou Magia, and Esma Aimuer, Privacy Protection Issues in Social Networking Sites,. University of Montreal Canada. IEEE 2009.

Recomonded Articles:

Author(s): Rashmita Kumari Mohapatra, Badri Narayan Mohapatra, Prangya Prava Panda

DOI: 10.5958/2231-3915.2019.00001.4         Access: Open Access Read More

Author(s): P. L. Sharma, M. Rehan

DOI:         Access: Open Access Read More

Author(s): Rahul D. Kopulwar, Chetan Bawankar

DOI:         Access: Open Access Read More

Author(s): Suman Janghel

DOI: 10.5958/2231-3915.2020.00021.8         Access: Closed Access Read More

International Journal of Technology (IJT) is an international, peer-reviewed journal, research journal aiming at promoting and publishing original high quality research in all disciplines of engineering sciences and technology...... Read more >>>

RNI: Not Available                     
DOI: 10.5958/2231-3915 


Recent Articles




Tags