SophiaPretty

(5)

$14/per page/Negotiable

About SophiaPretty

Levels Tought:
Elementary,Middle School,High School,College,University,PHD

Expertise:
Accounting,Algebra See all
Accounting,Algebra,Applied Sciences,Architecture and Design,Art & Design,Biology,Business & Finance,Calculus,Chemistry,Communications,Computer Science,Economics,Engineering,English,Environmental science,Essay writing Hide all
Teaching Since: Jul 2017
Last Sign in: 304 Weeks Ago, 3 Days Ago
Questions Answered: 15833
Tutorials Posted: 15827

Education

  • MBA,PHD, Juris Doctor
    Strayer,Devery,Harvard University
    Mar-1995 - Mar-2002

Experience

  • Manager Planning
    WalMart
    Mar-2001 - Feb-2009

Category > Computer Science Posted 15 Oct 2017 My Price 10.00

Read the article posted in the attached folder, Forensics Tools for Social Networks.

Proceedings of Student-Faculty Research Day, CSIS, Pace University, May 8th, 2009Forensics Tools for Social Network Security SolutionsJanet Cheng, Jennifer Hoffman, Therese LaMarche, Ahmet Tavil, Amit Yavad, and Steve KimSeidenberg School of CSIS, Pace University, White Plains, NY 10606, USAAbstractThe usage of Social Network Sites has increasedrapidly in recent years. Since the success of a SocialNetwork Site depends on the number of users itattracts, there is pressure on providers of SocialNetwork sites to design systems that encouragebehavior which increases both the number of usersand their connections. However, like any fast-growing technology, security has not been a highpriority in the development of Social Network Sites.As a result, along with the benefits of Social NetworkSites, significant security risks have resulted.Providing Social Network Site users with tools whichwill help protect them is ideal.Tools are developedfor installation on a user’s computer to provide themthe ability to retrieve other online user informationvia chat and social network websites. These tools willalso benefit law enforcement agents when crimes arecommitted.1.IntroductionThis paper analyzes and extends the forensic toolsdeveloped in an earlier study for protecting SocialNetwork Site users from security threats [14].First,we will identify the security issues found in SocialNetwork Sites.Second, we will demonstrate how ourtools can provide users with more information whichwe hope will help prevent them from becomingvictims.Finally, if a crime has been committed, wewill detail the tools available to assist inapprehending the perpetrator.The tools we developed retrieve Social Network Siteuser’s non-personal-identifiable information, such asIP address, operating system, browser type, etc.Retrieval of this information occurs upon the virtualcontact from that other person, be it by them simplybrowsing our personal page, or by other personcontacting via Virtual Meeting, for example chatting.This paper covers methodologies used, test results,and future goals.The Social Network Site security issues are: [4]Corporate Espionage; Cross Site Scripting, Viruses &Worms; Social Network Site Aggregators; SpearPhishing & Social Network specific Phishing;Infiltration of Networks Leading to data leakage; I.D.Theft; Bullying; Digital Dossier AggregationVulnerabilities;SecondaryDataCollectionVulnerabilities; Face Recognition Vulnerabilities;CBIR (Content-based Image Retrieval); Difficulty ofComplete Account Deletion; Spam; and Stalking.2.Case StudiesThere are many criminal activities arising from theuse of social network sites.For example, a motherwas convicted of computer fraud for her involvementin creating a phony account on MySpace to trick ateenager, who later committed suicide [15].Thetools found in this paper can be used to track and helpminimize or prevent crimes related to social networks.3.MethodologyThe methods used in designing the data retrievaltools and storage mechanisms include PHP websiteswith MySQL databases, Java applets, a Java webapplication with an Access database and NetStat viaMSDOS scripting. We anticipate that many of themethods can be used on any computer without anytechnical know-how.4.Social Networking Websites4.1.DefinitionWe define social network sites as web-based servicesthat allow individuals to (1) construct a public orsemi-public profile within a bounded system, (2)articulate a list of other users with whom they share aconnection, and (3) view and traverse their list ofconnections and those made by others within thesystem. The nature and nomenclature of theseconnections may vary from site to site [2].4.2.Privacy IssuesFacebook's Beacon service tracks activities from allusers in third-party partner sites, including peoplewho never signed up with Facebook or who havedeactivated their accounts.This is an example of avulnerability in Facebook (among others) [10], yet auser can use this vulnerability to their advantage.
Background image of page 1
A4.2Beacon captures data details on what users do on theexternal partner sites and sends it back to Facebookserver, along with users' IP addresses, the addressesof Web pages the user visits, etc.4.3.Security Features and PrivacyWe have evaluated the security features on the TopTen (10) Social Networking Websites of 2009 [18].Table 1 summarizes these security features.Thewebsite support of third party scripts is considered asecurity hole which this study’s visitor trackerutilizes.SocialNetworkSupportsHTMLVisitorTrackerCustomizablePrivacySettingsBeboNoNoYesFacebookNoNoYesFriendsterNoYesYesHi5YesYesYesMySpaceYesNoYesNetlogNoNoYesOrkutNoYesYesPerfSpotYesYesYesYahoo!360YesNoYesZorpiaNoNoYesTable 1.Security features on top ten social networks.“Supports HTML” means the network allows HTML codeimplemented into the user’s profile.“Visitor Tracker”means the websites enables users to view who had viewedtheir profiles.“Customizable Privacy Settings” means thewebsite allow you to control who can view your profile.4.3.1.FacebookFacebook’s security and privacy settings are moreadvanced than other sites, allowing it to be discussedseparately.It offers robust, customizable privacysettings which allow users to show or hide differentsections of their profile.The settings can be specificto a single user, list of users, networks, the entiremember base and internet users querying searchengines with your name.Facebook does not allow users to embed any code ontheir user pages.However, it does allow third partyapplications to be installed on a user’s page, whichopens up security issues if a developer decides tocreate an application that does not behave asadvertised. Caution should be exercised wheninstalling any third party applications.4.3.2.Websites that Allow Third Party ScriptingThe websites listed in this section allow third partyscripting (e.g. HTML, Javascript).This opens up anopportunity for third party scripts to be executedwhen visitors access a user’s page.MySpace does not allow Java Script code to be usedin their site [5].But, it does allow HTML code.The users of MySpace and Hi5 have the ability to addHTML code which can link to scripts and objectsdesigned to retrieve other visiting user’s information.The users of PerfSpot are also allowed to add HTMLcode to their pages, but there are restrictions on thecontents of this code.While some had strict security settings, Yahoo!360lack detailed security controls as to who can view theuser’s profile.Their option is either everyone canview their blog or just friends.In other socialnetworks such as, Facebook and MySpace, specificsecurity features are available to provide users withmore control over their personal information.4.3.3.Websites Which Provide a Visitor TrackerFriendster, Hi5, Orkut, and PerfSpot users have thebenefit of monitoring their profile visitors. Thisoption increases awareness, protection and eases usertracking.Orkut is the only social network that forcesthe user’s viewing history to be revealed if he/shedecides to track other users who had viewed theirprofiles.5.User Data Retrieval5.1.UserDataRetrievalfromSocialNetworking WebsitesIt is possible to retrieve information about the userswho visits your profile on Social Network Sites.Some of these sites provide built-in applicationswhich show the user names of the people who visityour profile.Other sites store log transcripts, whichcapture chat session information such as usernameand date.The function of user data retrieval can beaccomplishedwithinawebsitewithuserincorporation of either Java Script or PHP code [12].Some Social Network Sites have restrictions in placeto make Java Script and/or PHP code inactive, whena user tries to incorporate into their site.Covered in this paper are the different methods forcapturing the non-personal identifiable information,of users visiting/communicating with us in the virtualworld. We have established that user data retrievalcan be achieved with use of web based scripts.
Background image of page 2

Attachments:

Answers

(5)
Status NEW Posted 15 Oct 2017 06:10 AM My Price 10.00

-----------  ----------- H-----------ell-----------o S-----------ir/-----------Mad-----------am ----------- Th-----------ank----------- yo-----------u f-----------or -----------you-----------r i-----------nte-----------res-----------t a-----------nd -----------buy-----------ing----------- my----------- po-----------ste-----------d s-----------olu-----------tio-----------n. -----------Ple-----------ase----------- pi-----------ng -----------me -----------on -----------cha-----------t I----------- am----------- on-----------lin-----------e o-----------r i-----------nbo-----------x m-----------e a----------- me-----------ssa-----------ge -----------I w-----------ill----------- be----------- qu-----------ick-----------ly

Not Rated(0)