Abstract

Aim. In recent years, social networks have multiplied on the Internet, becoming more and more used, and consequently raising doubts about the security of privacy. This exponential development has attracted the attention of bad-intentioneds too. The aim of the research is to undestand how “attack algorithms” can violate the privacy of millions of people, despite privacy policies which do not allow their use.
 Methods. Considering an analysis on password security on Facebook, I evaluate the problems connected with the use of an attack algorithm in relation to privacy and security.
 Results. Over the years, Facebook privacy policies have been changed, but with new services it is still possible to trace personal information. Using special phishing techniques it is possible to get the access credentials of a good percentage of users. This allows attackers to perform online transactions, view bank accounts and their transactions, call details, credit card numbers and many other personal data.
 Conclusions. Waiting for the power of the future quantum Internet, it is unfortunately possible today to launch an attack exploiting the analysed techniques and even improve them, making them more effective and reaching even higher success rates, thus placing a very high number of users in serious danger.

Highlights

  • For some years social networks have invaded the Internet, becoming more and more used and raising many doubts on the security of privacy

  • Social networks have multiplied on the Internet, becoming more and more used, and raising doubts about the security of privacy

  • Considering an analysis of password security on Facebook, I evaluate the problems connected with the use of an attack algorithm in relation to privacy and security

Read more

Summary

Introduction

For some years social networks have invaded the Internet, becoming more and more used and raising many doubts on the security of privacy. They are platforms in which users can interact with friends, relatives or strangers, developing personal and professional relations. This exponential development attracted the attention of users, and of malintentioneds. Many attack algorithms have been created during these years; exploiting the information available on social networks, they can lead to violations of privacy of entire populations of the web, i.e. millions of people. It is true that new policies regarding privacy are created over time, but it is true that the efficiency of attacks improves (Vitali, 2010)

Objectives
Findings
Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.