Meriem Daouah, A. Abou El Kalam, Abdellah Ait Ouahman
{"title":"Social networks services: Survey","authors":"Meriem Daouah, A. Abou El Kalam, Abdellah Ait Ouahman","doi":"10.1109/JNS3.2013.6595468","DOIUrl":null,"url":null,"abstract":"Nowadays, Social networks have taken a huge part of our life. While the number of people logging to such services is growing, concerns about security and protection of privacy have become more and more Important. In this paper, we explore risks facing the use of Social Networks and analyse the methods used by attackers to gain access to the shared data as well as the purpose behind these attacks. We also explore the limitations of current systems. Then we discuss some solutions that were proposed to enhance access control on social networks and protect users' personal data. This allows us to identify the main point that is neglected when conceiving new mechanisms: the human behavior.","PeriodicalId":157229,"journal":{"name":"2013 National Security Days (JNS3)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 National Security Days (JNS3)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/JNS3.2013.6595468","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Nowadays, Social networks have taken a huge part of our life. While the number of people logging to such services is growing, concerns about security and protection of privacy have become more and more Important. In this paper, we explore risks facing the use of Social Networks and analyse the methods used by attackers to gain access to the shared data as well as the purpose behind these attacks. We also explore the limitations of current systems. Then we discuss some solutions that were proposed to enhance access control on social networks and protect users' personal data. This allows us to identify the main point that is neglected when conceiving new mechanisms: the human behavior.