Abstract
Cybersecurity became the third war in the world as it affects the privacy, security, availability, and access possibilities of user’s data. Lately, the statistics shows that the users prefer social media application to share their data and updates. Many users believe that only their followers can see their updates while the permissions of access possibilities terms and conditions provided some authority to access the data. To highlight this issue we did a survey in users awareness of accepting access possibility to their data and analyse the risks of allowing/accepting the access possibility of users’ data in social media applications. In this paper we propose a Reconnaissance Penetration Testing Methodology (RPTM) that aims to study the process of reconnaissance and information gathering of specific target to show the user’s data. In result and discussion we have did a statistical study to find out the level of users awareness in cybersecurity and access possibilities.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Rathod, P., Hämäläinen, T.: A novel model for cybersecurity economics and analysis. In: 2017 IEEE International Conference on Computer and Information Technology (CIT), Helsinki, pp. 274–279 (2017)
Sabillon, R., Serra-Ruiz, J., Cavaller, V., Cano, J.: A comprehensive cybersecurity audit model to improve cybersecurity assurance: the cybersecurity audit model (CSAM). In: 2017 International Conference on Information Systems and Computer Science (INCISCOS), Quito, pp. 253–259 (2017)
Javidi, G., Sheybani, E.: K-12 cybersecurity education, research, and outreach. In: 2018 IEEE Frontiers in Education Conference (FIE), San Jose, CA, USA, pp. 1–5 (2018)
Parekh, G., et al.: Identifying core concepts of cybersecurity: results of two Delphi processes. IEEE Trans. Educ. 61(1), 11–20 (2018)
Tetskyi, A., Kharchenko, V., Uzun, D.: Neural networks based choice of tools for penetration testing of web applications. In: 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT), Kiev, pp. 402–405 (2018)
Al Shebli, H.M.Z., Beheshti, B.D.: A study on penetration testing process and tools. In: 2018 IEEE Long Island Systems, Applications and Technology Conference (LISAT), Farmingdale, NY, pp. 1–7 (2018)
Jiajia, W.: Research of penetration test based on mobile internet. In: 2016 2nd IEEE International Conference on Computer and Communications (ICCC), Chengdu, pp. 2542–2545 (2016)
Wilcox, H., Bhattacharya, M.: A framework to mitigate social engineering through social media within the enterprise. In: 2016 IEEE 11th Conference on Industrial Electronics and Applications (ICIEA), Hefei, pp. 1039–1044 (2016)
Mouton, F., Leenen, L., Venter, H.S.: Social engineering attack detection model: SEADMv2. In: 2015 International Conference on Cyberworlds (CW), Visby, pp. 216–223 (2015)
Kunwar, R.S., Sharma, P.: Social media: a new vector for cyber attack. In: 2016 International Conference on Advances in Computing, Communication, & Automation (ICACCA) (Spring), Dehradun, pp. 1–5 (2016)
Soumya, T.R., Revathy, S.: Survey on threats in online social media. In: 2018 International Conference on Communication and Signal Processing (ICCSP), Chennai, pp. 0077–0081 (2018)
Greitzer, F., Strozer, J., Cohen, Sh., Moore, A., Mundie, D., Cowley, J.: Analysis of unintentional insider threats deriving from social engineering exploits. In: IEEE Security and Privacy Workshops (2017). https://doi.org/10.1109/SPW.2014.39
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Alrashidi, B.F., Almuhana, A.M., Aljedaie, A.M. (2019). The Effects of the Property of Access Possibilities and Cybersecurity Awareness on Social Media Application. In: Alfaries, A., Mengash, H., Yasar, A., Shakshuki, E. (eds) Advances in Data Science, Cyber Security and IT Applications. ICC 2019. Communications in Computer and Information Science, vol 1097. Springer, Cham. https://doi.org/10.1007/978-3-030-36365-9_5
Download citation
DOI: https://doi.org/10.1007/978-3-030-36365-9_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-36364-2
Online ISBN: 978-3-030-36365-9
eBook Packages: Computer ScienceComputer Science (R0)