Skip to main content

The Effects of the Property of Access Possibilities and Cybersecurity Awareness on Social Media Application

  • Conference paper
  • First Online:
Advances in Data Science, Cyber Security and IT Applications (ICC 2019)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1097))

Included in the following conference series:

  • 1048 Accesses

Abstract

Cybersecurity became the third war in the world as it affects the privacy, security, availability, and access possibilities of user’s data. Lately, the statistics shows that the users prefer social media application to share their data and updates. Many users believe that only their followers can see their updates while the permissions of access possibilities terms and conditions provided some authority to access the data. To highlight this issue we did a survey in users awareness of accepting access possibility to their data and analyse the risks of allowing/accepting the access possibility of users’ data in social media applications. In this paper we propose a Reconnaissance Penetration Testing Methodology (RPTM) that aims to study the process of reconnaissance and information gathering of specific target to show the user’s data. In result and discussion we have did a statistical study to find out the level of users awareness in cybersecurity and access possibilities.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Rathod, P., Hämäläinen, T.: A novel model for cybersecurity economics and analysis. In: 2017 IEEE International Conference on Computer and Information Technology (CIT), Helsinki, pp. 274–279 (2017)

    Google Scholar 

  2. Sabillon, R., Serra-Ruiz, J., Cavaller, V., Cano, J.: A comprehensive cybersecurity audit model to improve cybersecurity assurance: the cybersecurity audit model (CSAM). In: 2017 International Conference on Information Systems and Computer Science (INCISCOS), Quito, pp. 253–259 (2017)

    Google Scholar 

  3. Javidi, G., Sheybani, E.: K-12 cybersecurity education, research, and outreach. In: 2018 IEEE Frontiers in Education Conference (FIE), San Jose, CA, USA, pp. 1–5 (2018)

    Google Scholar 

  4. Parekh, G., et al.: Identifying core concepts of cybersecurity: results of two Delphi processes. IEEE Trans. Educ. 61(1), 11–20 (2018)

    Article  MathSciNet  Google Scholar 

  5. Tetskyi, A., Kharchenko, V., Uzun, D.: Neural networks based choice of tools for penetration testing of web applications. In: 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT), Kiev, pp. 402–405 (2018)

    Google Scholar 

  6. Al Shebli, H.M.Z., Beheshti, B.D.: A study on penetration testing process and tools. In: 2018 IEEE Long Island Systems, Applications and Technology Conference (LISAT), Farmingdale, NY, pp. 1–7 (2018)

    Google Scholar 

  7. Jiajia, W.: Research of penetration test based on mobile internet. In: 2016 2nd IEEE International Conference on Computer and Communications (ICCC), Chengdu, pp. 2542–2545 (2016)

    Google Scholar 

  8. Wilcox, H., Bhattacharya, M.: A framework to mitigate social engineering through social media within the enterprise. In: 2016 IEEE 11th Conference on Industrial Electronics and Applications (ICIEA), Hefei, pp. 1039–1044 (2016)

    Google Scholar 

  9. Mouton, F., Leenen, L., Venter, H.S.: Social engineering attack detection model: SEADMv2. In: 2015 International Conference on Cyberworlds (CW), Visby, pp. 216–223 (2015)

    Google Scholar 

  10. Kunwar, R.S., Sharma, P.: Social media: a new vector for cyber attack. In: 2016 International Conference on Advances in Computing, Communication, & Automation (ICACCA) (Spring), Dehradun, pp. 1–5 (2016)

    Google Scholar 

  11. Soumya, T.R., Revathy, S.: Survey on threats in online social media. In: 2018 International Conference on Communication and Signal Processing (ICCSP), Chennai, pp. 0077–0081 (2018)

    Google Scholar 

  12. Greitzer, F., Strozer, J., Cohen, Sh., Moore, A., Mundie, D., Cowley, J.: Analysis of unintentional insider threats deriving from social engineering exploits. In: IEEE Security and Privacy Workshops (2017). https://doi.org/10.1109/SPW.2014.39

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Bedour F. Alrashidi , Aljawharah M. Almuhana or Alanoud M. Aljedaie .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Alrashidi, B.F., Almuhana, A.M., Aljedaie, A.M. (2019). The Effects of the Property of Access Possibilities and Cybersecurity Awareness on Social Media Application. In: Alfaries, A., Mengash, H., Yasar, A., Shakshuki, E. (eds) Advances in Data Science, Cyber Security and IT Applications. ICC 2019. Communications in Computer and Information Science, vol 1097. Springer, Cham. https://doi.org/10.1007/978-3-030-36365-9_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-36365-9_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-36364-2

  • Online ISBN: 978-3-030-36365-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics