DIGITAL SECURITY AND INFORMATION ASSURANCE


This blog is created to stimulate academic discussion in partial fulfillment of the degree of Doctorate of Computer Science in DIGITAL SECURITY AND INFORMATION ASSURANCE for the Colorado Technical University, Colorado Springs, Colorado.

Courses includes - EM835 Information Accountability and Web Privacy Strategies; SC862 Digital Security; Quantitative Analysis; Software Architecture and Design - CS854;















Tuesday, March 29, 2011

Privacy and Security Issues in Social Networking

                            
Project Paper: Privacy and Security Issues in Social Networking
Dr. Brian Pankau
                   Submitted in Partial Fulfillment of the Requirements for EM835
Information Accountability and Web Privacy Strategies
(Winter 2011)

Abstract

Most online social networking sites share a core of features that are completely absent in their offline counterpart. The relation between privacy and a person’s social network is multi-faceted. In certain occasions we want information about ourselves to be known only by a small circle of close friends, and not by strangers. In other instances, we are willing to reveal personal information to anonymous strangers, but not to those who know us better. In this paper, I highlight the privacy issues as well as digital security problems the rapid growing online social networking sites are facing. I also put forward a set of recommendations that makes social networking safer and promote healthy web interactions.

Introduction

The online social networking goes like this, an interested individual with an internet connection visit the social site. The individual creates a profile of themselves which includes names, sex, age, and geographical location to others to peruse, with the intention of contacting or being contacted by others or to meet new friends or dates.
Gross R. et al (2005) observed that “While social networking sites share the basic purpose of online interaction and communication, specific goals and patterns of usage vary significantly across different services.
The most common model is based on the presentation of the participant’s profile and the visualization of her network of relations to others - such is the case of Friendster”. The model varies and is completely different in some social network sites like match.com, salon and others while it is absolutely compulsory to have a profile for you to interact with other members. In some, the creation of a profile is secondary for instance on Livejournal.com. Therefore the patterns of online personal information revelation are quite variable as you transverse one social networking site to another. For instance, the use of a person real name to represent an account profile is encouraged on some sites like facebook.com but is the opposite in some sites.
Social networking sites like facebook tend to connect participants’ profiles to their public identities. This has its own demerits as well as privacy problems. A site like Friendster doesn’t encourage the use of real names in fact there are filters that shield the public identity of a person and his or her online persona by making only the first name visible to others and not the last name. “Notwithstanding the different approaches to personal identity, most sites encourage the publication of personal and identifiable personal photos (such as clear shots of a person’s face” (Gross R. et al (2005). It has been reported that online social networks are vaster and have weaker ties, on the average, than the offline social networks.
Trust in and within online social networks may thus be assigned differently and could therefore have different meaning than their offline counterparts. Consequently, the degree of privacy evasion is more in online networks because of the loose relationship within such communities. In essence, trust decrease within online social network.



1. 0 Privacy implications

The privacy implications associated with online social networking in this technology age are manifolds and depends to large extent on the level of identification of the information provided, its possible recipients and uses. In a study conducted by Gross R. (2005), it was discovered that “Even social networking websites that do not openly expose their users’ identities may provide enough information to identify the profile’s owner. This may happen, for example, through face re-identification”. Identifiable information is often available to the hosting sites of some of the notable social networks. These sites may on their own use the information knowingly or sometimes revealed the information to third party thereby contradicting their own privacy or user agreements.
            The easiness of joining and at the same time of extending one’s network on most of these social networking sites makes it easy for hackers to access online the community users’ data. 
Newitz A. (2003) reported that “LiveJournal used to receive at least five reports if identification hijacking per day”. Some unscrupulous persons and con artists often navigate online social web sites and have been using stolen identities to commit frauds and other crimes. With stolen identities, hackers sometimes entice unsuspecting social network members in chat rooms into parting with money, peddle traditional business opportunity scams. It was reported by the Federal Trade Commission the con artists are contacting social networking site community members through email with false promises about earnings through day trading. Also hijacking unsuspecting members' modems and cramming hefty long-distance charges onto their phone bills.
Some online social networking community members do not care about the amount of information they reveal online. This is because the type of information they revealed often include such things as
Hobbies and interests,
Information about current and previous schools
Employment history or information and name of employers
Private information such as drinking, smoking and drug habits
Sexual preferences and orientation
Age
Marriage status
Geographical location.


            The information stolen from social networking sites and communities can be used for various purposes depending on the type of information or data retrieved. Some of the information can be somehow intimate or extensive. The risks include online and physical stalking, personal embarrassment, price discrimination and more so blackmailing. Privacy is virulently at risk but who is to blame if you realize that most information on social networking sites is freely given by member themselves. Hence privacy expectations may not be matched by privacy reality. Facebook for instance, is straightforward about the usage of personal information it collects from members even on the one unknowingly provided for example the IP address of login members.  Facebook detailed its privacy policy as follows:


1. Introduction
2. Information We Receive
3. Sharing information on Facebook
4. Information You Share With Third Parties
5. How We Use Your Information
6. How We Share Information
7. How You Can Change or Remove Information
8. How We Protect Information (adapted from facebook.com/policy.php)

 1.1 Embarrassing Digital Dossier  

Social networking sites build a digital dossier of the information they received from participants judging from the low and decreasing costs of storing digital information nowadays. So it is possible to continuously monitor user’s profiles on these social networking sites which currently are consider insignificant but may become public information as time goes on. Views that are considered privately expressed may become an embarrassing nightmare in the future when the data currently mined are freely available. Only time will tell as technology of online networking is unbelievable dynamic.

1.2 Stalking and Cyber-Stalking

            A rather dangerous side effect of privacy evasion from online social networking sites is the tendency of being stalked by online acquaintances. It is very common to socialite with online friends within same geographical areas. For example, Facebook have recently introduced a new relationship based on user location. In fact profiles on the site contain information about residence location, sometimes class schedule and location of last login. A completely derail person who has previously obtained or have a knowledge of someone location due to an online association can stalk that person.  In the same token, a potential stalker can take advantage of its prey because the resident location information is available to him or her with easy.
            Privacy evasion is becoming more apparent on social networking sites with instant messenger services and those that offer chat room for participants. For example, AOL instant messenger has a feature called buddies list. But unlike other messaging services, AIM allows members to add buddies to buddies list without their knowledge or confirmation. Once the attacker is a buddies list, the victim can be tracked as soon as he or her logon to the social networking site. The notoriety is called cyber-stalking.

1.3 Fake Email address for Account creation
            The process of verifying a user registration on most social networking sites takes minutes, therefore a hacker can quickly join an online social site also within a couple of minutes.
The social networking site will verify the hacker as a legitimate user by sending a confirmation email to the fake email address he or she quickly created to login to the site. So the process of account creation and verification on social networking sites is an added incentive to hacker’s detective mission to steal and retrieve genuine user information.


1.4 Manipulation of Users
            It has been reported that obtaining confidential information from social networking sites has taken a new dimension. Social engineering antics are now being employed to retrieve personal information from unsuspecting online socialite. According to Jump K. (2005), “thirty percent of Facebook users are willing to make all of their profile information available to a stranger and his network of friends”.

1.5 Cyber Bully
The privacy concerns have also resulted in a number of reported cases of online bully especially among young teenagers in our education systems mostly in primary and high schools. Many factors have since been identified as contributory factors to online bully on social networking sites and in order to reduce such incidents the following have been recommended.
○ Raise awareness of safety education messages and acceptable use policies on all social          
   networking sites frequent by kids for instance Facebook.
Ensure that services are age-appropriate for the intended audience.
Empower users through tools and technology to be able to block any one that bullies from                            
  many direct contact with them.
Provide easy-to-use mechanisms to report illicit conduct or improper content.
Promptly respond to notifications of illegal content or conduct.
○ Enable and encourage users to employ a safe approach to personal information and privacy,
Assess the means for reviewing illegal or prohibited content and bullying conduct.

1.6 Single sign on promotes dynamic privacy
            Just recently, Facebook launched its “Facebook connect” service to try to solve a major ache of online computing especially among social networkers. According to Harris S. (2009),
“it saves visitors from having to fill out yet another tedious registration form, upload another profile picture and memorize another username and password. Instead, visitors can now sign into other sites using their existing identity on Facebook”. The Facebook connect service is helping to promote dynamic privacy by aiding profile sharing amongst various online destinations.


2.0 Security Implications
        It is reasonable to expect that security issues of online social networking sites far outweigh its offline social forum.
The social network sites most likely to suffer from privacy and security issues are the popular ones. Privacy issues most often involve the unwarranted access of private information and may not be directly due to security breaches. A crafty and determined individual may through shoulder peeking watch you type your password and consequently use it to obtain confidential information from your computer at a later time.
According to Brendan Collins (2008), “a security issue occurs when a hacker gains unauthorized access to a site’s protected coding or written language” There is a clear distinction between privacy and security issues that most social networks faces due to rapid popularity and its profitable financial importance. There is a tremendous amount of information and data that most social network sites processes every day.  Thus there could be lapses in security on those sites making it possible for would -be-hacker to exploit flaws in the systems.
The following features on network social sites which involve mass participation of people are targeted by hackers or site attackers:
Chat rooms
Messages
Invitations
Photos
• Open platform applications.

It has been reported that the aforementioned features are avenues to gain unprecedented access to some privacy information of unsuspecting individuals. A recent case in mind is the one that shows a devastating hole in the framework of a third party application programming interface on Facebook. This programming flaw allows hackers to gain unrestricted access to private information. The developers of those applications failed to follow sound programming techniques thereby exposing more information than necessary to run the application in the first place. This glaring consequence of over-sharing of user data is not new because security of social network sites has not been taking seriously until just recently. To mitigate against such security problems, some sites introduce users privacy controls at all levels within profiles. But such increase privacy settings does not in all ramifications guaranteed adequate privacy and security issues. Most social network sites do not have a streamline way to test third party applications where users’ data and information can be retrieved without consent. Such application flaws can allow criminal minded developers to sell users data to advertising companies for financial gains.
The online social security issues incorporated its entire offline counterpart and include risks that are growing daily. Some of these include:

Identity Theft
● Email spamming to propagate malware
● Use of false profiles
● Social Engineering tactics to retrieve information
● Targeted attacks through botnets
● Vulnerability to Cross-site scripting e.g. MySpace.                                                                                  ● Source of releasing confidential or proprietary information
● Phishing Attacks



Data and Information

Gross R. et al (2005) found that “across different sites, anecdotal evidence suggests that participants are happy to disclose as much information as possible to as many people as possible. It is not unusual to find profiles on sites like Friendster or Salon Personals that list their owners’ personal email addresses (or link to their personal websites), in violation of the recommendation or requirements of the hosting service itself”.
Most internet based companies hold large volume of personal data which are unregulated and includes:
1. Processing of the data
2. Analyzing data
3. Transmitting data
4. Collection of data.
In the light of mass database in various data centers around the world, one can categorically agree with the assertion that “data processing technology and the creation of mass databases inevitably erode privacy” (Landy K., 2008).
We all know that there’s need for well-conceived privacy policies to take care of the unprecedented digital privacy issues, but leadership is lacking both in government and in private settings.
Due to the explosive use of online social networks, various notable businesses have been building applications to target such users. There are increased efforts for communicating with people using those sites and is been intensified. Most companies are using targeting marketing strategy to:
Monitor their habits and views
For influencing their opinions and
Direct their spending powers

Among the menace of the social networking sites are:
Data safety – frequent visitors are continuously hit by identity theft and frauds.
Minors are expose to improper content or faces indecent exposure online
People entering into dangerous relationships
Elderly are lured in risky financial dealings.

The exponential growth in the number of users using social networking sites is not a surprise.  In 2008, the total number was put at 200 Million, now the number as reported by various online Watchers put the figure roughly at 700 million users with facebook only having a total of 500 million registered users and is still growing by the hour.  Hofer F. (2010) observed “Given these figures it’s definitely no surprise that companies from various industry sectors are keen on trying to develop potential business applications with a specific focus on social network
users”. The notion is online social networking users are potential customers in all indications.
In fact, social networking sites are regarded as the new business environment and a lot of
companies are building application to specifically target social-networkers using various
marketing tactics available in their arsenals.

Lack of Social network Policies:

It was observed during the international conference on data protection and improper use of private information posted by users on social networks that some golden rules be observed.
These are categorized in term of users and online service providers. Users were advised to:
• Carefully select which personal data (if any) to be posted on a social network.
• Bear in mind other individuals’ expectation to privacy when publishing information
  about them.
• Always be cognizant that security of their information online is not 100 percent guaranteed.
• Users’ information can be mined and use for various marketing purpose by online marketers.

The online social networking service providers were reminded among others to (adapted from Harris S. (2009):
■ Comply with privacy standards in place and as per regulatory authorities.
■ Inform users adequately about use of posted data, possible consequences of their
    publishing and security risks.
■ Favor to a maximum extent users’ control on their data and profiles.
■ Offer users privacy-friendly default settings.
■ constantly improve systems’ security in order to prevent fraudulent access.
■ Granting users’ right to access control and correct their personal data.
■ Offer suitable means for deleting personal profiles and information once membership
     is terminated.
■ Enable the creation and encourage the use of pseudonyms.
■ Prevent uncontrolled third party access and practices such as spidering and bulk
    harvesting.
■ Allow external crawling only on users’ informed, specific and in-advance consent.




Recommendations and Solutions to social network privacy/security issues

◊Don't share your password with anyone.
◊After you type your login credentials into the login page, make sure you uncheck box
  “remember me”.
◊Always log out when you're finished using any social networking site.
◊ Try to avoid to put sensitive information on social web sites, choose what kind of information you share with the site and how much.
 ◊ Choose to put just the essential things, for example if you deal with hobbies (music etc.) don't add non-essential work information.
◊.Customize your privacy settings
◊ Blocking accesses and eventually report privacy violations.
◊. Limit your online social activity and online presence
◊. Don’t post anything that you are ready to divulge to a complete stranger
◊. Be sure of the identity of who you add as an acquaintance online
◊ Read the privacy disclosure of the site before you join
◊. If possible, verify that adequate privacy settings are allowed on the site



CONCLUSION:
            Humans by their nature are social animals thus online social networks are genuine avenues to exercise more interactions. Social networks are not threats but they are created to offer more opportunity for social interactions universally. A common sense approach is needed to guide against unsolicited friendship and information dissemination in online social networking forum.  The false of security makes people on social sites to divulge so much information about themselves. Geolocation services being offered on some sites keeps a record of where online participants visit and go. The security implication is grave and alarming because the information that is leaked online can undoubtedly used against the person divulging the information. What hitherto is considered private is no longer private. Also, constantly update profile information with your whereabouts could open a flood gate for criminals to target your house and burgled it.
            To avoid identity theft, the use of secure credentials is recommended on social networking sites.  A weaker password for example could compromise a participant’s account and hackers can use it to spam all your contacts. There is also need for industry regulation and policy on the social networking sites

Reference

Acquisti, A., Gritzalis, Stefanos, Lambrinoudakis, Costas, De Capitani Di Vimercati, Sabrina (2008). “Digital Privacy, Theory, Technologies, and Practices”. Auerback  Publications. Taylor & Francis Group, LLC

Gross R. (2005). Re-identifying facial images. Technical report, Carnegie Mellon University, Institute for Software Research International, 2005. In preparation.

Gross R., Acquisti A. and John Heinz H. III. Information Revelation and Privacy in Online Social Networks. Retrieved 03/12/2011 from,
http://dataprivacylab.org/dataprivacy/projects/facebook/facebook1.pdf

Collins B. Privacy and Security Issues in Social Networking. Retrieved 03/12/2011 from,
http://www.fastcompany.com/articles/2008/10/social-networking-security.html

Harris S. (2009). Security Issues of Social Network Sites. Retrieved 03/12/2011 from,
http://www.informit.com/blogs/blog.aspx?uk=Security-Issues-of-Social-Network-Sites

Hofer A. F. Privacy issues in social networking: the European perspective1. Retrieved 03/15/2011 from, http://www.gala-marketlaw.com/pdfs/Privacyissuesinsocialnetworking.pdf

Jump K. (2005). A new kind of fame. Retrieved 03/15/2011 from,
http://www.columbiamissourian.com/stories/2005/09/01/a-new-kind-of-fame/

Newitz. A. (2003). Defenses lacking at social network sites. Security Focus, December 31, 2003.
Oram A. & Viega J. (Eds.). (2009) Beautiful security: Leading security experts explain how they think (pp 33-61). Beijing: O’Reilly Media
Zorz M. (2009). Social networking privacy issues. Retrieved 03/13/2011 from,
http://www.net-security.org/article.php?id=1331

Facts for Consumers.  Retrieved 03/16/2011 from
http://www.ftc.gov/bcp/edu/pubs/consumer/tech/tec09.shtm

Social Networking Sites: A Parent’s Guide. Retrieved 03/16/2011
http://www.ftc.gov/bcp/edu/pubs/consumer/tech/tec13.shtm

The Facebook. Privacy policy. Retrieved 03/16/2011 from,
http://facebook.com/policy.php, August 2005.










Monday, March 14, 2011

SECURITY BY DESIGN - Overall Security Is Beautiful


                              It is always a good information security strategy to treat security as a critical aspect of system development during early stages of system design lifecycle. The author went on a memory lane and identified many information system and design projects that failed because risk-based security programs that address security at all phases of system development cycle were not followed. According to the author, system security is interwoven with system quality, reliability, availability, maintainability and usability. We can only have a secure software or system if all vulnerabilities are curtailed and all system functionalities are devoid of security problems in all phases of the system lifecycle. Shortcuts in system and software development lifecycle must be avoided.
Due to network interconnects postures of most environments, it is imperative to guide all access points against attacks and reduced the overall systems exploits to such abuses. Perimeter security model often failed to accomplish the desire security goals because systems are exposed to risks they are not protected against in the initial stage of development.
Security metrics should be measured at the component levels to fully address all security concerns in system architecture. It is equally important to embark upon quality test and system integration testing in order to account for all key security issues at the developmental stages. Security metrics should not be based on just quality but security roles in cost reduction, safety and speed of system delivery must also be considered.
System testing is an essential requirement to gather modest system security metrics. Testing should be done at component levels. It is also important that integration testing must be conducted. Unit testing is a must.
The author found to his dismay that system development and engineering, robust system architecture, security procedures, and sound deployment methodologies are sacrificed on the altar of quick product turnaround and race to the market. Solid system engineering practices are thrown to the winds. Thus many systems have serious architectural and programming flaws that ultimately undermine their security.
The book showed that consistent software design and development best practices are being achieved through:
 * Standard configuration management
* Good product quality, security and reliability controls
* Good testing procedures
* Deployment of standard foundational elements for determining operational metrics, project management and training
* Risk management
A system development lifecycle that lacks proper security elements and integrations during all the phases of design is bound to fail and the resulting final product is always:
1. Fragile in nature
2. Difficult to operate
3. Difficult to maintain.
In conclusion, to have a good secured system all component parts must be tested using various test scenarios, risks analyzed,  and system performance test for reliability, availability and usability.
Reference
Oram A. & Viega J. (Eds.). (2009) Beautiful security: Leading security experts explain how they think (pp 171-182). Beijing: O’Reilly Media




Privacy, Profiling, Targeted Marketing, and Data Mining - Trust is needed

The technology revolution has provided unlimited possibilities for collecting and storing personal data and information. Most of this information is mined from interviews, surveys and other sources with no attention to privacy. To be successful in their marketing endeavor, companies are very proactive and can predict what a customer needs through various targeted marketing campaigns.
To many businesses, the benefits of customer profiling include:
• Personalized marketing campaigns enable them to find and keep more customers, as well as give them better service.
• Maximize revenue from each existing customer and use that marketing data to target new prospects.
• Segment their customers to ensure that they send the right message to the right audience, maximizing limited marketing dollars.
• Dynamic, real-time groups ensure that each campaign addresses key markets, and that target groups always receive the most current, accurate information.
The author recognized that privacy- preserving profiling is something that can be achieved through cryptographic means. But an efficient solution by it requires some element of trust. According to the author three distinct and conflicting privacy and security requirements that must be met in order to adequately perform privacy-preserving profiling are:
* the data must not be revealed
* the classifier must not be revealed
* the classifier must be checked for validity.
A number of classification models for privacy-preserving profiling without revealing it have been proposed. The methods used have the following properties:
* the classification result is only reveal to designated party.
* no information about the classification result is revealed to anyone else.
* rules used for classification can be checked for the presence of certain conditions without revealing the rules e.g. no race is being used.
It is important to note that privacy-preserving profiling is possible by using commutative encryption protocol. This encryption protocol can be used on data item enciphered with multiple encryption keys in any arbitrary order.
Ensuring privacy in Targeted marketing:
It is important to adequately ensure privacy while at the same time perform targeted audience marketing. We should also be mindful that customers are either static or mobile. So the best approach is to combine methods that meet the different requirements for each class. More so, when the identification of the right target audience is the essence of effective marketing. To achieve this, we can comfortably use clustering and cluster analysis.
The cluster analysis consists of 4 distinct critical implementations as illustrated by the author:
* Segmenting the market – consists for example of consumers who are homogeneous in term of the benefits they derived.
* Understanding buyer behavior – works well if consumers are group together in term of common behavior.
* Identifying new product opportunities – set the tone for a highly competitive market
* Selecting test materials- allows for testing various marketing strategies.
?Reducing data – a good representative can easily be identified in homogenized clusters.
Ensuring privacy of mobile users:
The significant use of mobile devices has raised a lot of privacy and security issues especially at it relate to commerce. Marketing on mobile devices are based on what the author called location-based services (LBS). The following are attributes of the location-based services:
* It is to a request usable
* personalized information are delivered at the point of need
* targeting of customers based on advanced knowledge such as profiles and preferences or
* perhaps using their locations
The security and privacy concerns in location based service are
- It may be possible for an adversary to physically locate a person of interest.
- Tracking of individuals is possible which can have adverse consequences.
- The profiles of the mobile customer are often retain the during marketing
- It is difficult to maintain confidentiality because the identity of the user can often be traced to the LBS.
Privacy-Preserving Data mining technique. It deals with the problem of mining data without seeing through secure computations. Two known methods are universally used to accomplished privacy-preserving data mining and these are:
- Perturbation: Individuals have access to their data and only care about the privacy of certain attributes. Although, data security have been proved not to be well established because knowing bounds of data can degrade their security.
- Cryptographic Approach: is more secure but less efficient. Mostly used in situations where there are small number of interested parties that owns large amount of data that are analyzed together.
Conclusion:
Profiling provides the basis for starting what marketers or law enforcement agencies call a "dialogue" with customers or suspects but without regard to the privacy of the customers or persons involved. But privacy-preserving profiling needs more data mining approaches in order to be trusted and to  maintain confidentiality.
 
Reference
Acquisti, A., Gritzalis S., Lambrinoudakis C., & De Capitani di Vimercati S. (Eds.). (2008) Digital privacy: Theory, technologies, and practices. New York: Auerbach Publications.
Marketing Automation: Customer Profiling. Retrieved March 8, 2011 from http://www.netsuite.com/portal/industries/wd/marketing_cus_profiling.shtml
Smirnov-M H. (2007) Data Mining and Marketing. Retrieved March 7, 2011 from http://www.estard.com/data_mining_marketing/data_mining_campaign.asp