Article Preview
TopIntroduction
Social networks are increasingly popular due their wide range of communication capabilities like sharing photos, interests and even contacts. In social networks, individuals or groups with similar values, visions, goals, interests, or friendships can establish contact and start communicating. Online social networks have helped encouraged such interactions due to their ability to rapidly share information and support communications. Online social networks allow users to create profiles that can be shared with fellow contacts.
Social networking profile serves as an opportunity to grow a user’s connections and thus expand one’s contact circle which enhances their social currency. Increasingly people may use their profile to enhance their social status by gathering more contacts and posting more messages or updates. People may be attracted to those with strong social statuses and influential roles.
Social networks have grown tremendously in popularity due to a number of useful features. These features include:
- •
Profile pages showing details and interests;
- •
Ability to connect to like-minded individuals;
- •
Lists of contacts;
- •
Photo albums;
- •
Messages;
- •
Status updates;
- •
Comments;
- •
Games;
- •
Applications;
- •
Quizzes;
- •
Advertising;
- •
Links to other social networks;
- •
Ability to make new contacts;
- •
Contact lookup.
These features, to a large extent are attractive functions of social networks, with many users posting updates of their status, as well as establishing contacts and sharing content within social groups. Since social network provide the ability to make new contacts, users may be eager to accept friend requests and posted links. Users can receive multiple invitations to accept contacts and due to the implicit trust on social networks these invitations may be easily accepted without any consideration of the consequences.
Social networks provide for many functions. However, both malicious and beneficial activities be carried out using these platforms. Social engineering attacks may take advantage of users that are eager to interact and engage with a new contact made on a social networking site. Social engineering attacks occur when an attacker convinces a user to divulge sensitive information like passwords or system settings. Fake contacts may entice a user into believing they are real through compliments and gentle persuasion. However, the user remains in the dark completely unaware that the profile they are engaging with is invalid. Furthermore, social networking malware can be propagated from fake accounts or reposted messages.
These dangers raise important issues about understanding why users inherently trust these platforms. Understanding on why users trust social networks can help create security awareness to protect users from being attacked with social engineering techniques. It is, therefore, becoming vitally important that users be educated on the dangers of malware dispersal and fake personas.