IJSTR

International Journal of Scientific & Technology Research

IJSTR@Facebook IJSTR@Twitter IJSTR@Linkedin
Home About Us Scope Editorial Board Blog/Latest News Contact Us
CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT
QR CODE
IJSTR-QR Code

IJSTR >> Volume 7 - Issue 12, December 2018 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



Case Study Of Comparing Security Features Of Facebook And Google Plus

[Full Text]

 

AUTHOR(S)

Raniah M. Alsahafi

 

KEYWORDS

Cloud computing, Facebook, Google plus, Data privacy, security risks, social networking.

 

ABSTRACT

The topic of cloud computing is becoming well known these days. It enables many services to be easily accessed in the internet in anywhere in the world. People are sharing their life events with their friends over the internet using several types of social networking sites such as Facebook, Twitter, My Space, Google Plus and so on. This lead to spread much valuable information and it becomes hard to prevent these information from leaking. This Study compare the security features of the most popular social network: Facebook and Google plus. It discusses major features and threats that face them. Users are the most important defense line whether they are using Facebook or Google Plus. They are the only one who know how much security and privacy that they need and control the amount of information that they can post, also who allowed to access their profiles. I have tested the possibility of some of these threats. Furthermore, I had our own experience to test their users’ security awareness. Then, based on all of that, I have compared between them in terms of security and privacy. Finally, I present my point of view regarding the case study.

 

REFERENCES

[1] A. Felt. “Defacing Facebook: A Security Case Study”. Technical report, University of Virginia, July 2007.

[2] Google+ Real Name Policy Explained in Detail. Google+ News. Retrieved from http://google-plus.com/862/google-real-name-policy-explained-in-detail-invalid-profiles-may-be-suspended/, August 17, 2011.

[3] A privacy case study of Facebook users. Retrieved from http://www.architectingsecurity.com/2010/06/07/a-privacy-case-study-of-facebook-users/, June 7, 2010.

[4] A. Al Hasib, “Threats of Online Social Networks”, IJCSNS International Journal of Computer Science and Network Security, VOL.9 No.11, November 2009.

[5] The Most Common Security Threats on Facebook. Sick Facebook. Retrieved from http://sickfacebook.com/5-the-most-common-security-threats-on-facebook ,February 18, 2011.

[6] Basu.A.”How To Configure Facebook Two-Factor Authentication. Make Tech Easier”. Retrieved from http://maketecheasier.com/configure-facebook-two-factor-authentication/2011/06/17.June 17, 2011.

[7] Bill Pringle, Facebook security issues. Retrieved from http://billpringle.com/home/facebook.html,2011.

[8] D'Souza.E. Remote sign out and info to help you protect your Gmail account. Official Gmail Blog. Retrieved from http://gmailblog.blogspot.com/2008/07/remote-sign-out-and-info-to-helpyou. html#!/2008/07/remote-sign-out-and-info-to-help-you.html. July 7, 2008.

[9] Facebook Security. Forget to Log Out? Help is on the Way. Facebook. Retrieved from http://www.facebook.com/note.php?note_id=42513620076. September 2, 2010

[10] Harvey Jones, Jos´ Hiram Soltren,”Facebook: Threats to Privacy”.

[11] Opt-in Security Features. Facebook. Retrieved from http://www.facebook.com/help/?page=132501803490562
Facebook Help Center.2011.

[12] Google +1 Button Privacy Policy. Retrieved from http://www.google.com/intl/enUS/+/policy/+1button.html. (June 28, 2011).

[13] Google+ Privacy Policy. Retrieved from http://www.google.com/intl/en-US/+/policy/.November 7, 2011.

[14] Your name and Google+ Profiles. Retrieved from http://www.google.com/support/plus/bin/answer.py?hl=en&answer=1228271. Google (2011).

[15] Advanced sign-in security for your Google account. Retrieved from http://googleblog.blogspot.com/2011/02/advanced-sign-in-security-for-your.html.Google Blog. February 10,2011.

[16] Harpner.C,Major Google+ Security Flaw! Retrieved from http://blog.csharpner.com/2011/08/major-google-security-flaw.html.August 03,2011.

[17] Kirpininyeri. (Google Plus security – Scene 1. Retrieved from http://www.kirpininyeri.com/2011/07/google-plus-security-scene-1/. July 15,2011.

[18] Mandloi.A. ( November 1, 2011). Prevent Google Plus Profile from Appearing in Search Engines. Retrieved from http://www.gtricks.com/google-plus-tricks/prevent-google-plus-profile-name-appearing/.

[19] C. Patsakis,A.Asthenidis. A.Chatzidimitriou.” Social Networks as an Attack Platform:Facebook Case Study”. Networks. ICN '09. Eighth International Conference on: 245-247. March, 2009.
[20] "What are the differences between Facebook's customizable friends lists and Google+ Circles?. Retrieved from http://www.quora.com/Google+-Circles/What-are-the-differences-between Facebookscustomizable-friends-lists-and-Google+-Circles.SQuora. (2011).

[21] Make Requests Through Google Servers Ddos. Retrieved from http://www.ihteam.net/advisory/make-requests-through-google-servers-ddos. (August 29, 2011).

[22] Distributed Denial-of-Service Attack (DDoS). Retrieved from http://searchsecurity.techtarget.com/definition/distributed-denial-of-service-attack. June, 2001.

[23] S.Leitch, M.Warren.”Security Issues Challenging Facebook”.Edith Cowan University, Australian Information Security Management Conference.

[24] T.Sieber. “What Is HTTPS & How To Enable Secure Connections Per Default. Make UseOf”. Retrieved from http://www.makeuseof.com/tag/https-enable-secure-connections-default/.August 25, 2011.

[25] P.Singh. “Ignore And Block People On Google Plus.” Google Plus Blog. Retrieved from http://www.googleplusblog.info/2011/08/igrone-and-block-peolpe-on-google-plus.html. August 31, 2011.

[26] Facebook: The Privacy Challenge”. Retrieved from http://www.sophos.com/en-us/securitynews-trends/security-trends/facebook.aspx. Sophos.2011.

[27] ”Facebook users at risk of "rubber duck" identity attack. Retrieved from http://www.sophos.com/en-us/press-office/press-releases/2009/12/facebook.aspx. December 7, 2009.

[28] Squidoo. “Facebook Warning: Activities That Could Get You Banned”. Retrieved from http://www.squidoo.com/facebook-bans.September, 2011.

[29] Swati. “Facebook adds some major Privacy Control Features: Is Google Plus in danger now?”. Retrieved from http://www.buzzom.com/2011/08/facebook-adds-some-major-privacy-controlfeatures-is-google-plus-in-danger-now/.August 24, 2011.

[30] Swati. “How To: Protect your Privacy on Google+”. Retrieved from http://www.buzzom.com/2011/07/how-to-protect-your-privacy-on-google/.July 26, 2011.

[31] H.Tsukayama. “Google Plus relaxing real name policy”. Washington Post. Retrieved from http://www.washingtonpost.com/business/technology/google-plus-relaxing-real-namepolicy/.html. October 20,2011.

[32] Veracode. “Google vs. Facebook on Privacy and Security”. Now Sourcing. Retrieved from http://www.veracode.com/resources/google-vs.-facebook-on-privacy-and-security.html. October, 2011.

[33] Wasil.G. How To Hide Your Facebook Profile From Search Engines. Vast 9. Retrieved from http://www.vast9.com/tech-tips/hide-facebook-profile-search-engines/.April 29, 2011.

[34] “How to Prevent Social Networks from Tracking Your Internet Activities. Retrieved from http://googleplus.wonderhowto.com/blog/prevent-social-networks-from-tracking-your-internetactivities-0130280/. October, 2011.

[35] Word Stream.”Facebook Wall Of Shame (Infographic). Now Sourcing”. Retrieved from http://nowsourcing.com/2011/10/19/facebook-fails-infographic/. October 19, 2011.

[36] “Guide to Taming Privacy Concerns Around Google+”. Retrieved from http://blog.zonealarm.com/2011/07/privacy-concerns-around-google-plus.html. July 21,2011.