Ciberseguridad y redes sociales
DOI:
https://doi.org/10.25062/0120-0631.417Biografía del autor/a
Lucas Giraldo Ríos, Escuela Superior de Guerra
Grupo de investigación Masa Crítica - Escuela Superior de Guerra. Grupo de investigación Griego - Universidad Nacional de Colombia. Administrador de Empresas. Especialista en Gestión Financiera Empresarial y Magister en Innovación y Magister en Administración (MBA), actualmente candidato a doctor en Ingeniería, Industria y Organizaciones (Universidad Nacional de Colombia). Gerente de Consultoría en la firma RSM con más de 18 años de experiencia en el sector empresarial de alimentos, tecnología, servicios, gremiales y educativos en el ámbito nacional e internacional; adicionalmente, docente en temas de Estrategia, Innovación, Prospectiva, Sistemas de Información Gerencial, Gobierno de TI, Transformación Digital y Digitalización (Universidad Nacional de Colombia, Escuela Superior de Guerra, Universidad de Asturias, Instituto Europeo de Posgrados, Universidad Espíritu Santo-Ecuador, entre otras instituciones de Educación Superior).
Referencias bibliográficas
Alghamdi B., Waston, J. Xu, Y. (2010). "Toward detecting malicius links in online social networks through user behavior". In Proceedings of the IEEE/WIC/ACM Internacional Conference on Web Intelligence Workshops, Omaha, NE, USA, 13-16 pp. 5-8
Ali, S., Rauf, A., Islam, N., Farman, H. & Khan, S. (2017). User Profiling: "A Privacy Issue in Online Public Network.", Sindh Univ. Res. J. (Sci. Seri.) 49, 125-128.
Amir, W. (2017). Gun retailer Airsoft GI's Forum hacked; 65,000 user accounts leaked https://www.hackread.com/gun-retailer-airsoft-gi-forums-hacked/
Anstee, D., Escobar, J., Chui, C.F. & Sockrider, G. (2015), Jan 27. 10th Annual Worldwide Infrastructure Security Report. Arbor Networks Inc.
Arora, K., Kumar, K., & Sachdeva, M. (2011). Impact analysis of recent DDoS attacks. International Journal on Computer Science and Engineering, 3(2), 877-883.
BBC Mundo. Disponible en https://www. bbc.com/mundo/noticias-43472797
BCC Risk Advisory Ltd. (2016). Vulnerability Statistics© 2015-19, IJARCS All Rights Reserved 8 Report Edgescan, 2016. http://www.edgescan.com.
Baltazar, J., Costoya, J. & Flores, R. (2009). "The Real Face of Koobface": The Largest Web 2.0 Botnet Explained. Trend Micro Threat Research
Baykara, M. & Ziya, Z.G. (2018). "Detection of phishing attacks", IEEE, 978-1- 5386-3449-3/18.
Bolton, R.J. and Hand, D.J. (2002). Statistical Fraud Detection: A Review. Statistical Science. 17, 3, 235-249. https://doi.org/10.1214/ss/1042727940
Brown, I. (2015). "Social Media Surveillance". The International Encyclopedia of Digital Communication and Society, First Edition". John Wiley & Sons, Inc. Published by John Wiley & Sons, Inc., DOI: 10.1002/9781118290743.wbiedcs122.
Davison, H.K., Maraist, C.C., Hamilton, R. & Bing, M.N. (2012). ¿To Screen or Not to Screen? Using the Internet for Selection Decisions. Empl. Responsib. Rights J., 24, 1-21. https://doi.org/10.1007/s10672-011-9178-y
Ding, X., Zhang, L., Wan, Z. & Gu, M. (2010). "A brief survey on de-anonymization attacks in online social networks". In Proceedings of the IEEE International Conference on Computational Aspects of Social Networks (CASoN 2010), Taiyuan, China, 26-28; pp. 611- 615. https://doi.org/10.1109/CASoN.2010.139
Experience Group. https://www.experience-group.com/wp-content/uploads/2018/10/Cybersecurity-Presentation-October-2018.pdf.
Faghani, M.R. & Nguyen, U.T. (2013). "A study of XSS worm propagation and detection mechanisms in online social networks". IEEE Trans. Inf. Forensics Secur. 8, 1815-1826. https://doi.org/10.1109/TIFS.2013.2280884
Gong, N.Z. & Liu, B. (2018). "Attribute Inference Attacks in Online Social Networks", ACM Transactions on Privacy and Security, Vol. 21, No. 1, Article 3. Publication date: January https://doi.org/10.1145/3154793
Gulyás, G.G., Simon, B., Imre, S. (2016). An Efficient and Robust Social Network De-anonymization Attack. In Proceedings of the Workshop on Privacy in the Electronic Society, Vienna, Austria, 24 October; pp. 1-11. https://doi.org/10.1145/2994620.2994632
Hak J. Kim. "Online Social Media Networking and Assessing Its Security Risks: International Journal of Security and Its Applications, Vol. 6, No. 3, July, 2012. https://www.statista.com/statistics/278414/number-of-worldwide-social-network-users/
Hathi, S. (2009). "Cómo aumentan las Redes Sociales. Colaboración en IBM", Gestión de la comunicación estratégica, vol. 14, no. 1, pp. 32-35.
Heatherly, R., Kantarcioglu, M., Thuraisingham, B. (2013). "Preventing private information inference attacks on social networks." IEEE Trans. Knowl. Data Eng. 25,1849-1862. https://doi.org/10.1109/TKDE.2012.120
Humphreys, L, Gill, P. & B. Krishnamurthy. (2010). "How much is too much? Privacy issues on Twitters". In Conference of International Communication, Pages 1-29. ACM Press
Hunt, E. (2012). "US Government Computer Penetration Programs and the Implications for Cyberwar" IEEE Annals of the History of Computing 34(3):4-21. https://doi.org/10.1109/MAHC.2011.82
IT Trends. (2019). "Crecen Los Ataques Cibernéticos Especialmente Los Destinados A- Ot." IT Trends. Retrieved (https://www.ittrends.es/seguridad/2019/03/crecen-los-ataques-ciberneticos-especialmente-los-destinados-a-iot).
Lundeen, R., Ou, J., Rhodes, T. (2011). "New Ways Im Going to Hack Your Web APP". Black Hat Abu Dhabi. Available Online: https://www.blackhat.com/html/bh-ad11/bh-ad-ll-archives.html#Lundeen.
Mao, H. X., Shuai, Kapadia, A. (2011). "Loose Tweets: An Analysis of Privacy Leaks on Twitter", In proceeding of the 10th annual ACM workshop on privacy in the electronic scoiety, pages 1-12. ACM. https://doi.org/10.1145/2046556.2046558
Murphy, K. (2010). "Web Photos That Reveal Secrets, Like Where You Live", The New York Times, https://www.nytimes.com/2010/08/12/technology/personaltech/12basics.html.
NIST - National Institute of Standards and Technology. (2013). "Security and Privacy Controls for Federal Information Systems and Organizations." NIST Special Publication 800:53.
Nowson, S., Oberlander, J. (2006). "The identity of bloggers: Openness and gender in personal weblogs In Proc. of AAAI Spring Symposium: Computational Approaches to Analyzing Weblogs", pages 163-167.
Polvereda, J. (2017). "Sistema De Monitorización Del Ids Snort" Protalinski, E. Chinese Spies Used Fake Facebook Profile to Friend Nato Officials. Available online: https://www.zdnet.com/article/chinesespies-used-fake-facebook-profile-to-friend-nato-officials.
Raman, P. (2008). "aSPIn: JavaScript based anomaly detection of cross-sitescripting attacks", Ph.D. thesis, Carleton University, Ottawa.
Rua Mohamed Thiyah, lyab Musab A. M. Ali, Farooq Basil Abdulqader. (2019). "The impact of SQL injection attacks on the security of databases", Proceedings of the 6th International Conference on Computing and Informatics, ICOCI 2017 25-27 April, Kuala Lumpur. Universiti Utara Malaysia
S. T., Joshi, J., Tipper, D. & Zargar. (2013). "A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks". IEEE communications surveys & tutorials.
Scism, L., Maremont, M. (2010). Insurers Test Data Profiles to Identify Risky Clients. The Wall Street Journal, 19 November
Sloane Burke Winkelman, Jody Oomen Early, Ashley D. Walker, Lawrence Chu, Alice Yick-Flanagan". (2015). Exploring Cyber Harrassment among Women Who Use Social Media", Universal Journal of Public Health 3(5): 194-201, https://doi.org/10.13189/ujph.2015.030504
Social Networks. (2014). "In Proceedings of the USENIX Security Symposium", San Diego, CA, USA, 20-22 August; pp. 223-238.
Splashdata. Disponible en https://www.teamsid.com/splashdatas-top-100-worst-passwords-of-2020/.
Statista. Disponible en https://www.statista.com/statistics/272014/global-social-networks-ranked-by-number-of-users/
_____ https://www.statista.com/statistics/500946/worldwide-leading-it-security-threats/
Torabi, S., Beznosov, K. (2013). Privacy Aspects of Health Related Information Sharing in Online Social Networks. In Proceedings of the 2013 USENIX Conference on Safety, Security, Privacy and Interoperability of Health Information Technologies, Washington, DC, USA, 12 August 2013; p. 3.
Vatu, G., (2017). Critical SQL Injection Vulnerability Found in NextGEN Gallery WorldPress Plugin http://news.softpedia.com/news/critical-sql-injection-vulnerability-found-in-nextgengallery-wordpress-plugin-513375.shtml
Viswanath, B., Bashir, M.A., Crovella, M., Guha, S., Gummadi, K.P., Krishnamurthy, B. & Mislove, A., "Towards Detecting Anomalous User Behavior in Online
Vishwanath, A. (2017). "Getting phished on social media". "Decisios Support Systems", ELSEVIER., Vol. 103, November, pp. 70-81. https://doi.org/10.1016/j.dss.2017.09.004
Wei-Han Lee, Changchang Liu, Shouling Ji (2017). "Blind De- anonymization Attacks using Social Networks", Proceedings of the 2017 on Workshop on privacy in the Electronic Society. Dallas, Texas, USA, October.
Zainab S. Alwan, Manal F. Younis. (2017). "Detection and Prevention of SQL Injection Attack: A Survey", International Journal of Computer Science and Mobile Computing, Vol.6 lssue.8, August, pp. 5-17.
https://securelist.com, «''Instant" threats», Denis Maslennikov, Boris Yampolskiy, 27.05.2008.
Cómo citar
Descargas
Descargas
Publicado
Número
Sección
Licencia
Derechos de autor 2022 Fuerzas Armadas
Esta obra está bajo una licencia internacional Creative Commons Atribución-NoComercial-SinDerivadas 4.0.
Estadísticas de artículo | |
---|---|
Vistas de resúmenes | |
Vistas de PDF | |
Descargas de PDF | |
Vistas de HTML | |
Otras vistas |