Ciberseguridad y redes sociales

Autores/as

  • Lucas Giraldo Ríos Escuela Superior de Guerra

DOI:

https://doi.org/10.25062/0120-0631.417

Biografía del autor/a

Lucas Giraldo Ríos, Escuela Superior de Guerra

Grupo de investigación Masa Crítica - Escuela Superior de Guerra. Grupo de investigación Griego - Universidad Nacional de Colombia. Administrador de Empresas. Especialista en Gestión Financiera Empresarial y Magister en Innovación y Magister en Administración (MBA), actualmente candidato a doctor en Ingeniería, Industria y Organizaciones (Universidad Nacional de Colombia). Gerente de Consultoría en la firma RSM con más de 18 años de experiencia en el sector empresarial de alimentos, tecnología, servicios, gremiales y educativos en el ámbito nacional e internacional; adicionalmente, docente en temas de Estrategia, Innovación, Prospectiva, Sistemas de Información Gerencial, Gobierno de TI, Transformación Digital y Digitalización (Universidad Nacional de Colombia, Escuela Superior de Guerra, Universidad de Asturias, Instituto Europeo de Posgrados, Universidad Espíritu Santo-Ecuador, entre otras instituciones de Educación Superior).

Referencias bibliográficas

Alghamdi B., Waston, J. Xu, Y. (2010). "Toward detecting malicius links in online social networks through user behavior". In Proceedings of the IEEE/WIC/ACM Internacional Conference on Web Intelligence Workshops, Omaha, NE, USA, 13-16 pp. 5-8

Ali, S., Rauf, A., Islam, N., Farman, H. & Khan, S. (2017). User Profiling: "A Privacy Issue in Online Public Network.", Sindh Univ. Res. J. (Sci. Seri.) 49, 125-128.

Amir, W. (2017). Gun retailer Airsoft GI's Forum hacked; 65,000 user accounts leaked https://www.hackread.com/gun-retailer-airsoft-gi-forums-hacked/

Anstee, D., Escobar, J., Chui, C.F. & Sockrider, G. (2015), Jan 27. 10th Annual Worldwide Infrastructure Security Report. Arbor Networks Inc.

Arora, K., Kumar, K., & Sachdeva, M. (2011). Impact analysis of recent DDoS attacks. International Journal on Computer Science and Engineering, 3(2), 877-883.

BBC Mundo. Disponible en https://www. bbc.com/mundo/noticias-43472797

BCC Risk Advisory Ltd. (2016). Vulnerability Statistics© 2015-19, IJARCS All Rights Reserved 8 Report Edgescan, 2016. http://www.edgescan.com.

Baltazar, J., Costoya, J. & Flores, R. (2009). "The Real Face of Koobface": The Largest Web 2.0 Botnet Explained. Trend Micro Threat Research

Baykara, M. & Ziya, Z.G. (2018). "Detection of phishing attacks", IEEE, 978-1- 5386-3449-3/18.

Bolton, R.J. and Hand, D.J. (2002). Statistical Fraud Detection: A Review. Statistical Science. 17, 3, 235-249. https://doi.org/10.1214/ss/1042727940

Brown, I. (2015). "Social Media Surveillance". The International Encyclopedia of Digital Communication and Society, First Edition". John Wiley & Sons, Inc. Published by John Wiley & Sons, Inc., DOI: 10.1002/9781118290743.wbiedcs122.

Davison, H.K., Maraist, C.C., Hamilton, R. & Bing, M.N. (2012). ¿To Screen or Not to Screen? Using the Internet for Selection Decisions. Empl. Responsib. Rights J., 24, 1-21. https://doi.org/10.1007/s10672-011-9178-y

Ding, X., Zhang, L., Wan, Z. & Gu, M. (2010). "A brief survey on de-anonymization attacks in online social networks". In Proceedings of the IEEE International Conference on Computational Aspects of Social Networks (CASoN 2010), Taiyuan, China, 26-28; pp. 611- 615. https://doi.org/10.1109/CASoN.2010.139

Experience Group. https://www.experience-group.com/wp-content/uploads/2018/10/Cybersecurity-Presentation-October-2018.pdf.

Faghani, M.R. & Nguyen, U.T. (2013). "A study of XSS worm propagation and detection mechanisms in online social networks". IEEE Trans. Inf. Forensics Secur. 8, 1815-1826. https://doi.org/10.1109/TIFS.2013.2280884

Gong, N.Z. & Liu, B. (2018). "Attribute Inference Attacks in Online Social Networks", ACM Transactions on Privacy and Security, Vol. 21, No. 1, Article 3. Publication date: January https://doi.org/10.1145/3154793

Gulyás, G.G., Simon, B., Imre, S. (2016). An Efficient and Robust Social Network De-anonymization Attack. In Proceedings of the Workshop on Privacy in the Electronic Society, Vienna, Austria, 24 October; pp. 1-11. https://doi.org/10.1145/2994620.2994632

Hak J. Kim. "Online Social Media Networ­king and Assessing Its Security Risks: International Journal of Security and Its Applications, Vol. 6, No. 3, July, 2012. https://www.statista.com/statistics/278414/number-of-worldwide-social-network-users/

Hathi, S. (2009). "Cómo aumentan las Redes Sociales. Colaboración en IBM", Gestión de la comunicación estratégica, vol. 14, no. 1, pp. 32-35.

Heatherly, R., Kantarcioglu, M., Thuraisingham, B. (2013). "Preventing pri­vate information inference attacks on social networks." IEEE Trans. Knowl. Data Eng. 25,1849-1862. https://doi.org/10.1109/TKDE.2012.120

Humphreys, L, Gill, P. & B. Krishnamurthy. (2010). "How much is too much? Privacy issues on Twitters". In Confe­rence of International Communica­tion, Pages 1-29. ACM Press

Hunt, E. (2012). "US Government Compu­ter Penetration Programs and the Implications for Cyberwar" IEEE Annals of the History of Computing 34(3):4-21. https://doi.org/10.1109/MAHC.2011.82

IT Trends. (2019). "Crecen Los Ata­ques Cibernéticos Especialmente Los Destinados A- Ot." IT Trends. Retrieved (https://www.ittrends.es/seguridad/2019/03/crecen-los-ataques-ciberneticos-especialmente-los-destinados-a-iot).

Lundeen, R., Ou, J., Rhodes, T. (2011). "New Ways Im Going to Hack Your Web APP". Black Hat Abu Dhabi. Available Online: https://www.blackhat.com/html/bh-ad11/bh-ad-ll-archives.html#Lundeen.

Mao, H. X., Shuai, Kapadia, A. (2011). "Loose Tweets: An Analysis of Privacy Leaks on Twitter", In proceeding of the 10th annual ACM workshop on privacy in the electronic scoiety, pages 1-12. ACM. https://doi.org/10.1145/2046556.2046558

Murphy, K. (2010). "Web Photos That Reveal Secrets, Like Where You Live", The New York Times, https://www.nytimes.com/2010/08/12/technology/personaltech/12basics.html.

NIST - National Institute of Standards and Technology. (2013). "Security and Privacy Controls for Federal Information Systems and Organizations." NIST Special Publication 800:53.

Nowson, S., Oberlander, J. (2006). "The identity of bloggers: Openness and gender in personal weblogs In Proc. of AAAI Spring Symposium: Com­putational Approaches to Analyzing Weblogs", pages 163-167.

Polvereda, J. (2017). "Sistema De Monitorización Del Ids Snort" Protalinski, E. Chinese Spies Used Fake Facebook Profile to Friend Nato Officials. Available online: https://www.zdnet.com/article/chinesespies-used-fake-facebook-profile-to-friend-nato-officials.

Raman, P. (2008). "aSPIn: JavaScript based anomaly detection of cross-sitescripting attacks", Ph.D. thesis, Carleton University, Ottawa.

Rua Mohamed Thiyah, lyab Musab A. M. Ali, Farooq Basil Abdulqader. (2019). "The impact of SQL injection attacks on the security of databases", Proce­edings of the 6th International Con­ference on Computing and Informa­tics, ICOCI 2017 25-27 April, Kuala Lumpur. Universiti Utara Malaysia

S. T., Joshi, J., Tipper, D. & Zargar. (2013). "A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks". IEEE com­munications surveys & tutorials.

Scism, L., Maremont, M. (2010). Insurers Test Data Profiles to Identify Risky Clients. The Wall Street Journal, 19 November

Sloane Burke Winkelman, Jody Oomen Early, Ashley D. Walker, Lawrence Chu, Alice Yick-Flanagan". (2015). Exploring Cyber Harrassment among Women Who Use Social Media", Universal Journal of Public Health 3(5): 194-201, https://doi.org/10.13189/ujph.2015.030504

Social Networks. (2014). "In Proceedings of the USENIX Security Symposium", San Diego, CA, USA, 20-22 August; pp. 223-238.

Splashdata. Disponible en https://www.teamsid.com/splashdatas-top-100-worst-passwords-of-2020/.

Statista. Disponible en https://www.statista.com/statistics/272014/global-social-networks-ranked-by-number-of-users/

_____ https://www.statista.com/statistics/500946/worldwide-leading-it-security-threats/

Torabi, S., Beznosov, K. (2013). Privacy Aspects of Health Related Infor­mation Sharing in Online Social Networks. In Proceedings of the 2013 USENIX Conference on Safety, Security, Privacy and Interoperability of Health Information Technologies, Washington, DC, USA, 12 August 2013; p. 3.

Vatu, G., (2017). Critical SQL Injection Vulnerability Found in NextGEN Gallery WorldPress Plugin http://news.softpedia.com/news/critical-sql-injection-vulnerability-found-in-nextgengallery-wordpress-plugin-513375.shtml

Viswanath, B., Bashir, M.A., Crovella, M., Guha, S., Gummadi, K.P., Krishnamurthy, B. & Mislove, A., "Towards Detecting Anomalous User Behavior in Online

Vishwanath, A. (2017). "Getting phished on social media". "Decisios Support Systems", ELSEVIER., Vol. 103, Nov­ember, pp. 70-81. https://doi.org/10.1016/j.dss.2017.09.004

Wei-Han Lee, Changchang Liu, Shouling Ji (2017). "Blind De- anonymization Attacks using Social Networks", Pro­ceedings of the 2017 on Workshop on privacy in the Electronic Society. Dallas, Texas, USA, October.

Zainab S. Alwan, Manal F. Younis. (2017). "Detection and Prevention of SQL Injection Attack: A Survey", Interna­tional Journal of Computer Science and Mobile Computing, Vol.6 lssue.8, August, pp. 5-17.

https://securelist.com, «''Instant" threats», Denis Maslennikov, Boris Yampolskiy, 27.05.2008.

Cómo citar

Giraldo Ríos, L. (2021) «Ciberseguridad y redes sociales», Revista de las Fuerzas Armadas, (257), pp. 69–88. doi: 10.25062/0120-0631.417.

Descargas

Los datos de descargas todavía no están disponibles.

Descargas

Publicado

2021-09-30

Métricas

Crossref Cited-by logo
Estadísticas de artículo
Vistas de resúmenes
Vistas de PDF
Descargas de PDF
Vistas de HTML
Otras vistas
QR Code