Skip to main content

2023 | OriginalPaper | Buchkapitel

10. Overlay Security: Email and Social Media

verfasst von : Seth James Nielson

Erschienen in: Discovering Cybersecurity

Verlag: Apress

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The rich infrastructure of the Internet and the World Wide Web allows us to build semantic communications networks that operate at a more abstract level. In this chapter, we’ll discuss email and social media, two kinds of overlay networks that allow communications between individuals and organizations. Similar security principles apply here, but because these networks also present unique security challenges.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
Email addresses can be associated with computers for certain automated tasks, but this is an unusual adaptation of a network that is primarily human.
 
2
Technically, the MUA may transmit to a Mail Submission Agent (MSA) first, and the MSA gives the message to the MTA. However, these are often on the same machine and work as a single agent. For simplicity, I have removed the MSA from the explanation.
 
3
This is not a real address; please do not send email to this address.
 
4
In the movie Inception, the protagonists enter the dreams of a target and plant a thought into his mind. They need the thought to seem self-generated, so they place some ideas into his subconscious that later are repeated back to him from himself.
 
5
It is possible, of course, for people to legitimately sell their behaviors and voice to another. This could be a kind of spokesman or promoter engagement. However, it is usually desirable that this purchase be disclosed so that observers can factor that information into their opinions.
 
6
This functionality is not available in the default Office 365 license, either for personal or business. As of the time of this writing, it requires Microsoft Business Premium.
 
Literatur
7.
Zurück zum Zitat Security summit alert: Renewed alert about phishing e-mail scam targeting payroll or human resource departments. Security summit alert: Renewed alert about phishing e-mail scam targeting payroll or human resource departments.
16.
Zurück zum Zitat Istr: Internet security threat report, vol. 24, Feb 2019. Istr: Internet security threat report, vol. 24, Feb 2019.
18.
Zurück zum Zitat Ransomware guide. Technical report, 09 2020. Ransomware guide. Technical report, 09 2020.
22.
Zurück zum Zitat 2022 annual state of phishing report. Technical report, Cofense, 2022. 2022 annual state of phishing report. Technical report, Cofense, 2022.
26.
Zurück zum Zitat The state of ransomware 2022. Technical report, Sophos, 04 2022. The state of ransomware 2022. Technical report, Sophos, 04 2022.
40.
Zurück zum Zitat Anderson, R.J. 2020. Security Engineering: A Guide to Building Dependable Distributed Systems, 3 ed. Wiley Publishing.CrossRef Anderson, R.J. 2020. Security Engineering: A Guide to Building Dependable Distributed Systems, 3 ed. Wiley Publishing.CrossRef
61.
Zurück zum Zitat Boshmaf, Y., I. Muslukhov, K. Beznosov, and M. Ripeanu. 2013. Design and analysis of a social botnet. Computer Networks 57(2): 556–578.CrossRef Boshmaf, Y., I. Muslukhov, K. Beznosov, and M. Ripeanu. 2013. Design and analysis of a social botnet. Computer Networks 57(2): 556–578.CrossRef
63.
Zurück zum Zitat Boyd, D.M., and N.B. Ellison. 2007. Social network sites: Definition, history, and scholarship. Journal of Computer-Mediated Communication 13(1): 210–230.CrossRef Boyd, D.M., and N.B. Ellison. 2007. Social network sites: Definition, history, and scholarship. Journal of Computer-Mediated Communication 13(1): 210–230.CrossRef
68.
Zurück zum Zitat Cartwright, A., E. Cartwright, J. MacColl, G. Mott, S. Turner, J. Sullivan, and J.R. Nurse. 2023. How cyber insurance influences the ransomware payment decision: theory and evidence. The Geneva Papers on Risk and Insurance-Issues and Practice, 1–32 (48). Cartwright, A., E. Cartwright, J. MacColl, G. Mott, S. Turner, J. Sullivan, and J.R. Nurse. 2023. How cyber insurance influences the ransomware payment decision: theory and evidence. The Geneva Papers on Risk and Insurance-Issues and Practice, 1–32 (48).
81.
Zurück zum Zitat Cook, D.M., B. Waugh, M. Abdipanah, O. Hashemi, and S.A. Rahman. 2014. Twitter deception and influence: Issues of identity, slacktivism, and puppetry. Journal of Information Warfare 13(1): 58–71. Cook, D.M., B. Waugh, M. Abdipanah, O. Hashemi, and S.A. Rahman. 2014. Twitter deception and influence: Issues of identity, slacktivism, and puppetry. Journal of Information Warfare 13(1): 58–71.
93.
Zurück zum Zitat Dhaka, D., and M. Mehrotra. 2019. Cross-domain spam detection in social media: A survey. In Emerging Technologies in Computer Engineering: Microservices in Big Data Analytics: Second International Conference, ICETCE 2019, Jaipur, 98–112. Springer. Dhaka, D., and M. Mehrotra. 2019. Cross-domain spam detection in social media: A survey. In Emerging Technologies in Computer Engineering: Microservices in Big Data Analytics: Second International Conference, ICETCE 2019, Jaipur, 98–112. Springer.
94.
Zurück zum Zitat DiMaggio, J. 2022. The Art of Cyberwarfare: An Investigator’s Guide to Espionage, Ransomware, and Organized Cybercrime. No Starch Press. DiMaggio, J. 2022. The Art of Cyberwarfare: An Investigator’s Guide to Espionage, Ransomware, and Organized Cybercrime. No Starch Press.
96.
Zurück zum Zitat Douceur, J.R. 2002. The sybil attack. In Peer-to-Peer Systems: First International Workshop (IPTPS 2002), Cambridge, MA, 251–260. Springer. Douceur, J.R. 2002. The sybil attack. In Peer-to-Peer Systems: First International Workshop (IPTPS 2002), Cambridge, MA, 251–260. Springer.
106.
Zurück zum Zitat Ferrara, E. 2019. The history of digital spam. Communications of the ACM 62(8): 82–91.CrossRef Ferrara, E. 2019. The history of digital spam. Communications of the ACM 62(8): 82–91.CrossRef
113.
Zurück zum Zitat Geerthik, S. 2013. Survey on internet spam: Classification and analysis. International Journal of Computer Technology and Applications 4(3): 384. Geerthik, S. 2013. Survey on internet spam: Classification and analysis. International Journal of Computer Technology and Applications 4(3): 384.
125.
Zurück zum Zitat Hadnagy, C. 2018. Social Engineering: The Science of Human Hacking, 2nd ed. Wiley.CrossRef Hadnagy, C. 2018. Social Engineering: The Science of Human Hacking, 2nd ed. Wiley.CrossRef
140.
Zurück zum Zitat Hunt, M.G., R. Marx, C. Lipson, and J. Young. 2018. No more FOMO: Limiting social media decreases loneliness and depression. Journal of Social and Clinical Psychology 37(10): 751–768.CrossRef Hunt, M.G., R. Marx, C. Lipson, and J. Young. 2018. No more FOMO: Limiting social media decreases loneliness and depression. Journal of Social and Clinical Psychology 37(10): 751–768.CrossRef
144.
Zurück zum Zitat Judge, P., D. Alperovitch, and W. Yang. 2005. Understanding and reversing the profit model of spam (position paper). In Proceedings of the 4th Workshop on the Economics of Information Security. Judge, P., D. Alperovitch, and W. Yang. 2005. Understanding and reversing the profit model of spam (position paper). In Proceedings of the 4th Workshop on the Economics of Information Security.
146.
Zurück zum Zitat Kabakus, A.T., and R. Kara. 2017. A survey of spam detection methods on Twitter. International Journal of Advanced Computer Science and Applications 8(3): 29–38. Kabakus, A.T., and R. Kara. 2017. A survey of spam detection methods on Twitter. International Journal of Advanced Computer Science and Applications 8(3): 29–38.
158.
Zurück zum Zitat Lampson, B. 1993. Principles for Computer System Design. New York: Association for Computing Machinery.MATH Lampson, B. 1993. Principles for Computer System Design. New York: Association for Computing Machinery.MATH
196.
Zurück zum Zitat O’Kane, P., S. Sezer, and D. Carlin. 2018a. Evolution of ransomware. IET Networks 7(5): 321–327.CrossRef O’Kane, P., S. Sezer, and D. Carlin. 2018a. Evolution of ransomware. IET Networks 7(5): 321–327.CrossRef
200.
Zurück zum Zitat Oz, H., A. Aris, A. Levi, and A.S. Uluagac. 2022. A survey on ransomware: Evolution, taxonomy, and defense solutions. ACM Computing Surveys 54(11s): 1–37.CrossRef Oz, H., A. Aris, A. Levi, and A.S. Uluagac. 2022. A survey on ransomware: Evolution, taxonomy, and defense solutions. ACM Computing Surveys 54(11s): 1–37.CrossRef
205.
Zurück zum Zitat Peterson, L.L., and B.S. Davie. 2021. Computer Networks, 6th ed. Morgan Kaufmann.MATH Peterson, L.L., and B.S. Davie. 2021. Computer Networks, 6th ed. Morgan Kaufmann.MATH
214.
Zurück zum Zitat Rao, J.M., and D.H. Reiley. 2012. The economics of spam. Journal of Economic Perspectives 26(3): 87–110.CrossRef Rao, J.M., and D.H. Reiley. 2012. The economics of spam. Journal of Economic Perspectives 26(3): 87–110.CrossRef
225.
Zurück zum Zitat Rowe, N.C., and J. Rrushi. 2016. Introduction to Cyberdeception, 1 ed. Springer International Publishing Switzerland.CrossRef Rowe, N.C., and J. Rrushi. 2016. Introduction to Cyberdeception, 1 ed. Springer International Publishing Switzerland.CrossRef
231.
Zurück zum Zitat Sanz, E.P., J.M. Gómez Hidalgo, and J.C. Cortizo Pérez. 2008. Email spam filtering. In Software Development, Advances in Computers, vol. 74, 45–114. Elsevier. Sanz, E.P., J.M. Gómez Hidalgo, and J.C. Cortizo Pérez. 2008. Email spam filtering. In Software Development, Advances in Computers, vol. 74, 45–114. Elsevier.
236.
Zurück zum Zitat Securities and Exchange Commission, U. 2023. Administrative proceeding file no. 3-21306. Securities and Exchange Commission, U. 2023. Administrative proceeding file no. 3-21306.
250.
Zurück zum Zitat Stallings, W. 2013. Cryptography and Network Security: Principles and Practice, 6th ed. Prentice Hall Press. Stallings, W. 2013. Cryptography and Network Security: Principles and Practice, 6th ed. Prentice Hall Press.
262.
Zurück zum Zitat Thorkildssen, H.W. 2004. Spam-different approaches to fighting unsolicited commercial email a survey of spam and spam countermeasures. Network and System Administration Research Surveys 1: 45–55. Thorkildssen, H.W. 2004. Spam-different approaches to fighting unsolicited commercial email a survey of spam and spam countermeasures. Network and System Administration Research Surveys 1: 45–55.
285.
Zurück zum Zitat Woods, D.W. 2023. A turning point for cyber insurance. Communications of the ACM 66(3): 41–44.CrossRef Woods, D.W. 2023. A turning point for cyber insurance. Communications of the ACM 66(3): 41–44.CrossRef
289.
Zurück zum Zitat Yurtseven, İ, S. Bagriyanik, and S. Ayvaz. 2021. A review of spam detection in social media. In 2021 6th International Conference on Computer Science and Engineering (UBMK), 383–388. IEEE. Yurtseven, İ, S. Bagriyanik, and S. Ayvaz. 2021. A review of spam detection in social media. In 2021 6th International Conference on Computer Science and Engineering (UBMK), 383–388. IEEE.
290.
Zurück zum Zitat Yuryna Connolly, L., D.S. Wall, M. Lang, and B. Oddson. 2020. An empirical study of ransomware attacks on organizations: An assessment of severity and salient factors affecting vulnerability. Journal of Cybersecurity 6(1): tyaa023. Yuryna Connolly, L., D.S. Wall, M. Lang, and B. Oddson. 2020. An empirical study of ransomware attacks on organizations: An assessment of severity and salient factors affecting vulnerability. Journal of Cybersecurity 6(1): tyaa023.
Metadaten
Titel
Overlay Security: Email and Social Media
verfasst von
Seth James Nielson
Copyright-Jahr
2023
Verlag
Apress
DOI
https://doi.org/10.1007/978-1-4842-9560-1_10

Premium Partner