REPORT ON ATTACKS ON SOCIAL NETWORKING SITES INSTITUTION NAME Abstract Purpose of the study The purpose of this paper is to identify strategies that are effective in preventing attacks on social networking sites. The report also focuses on illustrating the consequences of such attacks. Moreover the paper compares these attacks concerning social sites. Context of the study Social media is now a hotbed for cybercriminal activity. Internet-based attackers are attracted to social networking sites because they make it is easy to find and engage targets. Moreover they are convenient and cost-effective channels of attack. Also it is easy to create fake accounts that will facilitate the quick spread of malicious software with significant efficiency. Problem statement Main problem: Cybercriminals are increasingly targeting social networking sites to access personal corporate and banking information. Social media has recently been provided a convenient passage for attackers into platforms through which they can the problem to be adequately responded to. References Krueger R. A. & Casey M. A. (2014). Focus groups: A practical guide for applied research. Sage publications. Marshall M. N. (1996). Sampling for qualitative research. Family practice 13(6) 522-526. Maxwell J. A. (2012). Qualitative research design: An interactive approach (Vol. 41). Sage publications. Neeraja B. Arundathi J. V. S. & Rao I. N. Dataset and its classification of data towards Preventing Private Information Inference Attacks on Social Networks. Nayak N. D. & Narendhar M. AVOIDING OF CONFIDENTIAL INFORMATION LEAKAGE IN SOCIAL NETWORKS. Priya V. K. & Ahamed S. F. Securing Private Information on Social Networks with Support Vector Machines. Raja P. V. K. PREVENTION MECHANISM TECHNIQUES TO PRIVATE INFORMATION INFERENCE ATTACKS. Rose C. (2011). The security implications of ubiquitous social media. International Journal of Management and Information Systems 15(1) 35.Sofaer S. (2002). Qualitative research methods. International Journal for Quality in Health Care 14(4) 329-336. [...]
1st : it should be comparision study 2nd : must contain, abstract,introduction, letriture review, methodology(body) and conclusion. 3rd : the paper should be in IEEE format 4th : reference should include as well. 5th : the topic should explain how to prevent against attacks in social networking sites and how risky these attacks is to the users. and should compare these attacks regarding to social sites.