Page 262 - Trust in ICT 2017
P. 262

5                                                    Trust in ICT



                    1)  Self-promoting attacks: a malicious user can intentionally promote its importance (by providing
                        good recommendations for itself) in order to be selected as the service provider, but then it
                        provides malfunctioned service.
                    2)  Whitewashing attacks: a malicious entity can disappear and re-join the application to wash
                        away its bad reputation.
                    3)  Discriminatory attacks: a malicious entity can discriminatively attack non-friends or entities
                        without  strong  social  ties  (without  many  common  friends)  because  of  human  nature  or
                        propensity towards friends in social networks.
                    4)  Bad-mouthing  attacks:  a  malicious  entity  can  ruin  the  reputation  of  another  well-behaved
                        entity by providing bad recommendations so as to decrease the chance of this good entity being
                        selected as a service provider. This is a form of collusion attacks, i.e., it can collaborate with
                        other bad entities to ruin the reputation of the good entity.

                    5)  Ballot-stuffing attacks: a malicious entity can boost the reputation of another bad entity by
                        providing good recommendations for it so as to increase the chance of this bad entity being
                        selected as a service provider. This is also a form of collusion attacks, i.e., it can collaborate with
                        other bad entities to boost the reputation of each other.

            c)      Threats in social networks
            Social networking tools have changed the way people interact in their personal life and business. Increasingly,
            these  tools  play  a  significant  role  in  how  business  gets  done;  however,  they  also  have  risks  as  follows
            [b-PANet].

                    1)  Phishing bait: Many users of the social networking services had their accounts compromised.
                        Although this was only a tiny fraction of a percent, it is still a significant number considering
                        that famous social networking services have over several million users. To their credit, the social
                        networking services acted quickly, working to blacklist that domain, but many copycat efforts
                        ensued.

                    2)  Data leaks: Social networks are all about sharing. Unfortunately, many users may share too
                        much  sensitive  information  about  their  organizations  such  as  projects,  products,  financial,
                        organizational changes, and/or scandals, etc.
                    3)  Botnets: Recently, the accounts of a social networking service are used as the command and
                        control channel for a few botnets. It is shutting these accounts down given the ease of access
                        of infected machines via the social networking service.

                    4)  Advanced persistent threats: One of the key elements of advanced persistent threats is the
                        gathering of intelligences of persons of interest, for which social networks are a data source.
                        Perpetrators use this information to further their threats by placing more intelligence gathering
                        (e.g., malware, Trojans), and then gaining access to sensitive systems.
                    5)  Cross-site request forgery: This attacks exploit the trust that a social networking application
                        has in a logged-in user's browser. Consequently, as long as the social network application is not
                        checking the referrer header, it is easy for an attack to share an image in a user's event stream
                        that other users might click on to catch and spread the attacks.
                    6)  Impersonation: The social network accounts of several prominent individuals with thousands
                        of followers have been hacked. Furthermore, several impersonators have gathered hundreds
                        and thousands of followers.


            I.4     Risks from the integration of the physical, cyber, and social worlds
            a)      A numerous number of ICT resources
            Risks threaten ICT infrastructures and services to cope with complexity of interactions and mechanisms of
            the  entities.  The  access  of  a  large  number  of  ICT  resources  causes  irreparable  damages  and  creates
            unpredictable dangers. It is essential to make ICT resources accessible to all the people with promises but
            with unknown dangers.



            254
   257   258   259   260   261   262   263   264   265   266   267