Page 148 - Trust in ICT 2017
P. 148
2 Trust in ICT
6 Botnets: Recently, the accounts of a social networking service are used as the command and control
channel for a few botnets. It is shutting these accounts down given the ease of access of infected
machines via the social networking service.
7 Advanced persistent threats: One of the key elements of advanced persistent threats (APT) is the
gathering of intelligences of persons of interest, for which social networks are a data source.
Perpetrators of APTs use this information to further their threats by placing more intelligence
gathering (e.g. malware, Trojans), and then gaining access to sensitive systems.
8 Cross-site request forgery (CSRF): CSRF attacks exploit the trust that a social networking application
has in a logged-in user's browser. Consequently, as long as the social network application is not
checking the referrer header, it is easy for an attack to "share" an image in a user's event stream
that other users might click on to catch and spread the attacks.
9 Impersonation: The social network accounts of several prominent individuals with thousands of
followers have been hacked. Furthermore, several impersonators have gathered hundreds and
thousands of followers.
10 Trust: The common thread across almost all of the threats is the tremendous amount of trust that
users have in social applications. Like e-mail or instant messaging, people trust links, pictures, videos
and executables when they come from "friends".
Political dangers and personal safety of blogs
Blogging can sometimes have unforeseen consequences in politically sensitive areas. Blogs are much harder
to control than broadcast or even print media. As a result, some authorities and communities often seek to
suppress blogs and/or to punish those who maintain them. For example, a blogger was found guilty and
sentenced for a three-year prison term for insulting Islam and inciting sedition.
One consequence of blogging is the possibility of attacks or threats against the blogger, sometimes without
apparent reason. While a blogger's anonymity is often tenuous, Internet trolls who would attack a blogger
with threats or insults can be emboldened by anonymity. Therefore, the Blogger's Code of Conduct which is
proposed by Tim O'Reilly for bloggers enforces civility on their blogs by being civil themselves and moderating
comments on their blog. A proposed list for blogging behaviours is as follows [30]:
1 Take responsibility not just for your own words, but for the comments you allow on your blog;
2 Label your tolerance level for abusive comments;
3 Consider eliminating anonymous comments;
4 Ignore the trolls;
5 Take the conversation offline, and talk directly, or find an intermediary of who can do so;
6 If you know someone who is behaving badly, tell them so;
7 Do not say anything online that you would not say in person.
Human right in knowledge society
Human right and inclusive participation are characteristics of knowledge society. Freedom of expression
implies freedom of opinion, freedom of speech and of the written word, freedom of the press, free access to
information, and the free flow of data and information. Human right is summarized as [38]:
– Freedom of opinion and expression as well as freedom of information, media pluralism and
academic freedom.
– Freedom of expression is a fundamental human right. Everyone has the right to freedom of opinion
and expression.
– Closely linked with the essential freedom of scientific research and artistic creation.
– The right to education towards free access to other levels of education.
– The right to "freely to participate in the cultural life of the community, to enjoy and share in scientific
advancement and its benefits."
140