.

Thursday, February 28, 2013

Malicious Face Book Applications

research Proposal
Protect Users from Malwargon Applications
Aditya Neelkant

19 February 2012

Submitted in particular fulfilment of the
requirements for EBM 502
Research Methods

Table Of contents:
1. Executive summary.
2. Introduction.
3. Literature Survey.
4. Research Objectives.
5. Method.
6. References.

Executive Summary
This project discusses about how to protect users from malicious Facebook applications. As we know that social networks such as Facebook, MySpace, and Orkut store overlarge amount of user selective information. User assumes that a social network provider adheres to strict privateness standards but it is unwise to practice third-party applications on these platforms in the same way. The private data stored in user pens on these networks makes attractive target for marketing companies, spammers, and identicalness thieves. These social networking sites are very well aware of the privacy implications of such a collection of personal data. They provide a multitude of settings that allow users to check off what parties have annoy to their profile data and the content they create on social network. So we have to stop third party applications in baseball club to protect users from unwanted applications.

Ordercustompaper.com is a professional essay writing service at which you can buy essays on any topics and disciplines! All custom essays are written by professional writers!


Although the social network provider would be in the best position to implement fine-grained access control for third party applications directly into the platform, existing mechanisms are not convincing. Therefore, we introduce PoX, an extension for Facebook that makes all requests for private data explicit to the user and allows her to exert fine-grained access control over what profile data washbowl be accessed by individual applications. By leveraging a client-side proxy that executes in the users web browser, data requests can be relayed to Facebook without forcing the user to go for additional third parties. .
By installing the PoX plug-in in their browser, users can protect their profile data from malicious applications, and can take honorable advantage...If you want to get a full essay, order it on our website: Ordercustompaper.com



If you want to get a full essay, wisit our page: write my paper

No comments:

Post a Comment