This topic contains 0 replies, has 0 voices, and was last updated by  EduGorilla 2 years, 3 months ago.

  • Author
  • #1367427 Reply
    Select Question Language :

    Direction: Read the given passage carefully and answer the questions that follow.

    Over the past few years, the popularity of online social networks (OSNs) such as Facebook, Twitter, and Orkut have grown tremendously. OSNs are built on real-world social relationships and provide their users with a wide variety of virtual-interaction mechanisms. As OSNs have become critical online communication platforms integrated into society’s daily life, the security risks accompanying such developments have raised concerns in industry, academia, and government.
    Users provide an astonishing amount of personal information voluntarily, and OSN service providers store this information. Ralph Gross and Alessandro Acquisti studied the Facebook users in the Carnegie Mellon University network and discovered that 90.8 percent of users uploaded their images, 87.8 percent revealed their birth dates, 39.9 percent shared their phone numbers, and 50.8 percent listed their current addresses. Such an abundance of readily available personal information makes privacy breach a unique angle of attack in OSNs. Three primary parties interact with one another in an OSN: the service provider, the users, and third-party applications. Because OSNs are formed by real people, they are tempting targets for viral marketing, which has therefore easily invaded them. The public perception that OSNs encompass friends, family, and acquaintances makes users prone to trust messages they receive in OSNs. In addition, aided with the information extracted from user profiles, spammers can often exploit social-engineering tricks to enhance viral marketing’s effectiveness. A phishing attack targets OSN users’ confidential information (OSN account credentials, email address, online banking, and so on). If it targets OSN account credentials, such an attack is usually combined with spamming to complete the viral-marketing process. Plausible defence mechanisms for phishing attacks are mostly on the client side, given the voluntary nature of users’ sharing their confidential information. Digitally signed emails can prevent spoofed email messages from fooling recipients; browser toolbars can also alert users when they’re prompted for usernames and passwords at suspicious sites.
    OSNs are playing an increasingly important role in the Internet community today. Their future development hinges on their ability to deliver enjoyable services without undermining users’ information security.
    Source -
    On what does the future development of OSNs depend?

    Options :-

    1. The ability to provide enjoyable services without compromising user security.
    2. The ability to provide cashless entertainment on the go.
    3. The ability to provide high level security features to those users who can pay for the same.
    4. The ability to provide free downloadable music as a way to stop music piracy.
    5. The ability to provide wireless entertainment without comprising the speed and efficiency of the servers.
    Post your Training /Course Enquiry
    Are You looking institutes / coaching center for
    • Bank PO, SSC, Railways
    • Study Abroad
    Select your Training / Study category
Reply To: Direction: Read the given passage carefully and answer the questions that follow. Over the past few ….
Your information:

Verify Yourself

Log in with your credentials


Forgot your details?

Create Account