|
Priority User Access for Social Network SecurityKeywords: Access points , social network security , types of social network , user priority Abstract: Attacking the information of any institute that used social network may affect their business and can cause huge financial losses whose value is immeasurable. Social networking sites are the place where the users not only post their messages but also submit personal details. The weaken security of users’ accounts in social networking sites have led to various privacy issues and challenges in security issues. This study highlights types of the most known social network and their security points. In this study we proposed a new idea for social network security, which aim to give each user a full control of his information. It also controlled the types of information the user can access. A delegation rights given to each by proposing a priority to sign for each user according to the relationship intensity between the requester and respondent, also a certificate that consists of all the information needed to verify user authorization which will save from any risk.
|