Description: A key aspect of online social networks (OSNs) is the user-generated multimedia content shared online. OSNs like Facebook have to deal with up to 300 million photos uploaded on a daily basis, both video- and audio-related social networks have also started to gain important shares of the market. Although the security and privacy mechanisms deployed by OSNs can cope with several risks and discourage inexperienced users from malicious behaviours, many issues still need to be addressed. Uploaded multimedia content carries information that could be transmitted virally and almost instantaneously within OSNs and beyond. OSNs could be seen as a multimedia heaven for users. However, in many cases they might end up being the user’s personal hell with information disclosure or distortion, contrary to his/her will. In this article, we outline the most significant security and privacy issues related to the exposure of multimedia content in OSNs and we discuss possible countermeasures.
Description: In daily life, people are faced with problems that have more than one solution. In computing, and other fields, researchers and developers encounter computational problems that may have a large number of solutions. In these cases, it may be almost unfeasible to determine the best one. Evolutionary computation is an appropriate technique for finding an optimal solution to a problem. Among these problems, evolutionary computation can provide an efficient way to solve those associated with computer security and forensics. This chapter examines the approaches evolutionary computation offers to discover an optimal solution to a problem. Moreover, it overviews how evolutionary computation can be applied to different scenarios related to computer security and forensics.
Description: Intellectual property protection of multimedia is a thorny and largely unsolved problem. Despite its practical limitations, copy detection is an excellent complement to copy prevention. Fingerprinting techniques make redistributor tracing possible by relying on invisible watermarks embedded in the content sold which are unique for each particular buyer. That uniqueness of fingerprints is not easy to achieve in multicast transmission. We argue in this paper that encryption-based solutions are the most realistic option to fingerprint multicast transmission. However, the few existing encryption-based methods in the literature are vulnerable to buyer collusions. We propose an encryption-based algorithm which provides collusion security at the cost of transmitting the content twice.
Description: The so-called Information Society is founded on information and communication technologies (ICT). A wide variety of people use ICT to create, distribute, consume and manipulate information in a daily basis. Although there are experts skilled in security issues, most ICT users have not got a vast knowledge and understanding of the risks that a wrong employment of ICT might imply. Notwithstanding, it is not apparent how to measure the actual level of awareness of the users and their computer security skills. With the aim to address this problem, we propose a framework to assess the computer security skills of ICT users. First, we identify a set of assessment areas to consider. Second, we define the indicators that allow the computation of area indexes with which we can value the computer security skills of ICT users. Our proposal has been tested in practice and we present the study and the obtained results. Thanks to the proposed framework, it is possible to gather precise information about the security understanding of people. As a result of this knowledge, specific actions could be taken on the analysed subjects. Thus, we provide a comprehensive analysis tool for IT managers, CTO and e-Government experts interested in improving the computer security skills of their staffs within their departments, companies and administrations.
Follow our last publications and stay connected!
Av. Països Catalans, 26, 43470 Tarragona, Catalonia, Spain