Please login first
Influence of Two-Step Verification Technique Over Privacy Security Threat on Social Networks
* 1 , * 2 , * 3 , * 4
1  Department Of Computer Science Bayero University Kano, Nigeria
2  Department of Software Engineering, Bayero University, Kano, Nigeria
3  Department of Health Information Management, College of Health Science and Technology, Ningi, Bauchi, Nigeria
4  Department of Computer Science Bayero University, Kano, Nigeria
Academic Editor: Francesco Dell'olio

Abstract:

The rapid adoption of Online Social Networks (OSNs) has redefined how people interact, share information, and collaborate. Yet, these platforms also introduce notable privacy and security concerns. This study investigates the inherent vulnerabilities of OSNs and evaluates the role of Two-Step Verification (2SV) as a countermeasure to strengthen user security.

Our research utilizes a multi-faceted approach, including a comprehensive literature review and an analysis of data breaches, privacy policy infractions, and user experiences within OSNs. The surveys capture user insights, and the case studies of security incidents highlight specific technical vulnerabilities. To assess 2SV, we examine its effectiveness in blocking unauthorized access, its impact on user experience, adoption trends, and its performance in comparison to alternative security measures such as strong passwords and biometrics.

The findings show that common OSN vulnerabilities include data breaches, phishing attempts, and weak privacy safeguards. User insights reveal varying levels of privacy risk awareness, with many being unclear about the available security options, including 2SV. Our evaluation finds that 2SV is effective in reducing unauthorized access and has achieved moderate user adoption due to its balance between security and usability. However, comparisons with options like biometrics point to 2SV’s limitations in both convenience and security resilience.

This study offers valuable perspectives on OSN security challenges and the potential of 2SV as a mitigation strategy. These insights contribute to ongoing efforts to enhance privacy and security across online social platforms.

Keywords: Social Networks; Privacy threat; 2-Step Verification; Account
Comments on this paper
Currently there are no comments available.



 
 
Top