Along with growth of the internet in recent years, a related phenomenon is also growing: the complaints by internet users that their accounts have been hacked by others. What are the reasons behind this? Are those hackers really that good that they can find out our passwords and almost magically gain access to our systems? This project focuses on the ways in which personal information is propagated by users on the Internet by web 2.0 sites like social networks as well as on the problems inherited by password reset methods, which are how we inadvertently provide others with easy access to our systems. Our findings clearly expose how the lack of interest by most users in interaction with web 2.0 sites, especially password handling, causes trouble. We conclude that gaining system access through accumulating personal information is entirely possible and does not require an expert. If we are aware and take security measures, however, we can make it very difficult for people with malicious intentions to gain access to our systems.

Library of Congress Subject Headings

Online social networks--Security measures; Computers--Access control--Passwords; Computer crimes--Prevention--Research

Publication Date


Document Type


Student Type


Degree Name

Networking and System Administration (MS)

Department, Program, or Center

Computer Science (GCCIS)


Border, Charles


Note: imported from RIT’s Digital Media Library running on DSpace to RIT Scholar Works in December 2013.


RIT – Main Campus