SlideShare une entreprise Scribd logo
1  sur  17
Télécharger pour lire hors ligne
Online Social Networks




            Photo provided by http://flickr.com/photos/luc/1804295568/ via GNUCITIZEN



5 threats and 5 ways to use them safely
What are Online Social
               Networks?
   Online community of Internet users
   Users share common interests
    −   Hobbies
    −   Religion
    −   Politics
    −   Friends
    −   Schools

   Multiple ways for users to interact such as
    chat, messaging, email, video, voice chat, file
    sharing, blogging, discussion groups...
Who uses Online Social
            Networks?
   Most popular with
    “Generation-Y”
   “Teens and Tweens”
   “Generation-X” and
    older is the latest
    trend
Most Popular Social Networking
         Web Sites
Top 5
Threats to Online Social Networks
#1
Cyberbullying, stalking, and sexual predators




     Teens bashing other teens...
     Megan Meier suicide
     MySpace released a report in 2007 showing
      29,000 registered sex offenders on MySpace
#2 Vulnerabilities in Applications/Widgets

    Widgets, third-party applications
    XSS (Cross Site Scripting) Samy/Quicktime
    Malicious banner ads/background images (Alicia
     Keys’)
    Be careful! Some applications will override privacy
     settings!




From the blog post: “Invading the Space: Alicia Keys’ MySpace and… RBN?”
http://blog.trendmicro.com/invading-the-space-alicia-keys-myspace-and-rbn/
#3 Spear Phishing and SPAM
   Fake “friend requests”
   Emails that look like they are legitimate!




                     Screen shot courtesy of Paul Asadoorian, pauldotcom.com
#4 Collection and aggregation
           of personal data
   Most privacy policies are very vague
   Think about it...$35 per user when MySpace
    was sold to News Corp in 2005
   Sites like Plaxo aggregate all of these social
    networks together

    The following is an example of a privacy statement:

    “[SNS Provider] also logs non-personally identifiable
    information including IP address, profile information,
    aggregate user data, and browser type, from users and
    visitors to the site. This data is used to manage the
    website, track usage and improve the website services.
    This non-personally-identifiable information may be
    shared with third-parties to provide more relevant
    services and advertisements to members.”

    - From the ENISA position paper “Security Issues and
    Recommendations for Online Social Networks
#5 Evil Twin Attacks




                       Chris Pirillo by Alan Berner - The Seattle Times

   Fake profiles
   Reputation slander
   Corporate espionage (LinkedIn)
   Weak authentication of the user (are you who
    you say you are?)
Top 5
 Ways to Safely use
Online Social Networks
#1 Set appropriate privacy
               defaults
   All Social Networking sites have wide-open
    privacy defaults!
#2 Be careful with third-party
        applications/widgets
   Some of these applications will override
    privacy settings
   Example: “Secret Crush” Facebook
    application
    −   Installed adware “worm”




                           Photos from Fortinet: http://www.fortiguardcenter.com/advisory/FGA-2007-16.html
#3 Limit personal information
   Don’t post your full name, SSN, address...etc...
   Be cautious about posting information that
    could be used to identify you or locate you
    offline
   Careful with choosing an online alias and what
    it says about you


“The more info you share, the more valuable you are”
#4 Only accept friend
requests/connections from people
        you know directly
   Most are SPAM
   Most are bots that want to trick you!
   LinkedIn
    −   Be aware of corporate espionage!
#5 Only post information your mother
       is comfortable seeing!
   Anyone can view these photos including
    employers, friends, and enemy's
   Don't trust a private profile!




            “Use common sense!”
Questions?
tom@spylogic.net
http://spylogic.net

Contenu connexe

Tendances

Cyber bullying slide share
Cyber bullying slide shareCyber bullying slide share
Cyber bullying slide share
br03wood
 
Social network privacy & security
Social network privacy & securitySocial network privacy & security
Social network privacy & security
nadikari123
 

Tendances (20)

Social media and Security risks
Social media and Security risksSocial media and Security risks
Social media and Security risks
 
Cyber bullying slide share
Cyber bullying slide shareCyber bullying slide share
Cyber bullying slide share
 
Social media-threats
Social media-threatsSocial media-threats
Social media-threats
 
Social media privacy issues
Social media privacy issuesSocial media privacy issues
Social media privacy issues
 
Cyberbullying and social media
Cyberbullying and social mediaCyberbullying and social media
Cyberbullying and social media
 
Privacy and Security in Online Social Media : Privacy and Social Media
Privacy and Security in Online Social Media : Privacy and Social MediaPrivacy and Security in Online Social Media : Privacy and Social Media
Privacy and Security in Online Social Media : Privacy and Social Media
 
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanHow to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
 
Social network privacy & security
Social network privacy & securitySocial network privacy & security
Social network privacy & security
 
CYBER SECURITY ON SOCIAL MEDIA
CYBER SECURITY ON SOCIAL MEDIACYBER SECURITY ON SOCIAL MEDIA
CYBER SECURITY ON SOCIAL MEDIA
 
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
Cyberbullying - Wednesday Class - Presentation on Cyberbullying - Presented b...
 
Social Media Presentation.pptx
Social Media Presentation.pptxSocial Media Presentation.pptx
Social Media Presentation.pptx
 
Security awareness-checklist 2019
Security awareness-checklist 2019Security awareness-checklist 2019
Security awareness-checklist 2019
 
Social Media Safety Tips
Social Media Safety TipsSocial Media Safety Tips
Social Media Safety Tips
 
Social Networking and Internet Safety
Social Networking and Internet SafetySocial Networking and Internet Safety
Social Networking and Internet Safety
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
 
Cybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamCybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by Adam
 
Social networking .ppt
Social networking .pptSocial networking .ppt
Social networking .ppt
 
End-User Security Awareness
End-User Security AwarenessEnd-User Security Awareness
End-User Security Awareness
 
Social Media
Social MediaSocial Media
Social Media
 

En vedette

Taliban and Al Qaeda, culural sociology , Sage 2012
Taliban and Al Qaeda, culural sociology , Sage 2012Taliban and Al Qaeda, culural sociology , Sage 2012
Taliban and Al Qaeda, culural sociology , Sage 2012
A.R.M. Imtiyaz
 
Effective use of the internet
Effective use of the internetEffective use of the internet
Effective use of the internet
quiocho2
 
Social Media - Welcome to the Dark Side
Social Media - Welcome to the Dark SideSocial Media - Welcome to the Dark Side
Social Media - Welcome to the Dark Side
Rick Mans
 
The dark side of social networking
The dark side of social networkingThe dark side of social networking
The dark side of social networking
James Ruffer
 
The dark side of social media
The dark side of social mediaThe dark side of social media
The dark side of social media
Mathias Klang
 
Cyberbullying: The Dark Side of Social Media
Cyberbullying: The Dark Side of Social MediaCyberbullying: The Dark Side of Social Media
Cyberbullying: The Dark Side of Social Media
adamkruger
 

En vedette (19)

Privacy in Social Network Sites
Privacy in Social Network SitesPrivacy in Social Network Sites
Privacy in Social Network Sites
 
Social Network Privacy, Security and Identity:One
Social Network Privacy, Security and Identity:OneSocial Network Privacy, Security and Identity:One
Social Network Privacy, Security and Identity:One
 
The Dark Side of Social Media: Privacy Concerns
The Dark Side of Social Media: Privacy ConcernsThe Dark Side of Social Media: Privacy Concerns
The Dark Side of Social Media: Privacy Concerns
 
Presentation Dangers Of Social Media
Presentation   Dangers Of Social MediaPresentation   Dangers Of Social Media
Presentation Dangers Of Social Media
 
Social networking PPT
Social networking PPTSocial networking PPT
Social networking PPT
 
Cit101 social aspects_and_issues_of_the_internet spring 2012
Cit101 social aspects_and_issues_of_the_internet spring 2012Cit101 social aspects_and_issues_of_the_internet spring 2012
Cit101 social aspects_and_issues_of_the_internet spring 2012
 
Comfort food for all
Comfort food for allComfort food for all
Comfort food for all
 
Taliban and Al Qaeda, culural sociology , Sage 2012
Taliban and Al Qaeda, culural sociology , Sage 2012Taliban and Al Qaeda, culural sociology , Sage 2012
Taliban and Al Qaeda, culural sociology , Sage 2012
 
Effective use of the internet
Effective use of the internetEffective use of the internet
Effective use of the internet
 
Extremism the bane of our society
Extremism the bane of our societyExtremism the bane of our society
Extremism the bane of our society
 
Shedding Light On Dark Social Media: Dave Duarte At Heavy Chef
Shedding Light On Dark Social Media: Dave Duarte At Heavy ChefShedding Light On Dark Social Media: Dave Duarte At Heavy Chef
Shedding Light On Dark Social Media: Dave Duarte At Heavy Chef
 
Social Media - Welcome to the Dark Side
Social Media - Welcome to the Dark SideSocial Media - Welcome to the Dark Side
Social Media - Welcome to the Dark Side
 
Evgeny Morozov
Evgeny MorozovEvgeny Morozov
Evgeny Morozov
 
The dark side of social networking
The dark side of social networkingThe dark side of social networking
The dark side of social networking
 
The Dark Side of Social Media: Legal Issues
The Dark Side of Social Media: Legal IssuesThe Dark Side of Social Media: Legal Issues
The Dark Side of Social Media: Legal Issues
 
The dark side of social media
The dark side of social mediaThe dark side of social media
The dark side of social media
 
Cyberbullying: The Dark Side of Social Media
Cyberbullying: The Dark Side of Social MediaCyberbullying: The Dark Side of Social Media
Cyberbullying: The Dark Side of Social Media
 
Dangers of social networking sites
Dangers of social networking sitesDangers of social networking sites
Dangers of social networking sites
 
Extremism D Causes, Effects & D Cure Baasim Salafi Manhaj
Extremism D Causes, Effects & D Cure Baasim Salafi ManhajExtremism D Causes, Effects & D Cure Baasim Salafi Manhaj
Extremism D Causes, Effects & D Cure Baasim Salafi Manhaj
 

Similaire à Online Social Networks: 5 threats and 5 ways to use them safely

Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011
Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011
Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011
Ben Woelk, CISSP, CPTC
 
Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235
brendaylo
 
Protecting Personal Privacy
Protecting Personal PrivacyProtecting Personal Privacy
Protecting Personal Privacy
DoubleXDS
 
Lis 768 Privacy Presentation
Lis 768 Privacy PresentationLis 768 Privacy Presentation
Lis 768 Privacy Presentation
Julia Bryan-Diehl
 

Similaire à Online Social Networks: 5 threats and 5 ways to use them safely (20)

Shockproofing Your Use of Social Media
Shockproofing Your Use of Social MediaShockproofing Your Use of Social Media
Shockproofing Your Use of Social Media
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awareness
 
L2 rules of netiquette
L2 rules of netiquetteL2 rules of netiquette
L2 rules of netiquette
 
Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011
Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011
Top Ten Tips to Shockproof Your Use of Social Media, Lavacon 2011
 
Internet Credibility
Internet CredibilityInternet Credibility
Internet Credibility
 
Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threats
 
Internet safety presentation for parents 2018
Internet safety presentation for parents 2018Internet safety presentation for parents 2018
Internet safety presentation for parents 2018
 
Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017Internet Safety for Parents presentation 2017
Internet Safety for Parents presentation 2017
 
Internet safety presentation 2019
Internet safety presentation 2019Internet safety presentation 2019
Internet safety presentation 2019
 
Cybersecurity additional activities
Cybersecurity additional activitiesCybersecurity additional activities
Cybersecurity additional activities
 
Internet Safety 2.0
Internet Safety 2.0Internet Safety 2.0
Internet Safety 2.0
 
Top Ten Ways to Shockproof Your Use of Social Media
Top Ten Ways to Shockproof Your Use of Social MediaTop Ten Ways to Shockproof Your Use of Social Media
Top Ten Ways to Shockproof Your Use of Social Media
 
Rules of netiquette & cyber crimes
Rules of netiquette & cyber crimesRules of netiquette & cyber crimes
Rules of netiquette & cyber crimes
 
Protecting Personal Privacy
Protecting Personal PrivacyProtecting Personal Privacy
Protecting Personal Privacy
 
Protect Your Identity During Social Networking
Protect Your Identity During Social NetworkingProtect Your Identity During Social Networking
Protect Your Identity During Social Networking
 
Top Ten Tips for Shockproofing Your Use of Social Media, Lavacon 2011
Top Ten Tips for Shockproofing Your Use of Social Media, Lavacon 2011Top Ten Tips for Shockproofing Your Use of Social Media, Lavacon 2011
Top Ten Tips for Shockproofing Your Use of Social Media, Lavacon 2011
 
Users guide
Users guideUsers guide
Users guide
 
Lis 768 Privacy Presentation
Lis 768 Privacy PresentationLis 768 Privacy Presentation
Lis 768 Privacy Presentation
 
Cyber Awareness.pptx
Cyber Awareness.pptxCyber Awareness.pptx
Cyber Awareness.pptx
 

Plus de Tom Eston

Social Zombies: Rise of the Mobile Dead
Social Zombies: Rise of the Mobile DeadSocial Zombies: Rise of the Mobile Dead
Social Zombies: Rise of the Mobile Dead
Tom Eston
 
Social Zombies Gone Wild: Totally Exposed and Uncensored
Social Zombies Gone Wild: Totally Exposed and UncensoredSocial Zombies Gone Wild: Totally Exposed and Uncensored
Social Zombies Gone Wild: Totally Exposed and Uncensored
Tom Eston
 

Plus de Tom Eston (18)

Privacy Exposed: Ramifications of Social Media and Mobile Technology
Privacy Exposed: Ramifications of Social Media and Mobile TechnologyPrivacy Exposed: Ramifications of Social Media and Mobile Technology
Privacy Exposed: Ramifications of Social Media and Mobile Technology
 
Cash is King: Who's Wearing Your Crown?
Cash is King: Who's Wearing Your Crown?Cash is King: Who's Wearing Your Crown?
Cash is King: Who's Wearing Your Crown?
 
Social Zombies: Rise of the Mobile Dead
Social Zombies: Rise of the Mobile DeadSocial Zombies: Rise of the Mobile Dead
Social Zombies: Rise of the Mobile Dead
 
The Android vs. Apple iOS Security Showdown
The Android vs. Apple iOS Security Showdown The Android vs. Apple iOS Security Showdown
The Android vs. Apple iOS Security Showdown
 
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
Five Lessons Learned From Breaking Into A Casino: Confessions of a Penetratio...
 
Smart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and ExploitationSmart Bombs: Mobile Vulnerability and Exploitation
Smart Bombs: Mobile Vulnerability and Exploitation
 
Don't Drop the SOAP: Real World Web Service Testing for Web Hackers
Don't Drop the SOAP: Real World Web Service Testing for Web Hackers Don't Drop the SOAP: Real World Web Service Testing for Web Hackers
Don't Drop the SOAP: Real World Web Service Testing for Web Hackers
 
Attacking and Defending Apple iOS Devices
Attacking and Defending Apple iOS DevicesAttacking and Defending Apple iOS Devices
Attacking and Defending Apple iOS Devices
 
Social Zombies Gone Wild: Totally Exposed and Uncensored
Social Zombies Gone Wild: Totally Exposed and UncensoredSocial Zombies Gone Wild: Totally Exposed and Uncensored
Social Zombies Gone Wild: Totally Exposed and Uncensored
 
Social Zombies II: Your Friends Need More Brains
Social Zombies II: Your Friends Need More BrainsSocial Zombies II: Your Friends Need More Brains
Social Zombies II: Your Friends Need More Brains
 
Enterprise Open Source Intelligence Gathering
Enterprise Open Source Intelligence GatheringEnterprise Open Source Intelligence Gathering
Enterprise Open Source Intelligence Gathering
 
Staying Safe & Secure on Twitter
Staying Safe & Secure on TwitterStaying Safe & Secure on Twitter
Staying Safe & Secure on Twitter
 
New School Man-in-the-Middle
New School Man-in-the-MiddleNew School Man-in-the-Middle
New School Man-in-the-Middle
 
Rise of the Autobots: Into the Underground of Social Network Bots
Rise of the Autobots: Into the Underground of Social Network BotsRise of the Autobots: Into the Underground of Social Network Bots
Rise of the Autobots: Into the Underground of Social Network Bots
 
Information Gathering With Maltego
Information Gathering With MaltegoInformation Gathering With Maltego
Information Gathering With Maltego
 
Automated Penetration Testing With Core Impact
Automated Penetration Testing With Core ImpactAutomated Penetration Testing With Core Impact
Automated Penetration Testing With Core Impact
 
Automated Penetration Testing With The Metasploit Framework
Automated Penetration Testing With The Metasploit FrameworkAutomated Penetration Testing With The Metasploit Framework
Automated Penetration Testing With The Metasploit Framework
 
Physical Security Assessments
Physical Security AssessmentsPhysical Security Assessments
Physical Security Assessments
 

Dernier

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Dernier (20)

Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 

Online Social Networks: 5 threats and 5 ways to use them safely

  • 1. Online Social Networks Photo provided by http://flickr.com/photos/luc/1804295568/ via GNUCITIZEN 5 threats and 5 ways to use them safely
  • 2. What are Online Social Networks?  Online community of Internet users  Users share common interests − Hobbies − Religion − Politics − Friends − Schools  Multiple ways for users to interact such as chat, messaging, email, video, voice chat, file sharing, blogging, discussion groups...
  • 3. Who uses Online Social Networks?  Most popular with “Generation-Y”  “Teens and Tweens”  “Generation-X” and older is the latest trend
  • 4. Most Popular Social Networking Web Sites
  • 5. Top 5 Threats to Online Social Networks
  • 6. #1 Cyberbullying, stalking, and sexual predators  Teens bashing other teens...  Megan Meier suicide  MySpace released a report in 2007 showing 29,000 registered sex offenders on MySpace
  • 7. #2 Vulnerabilities in Applications/Widgets  Widgets, third-party applications  XSS (Cross Site Scripting) Samy/Quicktime  Malicious banner ads/background images (Alicia Keys’)  Be careful! Some applications will override privacy settings! From the blog post: “Invading the Space: Alicia Keys’ MySpace and… RBN?” http://blog.trendmicro.com/invading-the-space-alicia-keys-myspace-and-rbn/
  • 8. #3 Spear Phishing and SPAM  Fake “friend requests”  Emails that look like they are legitimate! Screen shot courtesy of Paul Asadoorian, pauldotcom.com
  • 9. #4 Collection and aggregation of personal data  Most privacy policies are very vague  Think about it...$35 per user when MySpace was sold to News Corp in 2005  Sites like Plaxo aggregate all of these social networks together The following is an example of a privacy statement: “[SNS Provider] also logs non-personally identifiable information including IP address, profile information, aggregate user data, and browser type, from users and visitors to the site. This data is used to manage the website, track usage and improve the website services. This non-personally-identifiable information may be shared with third-parties to provide more relevant services and advertisements to members.” - From the ENISA position paper “Security Issues and Recommendations for Online Social Networks
  • 10. #5 Evil Twin Attacks Chris Pirillo by Alan Berner - The Seattle Times  Fake profiles  Reputation slander  Corporate espionage (LinkedIn)  Weak authentication of the user (are you who you say you are?)
  • 11. Top 5 Ways to Safely use Online Social Networks
  • 12. #1 Set appropriate privacy defaults  All Social Networking sites have wide-open privacy defaults!
  • 13. #2 Be careful with third-party applications/widgets  Some of these applications will override privacy settings  Example: “Secret Crush” Facebook application − Installed adware “worm” Photos from Fortinet: http://www.fortiguardcenter.com/advisory/FGA-2007-16.html
  • 14. #3 Limit personal information  Don’t post your full name, SSN, address...etc...  Be cautious about posting information that could be used to identify you or locate you offline  Careful with choosing an online alias and what it says about you “The more info you share, the more valuable you are”
  • 15. #4 Only accept friend requests/connections from people you know directly  Most are SPAM  Most are bots that want to trick you!  LinkedIn − Be aware of corporate espionage!
  • 16. #5 Only post information your mother is comfortable seeing!  Anyone can view these photos including employers, friends, and enemy's  Don't trust a private profile! “Use common sense!”