SlideShare une entreprise Scribd logo
1  sur  15
Presented By El Rumi
@IDSECCONF 2011
Social Network & Facebook
Social Network




        Social Network is a social structure made up of individuals (or
 organizations) called "nodes", which are tied (connected) by one or more
 specific types of interdependency, such as friendship, kinship, common
 interest, financial exchange, dislike, sexual relationships, or relationships of
 beliefs, knowledge or prestige.
 (source: http://en.wikipedia.org/wiki/Social_network)
Social Network & Facebook
Facebook




   A “social networking” site
   Framework for information
   Complex control of who can see what
   Users have a “profile” with a picture* and other personal details as they
    wish, including “limited profile”
   Based on “Networks”
   Facebook creates a newsfeed based on what your “friends” are doing


  (source: http://users.ox.ac.uk/~tony/facebook.ppt)
Facebook Account Security




  (source: https://www.facebook.com/help/?faq=212183815469410)
True Story....
Let’s Start The Game
Proof of Concept! (Identification)
Proof of Concept! (Penetration)
Proof of Concept! (Penetration)
Proof of Concept! (Penetration)
Proof of Concept! (Owned)
Can We Prevent This?
Change Security Question?




     (source: https://www.facebook.com/help/?faq=163063243756483)
So?
 Hide Your Sensitive Data From Public.
 Hide Your Email From Public.
 Make Security Question :
   With Different Thing Answer But Easy To Remember.
   With Right Answer But Encrypted (md5, sha1, rot13, etc)
Video Demo
“If any skiddy community gets too big, we shut them down.
If any lamer causes too much trouble, we shut them down. If
any group keeps fucking stuff up, we stop them.”
-Elz (Kecoak Elektronik)-

(source: http://kecoak.org/log/2010/12/25/owned-and-exposed-pwned-
some-skiddy/)

Contenu connexe

Tendances

Social network privacy & security
Social network privacy & securitySocial network privacy & security
Social network privacy & securitynadikari123
 
FILM 260 Flipbook- Virtually Impossible? Privacy Within Social Media
FILM 260 Flipbook- Virtually Impossible? Privacy Within Social MediaFILM 260 Flipbook- Virtually Impossible? Privacy Within Social Media
FILM 260 Flipbook- Virtually Impossible? Privacy Within Social MediaNicoleDrutz
 
Northern District Department Head Meeting
Northern District Department Head MeetingNorthern District Department Head Meeting
Northern District Department Head MeetingGreg JOhll
 
07 12 19 Technologies And Polarities
07 12 19 Technologies And Polarities07 12 19 Technologies And Polarities
07 12 19 Technologies And PolaritiesJohn David Smith
 
Web 2thtrtgrst
Web 2thtrtgrstWeb 2thtrtgrst
Web 2thtrtgrstOnly1Sam
 
2013: Comp113 lecture 1 part two
2013: Comp113 lecture 1 part two2013: Comp113 lecture 1 part two
2013: Comp113 lecture 1 part twoCOMP 113
 
20090228 Cyber Safety
20090228 Cyber Safety20090228 Cyber Safety
20090228 Cyber Safetymkinzie
 
Web2.0 An Introduction
Web2.0 An IntroductionWeb2.0 An Introduction
Web2.0 An Introductionc_l_b
 
Presentation social media
Presentation social mediaPresentation social media
Presentation social mediaEduardo Ferro
 
New Media Technology- Cyber Society and the Interaction Channel
New Media Technology- Cyber Society and the Interaction ChannelNew Media Technology- Cyber Society and the Interaction Channel
New Media Technology- Cyber Society and the Interaction ChannelFaindra Jabbar
 
Media, Technology and Society - The new trends of social interaction
Media, Technology and Society - The new trends of social interactionMedia, Technology and Society - The new trends of social interaction
Media, Technology and Society - The new trends of social interactionFaindra Jabbar
 
Cloud Computing, Social Networking and Social Media
Cloud Computing, Social Networking and Social MediaCloud Computing, Social Networking and Social Media
Cloud Computing, Social Networking and Social MediaMolly Immendorf
 
Social Media Beyond Facebook and Twitter
Social Media Beyond Facebook and TwitterSocial Media Beyond Facebook and Twitter
Social Media Beyond Facebook and TwitterAALBC.com, LLC
 

Tendances (20)

Social network privacy & security
Social network privacy & securitySocial network privacy & security
Social network privacy & security
 
FILM 260 Flipbook- Virtually Impossible? Privacy Within Social Media
FILM 260 Flipbook- Virtually Impossible? Privacy Within Social MediaFILM 260 Flipbook- Virtually Impossible? Privacy Within Social Media
FILM 260 Flipbook- Virtually Impossible? Privacy Within Social Media
 
Northern District Department Head Meeting
Northern District Department Head MeetingNorthern District Department Head Meeting
Northern District Department Head Meeting
 
YANCOI
YANCOIYANCOI
YANCOI
 
07 12 19 Technologies And Polarities
07 12 19 Technologies And Polarities07 12 19 Technologies And Polarities
07 12 19 Technologies And Polarities
 
Web 2thtrtgrst
Web 2thtrtgrstWeb 2thtrtgrst
Web 2thtrtgrst
 
2013: Comp113 lecture 1 part two
2013: Comp113 lecture 1 part two2013: Comp113 lecture 1 part two
2013: Comp113 lecture 1 part two
 
Internet
InternetInternet
Internet
 
Technology empowerment ict today
Technology empowerment ict todayTechnology empowerment ict today
Technology empowerment ict today
 
Class 3 ppt
Class 3 pptClass 3 ppt
Class 3 ppt
 
Web
WebWeb
Web
 
20090228 Cyber Safety
20090228 Cyber Safety20090228 Cyber Safety
20090228 Cyber Safety
 
Web2.0 An Introduction
Web2.0 An IntroductionWeb2.0 An Introduction
Web2.0 An Introduction
 
Presentation social media
Presentation social mediaPresentation social media
Presentation social media
 
New Media Technology- Cyber Society and the Interaction Channel
New Media Technology- Cyber Society and the Interaction ChannelNew Media Technology- Cyber Society and the Interaction Channel
New Media Technology- Cyber Society and the Interaction Channel
 
Media, Technology and Society - The new trends of social interaction
Media, Technology and Society - The new trends of social interactionMedia, Technology and Society - The new trends of social interaction
Media, Technology and Society - The new trends of social interaction
 
2.0
2.02.0
2.0
 
Cloud Computing, Social Networking and Social Media
Cloud Computing, Social Networking and Social MediaCloud Computing, Social Networking and Social Media
Cloud Computing, Social Networking and Social Media
 
What is Social Media?
What is Social Media?What is Social Media?
What is Social Media?
 
Social Media Beyond Facebook and Twitter
Social Media Beyond Facebook and TwitterSocial Media Beyond Facebook and Twitter
Social Media Beyond Facebook and Twitter
 

En vedette

Password hacking
Password hackingPassword hacking
Password hackingAbhay pal
 
Welcome to the world of hacking
Welcome to the world of hackingWelcome to the world of hacking
Welcome to the world of hackingTjylen Veselyj
 
Hacking with experts 3 (facebook hacking) by anurag dwivedi.
Hacking with experts 3 (facebook hacking) by anurag dwivedi.Hacking with experts 3 (facebook hacking) by anurag dwivedi.
Hacking with experts 3 (facebook hacking) by anurag dwivedi.Esteban Bedoya
 
Phone security code unlock message
Phone security code unlock messagePhone security code unlock message
Phone security code unlock messageMansoor Rafeeq
 
Samsung Mobile Phone Codes
Samsung Mobile Phone CodesSamsung Mobile Phone Codes
Samsung Mobile Phone CodesLenny Henningham
 
Butterfly group( facebook)
Butterfly group( facebook)Butterfly group( facebook)
Butterfly group( facebook)bushra1413
 
MEI Unlock - Use Any Network on your Smartphone without Restriction
MEI Unlock - Use Any Network on your Smartphone without RestrictionMEI Unlock - Use Any Network on your Smartphone without Restriction
MEI Unlock - Use Any Network on your Smartphone without RestrictionAlexia Ruby
 
Password Recovery Tools
Password Recovery ToolsPassword Recovery Tools
Password Recovery ToolsAndrey Belenko
 
All nokia master codes
All nokia master codesAll nokia master codes
All nokia master codesMuhammad Sadiq
 
HOW TO CHECK YOUR GIRLFRIENDS FACEBOOK MESSAGES
HOW TO CHECK YOUR GIRLFRIENDS FACEBOOK MESSAGESHOW TO CHECK YOUR GIRLFRIENDS FACEBOOK MESSAGES
HOW TO CHECK YOUR GIRLFRIENDS FACEBOOK MESSAGESBrown_Laura
 
Facebook Not Just a Social Network!
Facebook Not Just a Social Network!Facebook Not Just a Social Network!
Facebook Not Just a Social Network!Budi Khoirudin
 
Guide to hack Facebook Password
Guide to hack Facebook PasswordGuide to hack Facebook Password
Guide to hack Facebook Passwordauspiciousscene42
 
How to spy on facebook messenger
How to spy on facebook messengerHow to spy on facebook messenger
How to spy on facebook messengerkristin2603
 
Facebook Messages Demystified
Facebook Messages DemystifiedFacebook Messages Demystified
Facebook Messages DemystifiedNFN Labs
 

En vedette (17)

Password hacking
Password hackingPassword hacking
Password hacking
 
Welcome to the world of hacking
Welcome to the world of hackingWelcome to the world of hacking
Welcome to the world of hacking
 
Secret Codes
Secret CodesSecret Codes
Secret Codes
 
Hacking with experts 3 (facebook hacking) by anurag dwivedi.
Hacking with experts 3 (facebook hacking) by anurag dwivedi.Hacking with experts 3 (facebook hacking) by anurag dwivedi.
Hacking with experts 3 (facebook hacking) by anurag dwivedi.
 
Phone security code unlock message
Phone security code unlock messagePhone security code unlock message
Phone security code unlock message
 
Samsung Mobile Phone Codes
Samsung Mobile Phone CodesSamsung Mobile Phone Codes
Samsung Mobile Phone Codes
 
Butterfly group( facebook)
Butterfly group( facebook)Butterfly group( facebook)
Butterfly group( facebook)
 
MEI Unlock - Use Any Network on your Smartphone without Restriction
MEI Unlock - Use Any Network on your Smartphone without RestrictionMEI Unlock - Use Any Network on your Smartphone without Restriction
MEI Unlock - Use Any Network on your Smartphone without Restriction
 
Password Recovery Tools
Password Recovery ToolsPassword Recovery Tools
Password Recovery Tools
 
All nokia master codes
All nokia master codesAll nokia master codes
All nokia master codes
 
Nokia secret codes.
Nokia secret codes.Nokia secret codes.
Nokia secret codes.
 
HOW TO CHECK YOUR GIRLFRIENDS FACEBOOK MESSAGES
HOW TO CHECK YOUR GIRLFRIENDS FACEBOOK MESSAGESHOW TO CHECK YOUR GIRLFRIENDS FACEBOOK MESSAGES
HOW TO CHECK YOUR GIRLFRIENDS FACEBOOK MESSAGES
 
Food Fight—MPI St. Louis
Food Fight—MPI St. LouisFood Fight—MPI St. Louis
Food Fight—MPI St. Louis
 
Facebook Not Just a Social Network!
Facebook Not Just a Social Network!Facebook Not Just a Social Network!
Facebook Not Just a Social Network!
 
Guide to hack Facebook Password
Guide to hack Facebook PasswordGuide to hack Facebook Password
Guide to hack Facebook Password
 
How to spy on facebook messenger
How to spy on facebook messengerHow to spy on facebook messenger
How to spy on facebook messenger
 
Facebook Messages Demystified
Facebook Messages DemystifiedFacebook Messages Demystified
Facebook Messages Demystified
 

Similaire à Social Network Security Best Practices

The Future of Social Networks: The Need for Semantics
The Future of Social Networks: The Need for SemanticsThe Future of Social Networks: The Need for Semantics
The Future of Social Networks: The Need for SemanticsJohn Breslin
 
The Social Semantic Web: An Introduction
The Social Semantic Web: An IntroductionThe Social Semantic Web: An Introduction
The Social Semantic Web: An IntroductionJohn Breslin
 
DM110 - Week 4 - Social Networks
DM110 - Week 4 - Social NetworksDM110 - Week 4 - Social Networks
DM110 - Week 4 - Social NetworksJohn Breslin
 
Social Semantic Web (Social Activity and Facebook)
Social Semantic Web (Social Activity and Facebook)Social Semantic Web (Social Activity and Facebook)
Social Semantic Web (Social Activity and Facebook)Myungjin Lee
 
Chapter 5 Groups & Networks
Chapter 5  Groups & NetworksChapter 5  Groups & Networks
Chapter 5 Groups & NetworksRay Brannon
 
Chapter 5 Groups & Networks
Chapter 5  Groups & NetworksChapter 5  Groups & Networks
Chapter 5 Groups & NetworksRay Brannon
 
Chapter 5 Groups & Networks
Chapter 5  Groups & NetworksChapter 5  Groups & Networks
Chapter 5 Groups & NetworksRay Brannon
 
Interactive Innovation Through Social Software And Web 2.0
Interactive Innovation Through Social Software And Web 2.0Interactive Innovation Through Social Software And Web 2.0
Interactive Innovation Through Social Software And Web 2.0Thomas Ryberg
 
Social Networking And Social Media May 5 2009 Final V1
Social Networking And Social Media May 5 2009  Final V1Social Networking And Social Media May 5 2009  Final V1
Social Networking And Social Media May 5 2009 Final V1Molly Immendorf
 
Social media for social learning
Social media for social learningSocial media for social learning
Social media for social learningLisa Colton
 
Social Networking and Collaboration Tools for Enterprise 2.0
Social Networking and Collaboration Tools for Enterprise 2.0Social Networking and Collaboration Tools for Enterprise 2.0
Social Networking and Collaboration Tools for Enterprise 2.0John Breslin
 
Social media impact on existing social relationships
Social media impact on existing social relationshipsSocial media impact on existing social relationships
Social media impact on existing social relationshipsElizabeth Gestier
 
Social networking
Social networkingSocial networking
Social networkingJohan Koren
 
Data Accessibility and Me: Introducing SIOC, FOAF and the Linked Data Web
Data Accessibility and Me: Introducing SIOC, FOAF and the Linked Data WebData Accessibility and Me: Introducing SIOC, FOAF and the Linked Data Web
Data Accessibility and Me: Introducing SIOC, FOAF and the Linked Data WebJohn Breslin
 
Challenging our Notions of Learning: Understanding How Web 2.0 Technology Wor...
Challenging our Notions of Learning: Understanding How Web 2.0 Technology Wor...Challenging our Notions of Learning: Understanding How Web 2.0 Technology Wor...
Challenging our Notions of Learning: Understanding How Web 2.0 Technology Wor...Paul Brown
 
Production Assignment
Production AssignmentProduction Assignment
Production Assignmentcrumbsy
 

Similaire à Social Network Security Best Practices (20)

Social Networks
Social NetworksSocial Networks
Social Networks
 
The Future of Social Networks: The Need for Semantics
The Future of Social Networks: The Need for SemanticsThe Future of Social Networks: The Need for Semantics
The Future of Social Networks: The Need for Semantics
 
อบรม1
อบรม1อบรม1
อบรม1
 
The Social Semantic Web: An Introduction
The Social Semantic Web: An IntroductionThe Social Semantic Web: An Introduction
The Social Semantic Web: An Introduction
 
DM110 - Week 4 - Social Networks
DM110 - Week 4 - Social NetworksDM110 - Week 4 - Social Networks
DM110 - Week 4 - Social Networks
 
Social Semantic Web (Social Activity and Facebook)
Social Semantic Web (Social Activity and Facebook)Social Semantic Web (Social Activity and Facebook)
Social Semantic Web (Social Activity and Facebook)
 
Chapter 5 Groups & Networks
Chapter 5  Groups & NetworksChapter 5  Groups & Networks
Chapter 5 Groups & Networks
 
Chapter 5 Groups & Networks
Chapter 5  Groups & NetworksChapter 5  Groups & Networks
Chapter 5 Groups & Networks
 
Chapter 5 Groups & Networks
Chapter 5  Groups & NetworksChapter 5  Groups & Networks
Chapter 5 Groups & Networks
 
Interactive Innovation Through Social Software And Web 2.0
Interactive Innovation Through Social Software And Web 2.0Interactive Innovation Through Social Software And Web 2.0
Interactive Innovation Through Social Software And Web 2.0
 
Social Networking And Social Media May 5 2009 Final V1
Social Networking And Social Media May 5 2009  Final V1Social Networking And Social Media May 5 2009  Final V1
Social Networking And Social Media May 5 2009 Final V1
 
Social media for social learning
Social media for social learningSocial media for social learning
Social media for social learning
 
Social Networking and Collaboration Tools for Enterprise 2.0
Social Networking and Collaboration Tools for Enterprise 2.0Social Networking and Collaboration Tools for Enterprise 2.0
Social Networking and Collaboration Tools for Enterprise 2.0
 
Social Media
Social MediaSocial Media
Social Media
 
Julie Clegg
Julie CleggJulie Clegg
Julie Clegg
 
Social media impact on existing social relationships
Social media impact on existing social relationshipsSocial media impact on existing social relationships
Social media impact on existing social relationships
 
Social networking
Social networkingSocial networking
Social networking
 
Data Accessibility and Me: Introducing SIOC, FOAF and the Linked Data Web
Data Accessibility and Me: Introducing SIOC, FOAF and the Linked Data WebData Accessibility and Me: Introducing SIOC, FOAF and the Linked Data Web
Data Accessibility and Me: Introducing SIOC, FOAF and the Linked Data Web
 
Challenging our Notions of Learning: Understanding How Web 2.0 Technology Wor...
Challenging our Notions of Learning: Understanding How Web 2.0 Technology Wor...Challenging our Notions of Learning: Understanding How Web 2.0 Technology Wor...
Challenging our Notions of Learning: Understanding How Web 2.0 Technology Wor...
 
Production Assignment
Production AssignmentProduction Assignment
Production Assignment
 

Dernier

Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 

Dernier (20)

Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 

Social Network Security Best Practices

  • 1. Presented By El Rumi @IDSECCONF 2011
  • 2. Social Network & Facebook Social Network Social Network is a social structure made up of individuals (or organizations) called "nodes", which are tied (connected) by one or more specific types of interdependency, such as friendship, kinship, common interest, financial exchange, dislike, sexual relationships, or relationships of beliefs, knowledge or prestige. (source: http://en.wikipedia.org/wiki/Social_network)
  • 3. Social Network & Facebook Facebook  A “social networking” site  Framework for information  Complex control of who can see what  Users have a “profile” with a picture* and other personal details as they wish, including “limited profile”  Based on “Networks”  Facebook creates a newsfeed based on what your “friends” are doing (source: http://users.ox.ac.uk/~tony/facebook.ppt)
  • 4. Facebook Account Security (source: https://www.facebook.com/help/?faq=212183815469410)
  • 7. Proof of Concept! (Identification)
  • 8. Proof of Concept! (Penetration)
  • 9. Proof of Concept! (Penetration)
  • 10. Proof of Concept! (Penetration)
  • 11. Proof of Concept! (Owned)
  • 12. Can We Prevent This? Change Security Question? (source: https://www.facebook.com/help/?faq=163063243756483)
  • 13. So?  Hide Your Sensitive Data From Public.  Hide Your Email From Public.  Make Security Question :  With Different Thing Answer But Easy To Remember.  With Right Answer But Encrypted (md5, sha1, rot13, etc)
  • 15. “If any skiddy community gets too big, we shut them down. If any lamer causes too much trouble, we shut them down. If any group keeps fucking stuff up, we stop them.” -Elz (Kecoak Elektronik)- (source: http://kecoak.org/log/2010/12/25/owned-and-exposed-pwned- some-skiddy/)