SlideShare une entreprise Scribd logo
1  sur  83
Risk Assessment of Social Media Use
Robert Shullich, CPP, CISSP
Agenda
• Who Am I
• Rules of Engagement
• Social Media
• Risk
• Case Studies
• Recommendations
• Q&A
2
Who Am I
• About a year in current job
• 8 years in Corporate Security
• 16 years at the Stock Exchanges (NYSE/AMEX)
• 8 years at a software company
• 3+ years in CUNY
• IT security for more than 20 years
• In IT for 40 years
3
Disclaimer
• I am not a lawyer, any information presented
here is not meant to be legal advice. If you
need legal advice, please seek counsel with a
qualified and licensed professional who
practices law in the subject matter and
jurisdiction that applies.
• Opinions expressed here are my own, and are
not meant to be opinions of ASIS, ISC2, or
anyone I work for.
4
Rules of Engagement
• Pure Risk, Not Opportunist
• Chicken Little – The Sky is Falling
• Objective is to Protect
• No Recommendation on Block v. Allow
• Legal and Regulatory compliance is focused on
USA
• This is NOT legal advice
• Suggestions, but Not Solutions
5
Disruptive Technologies
• Social Media
• Consumerization of IT (BYOD, BYOT, BYOB)
– Bring Your Own
• Devices, Technology
• Disaster, Toys, Botnet
• Cloud Computing
• Mobile
6
Research (Old Way)
7
Research (Today)
8
Social Media
Social Engineering
• Two different concepts
• Both have the adjective “Social”
• Social Media can be used as platform for
Social Engineering
• Social means “Human”
• Largest threat “Human”
• No Brain Patches
9
Threat: Humans
10
Early E-Mail FAIL
11
Separation
12
Discretion
13
Behavior
It has long been accepted that online
behavior differs from the behavior
people would exhibit in the real
world due, largely, to the anonymity
it allows.
14
Digital Gen Z
“With all of the social media outlets out there-
from Facebook and Myspace to Twitter to
Instagram to cell phone texting-kids today are
communicating and challenging each other in
a completely new way, doing and saying things
they wouldn't if they were talking face-to-
face”.
15
Anonymity
16
Anonymity
17
Lack of Common Sense
• Are people getting dumber?
18
Info-Sec Warning
19
The Dark Knight’s Secrets
20
Where You Are
21
What is Social Media?
• One of the key ingredients is:
– User Generated Content
• Earlier Applications
– Collaboration
– Instant Message
– E-Mail
– Forums
22
Social Media Not New
• Prior to Internet
• BBS
• Services
23
Social Media is Big
24
One Stop Shopping
25
Rise of Social Networks
RANK Category
Share of Time
June 2010
Share of Time
June 2009
% Change in
Share of Time
1 Social Networks 22.7% 15.8% 43%
2 Online Games 10.2% 9.3% 10%
3 E-mail 8.3% 11.5% -28%
4 Portals 4.4% 5.5% -19%
5 Instant Messaging 4.0% 4.7% -15%
6 Videos/Movies** 3.9% 3.5% 12%
7 Search 3.5% 3.4% 1%
26
Social Media Uses
• Media – Sharing of Photos, Videos
– Flickr, YouTube
• Networking – Staying Connected
– Linkedin, Facebook, Friendster
• Publishing
– Blogging, Wikis, MicroBlogging
• Commerce
– eBay, Pazap.com, MyStore.com
• Collaboration
– Google Apps
27
To Ban or Not to Ban
• Decision should be based on:
– Risk and Risk Appetite
– Business Need
– Business Culture
– Business Regulatory Requirements
– Other business factors
In the end - It is a business decision
28
What does Block Mean?
29
Blocking Outcome
30
Who is at Risk?
• Each Individual
– Shoot yourself in the foot
• Organizations
– Employee puts organization at risk
– Insider
• Third-Party Observers
– Put target at risk
– Outsider
31
Individual
• Write Blog entry about themselves
– Teacher Loses Job After Commenting About Students,
Parents on Facebook
• Post Picture about themselves
– Drunken Pirate – Student can’t get Teaching License
• Tweet about themselves
– Cisco just offered me a job! Now I have to weigh the
utility of a fatty paycheck against the daily commute
to San Jose and hating the work
32
Drunken Pirate
33
WeinerGate
34
Tweeting
35
Organizations
• Tweet Gives up Location
– IT Consultant tweet’s Osama Bin Laden Raid
• Linkedin
– Company’s Configuration exposed
– Spam attacks with malicious code to linkedin
communities (Spear Phishing)
– Know who is looking for job, ready to jump ship
36
Third-Party Observers
• Drive by paparazzi
– Cop Undone By Photos Of Bikini Girls On Facebook
– Falsely Tagged Facebook Photo Gets Palestinian
Jail Time And Trial
• Rodney King
• Occupy Movements
• Hacktivism
• Facial Recognition
37
Objective
38
Risk Management
• Can’t Assess unless Threats are Known
• Have to keep up with the news
• Social Media Policy has to be customized
39
How to Address Risk
• Avoid
• Mitigate
• Transfer
• Accept
40
Reputation
41
Scarlet Letter
42
Negative Brand
43
I have been burned
• Forums for unsatisfied customers to report
their negative experiences
• If a company is running a scam, it is a good
way to get the word out
44
Information Leakage
• Data Loss
• Piracy and Infringement, IP
• Corporate Espionage
• Reconnaissance
• Organizational Financials
45
VIP Protection
• Also Executive Protection
• Movement sometimes restricted
46
Credential Leakage
• ID Cards for Olympic Village, no special
protection, standard bar codes, tweet your
safety away!
47
Content
• Printed word
• Photographs
• Images
• Music
• Video
• Content imbedded in Content
48
Content Management
• Litigation Lawyers looking for the Smoking
Gun
• Social Media rich in discoverable information
(e-discovery) and the courts are willing to
accept it
49
Public Relations
• Who Speaks for the Corporation?
• 1/3 Employees Disciplined for Inappropriate
comments about company made on personal
social media sites.
50
Content Management
• Permanence
• Stale or Outdated Information
51
Content
Censorship
“Everyone is entitled to his own opinion but not
his own facts” (Daniel Patrick Moynihan)
52
Content Management
• Ownership
• Control
• Moderation
• Forensics
53
Recording & Archiving
• Various regulations require archiving and
retention of communications
• This has included e-mail and instant
messenger
• Social Media is all about communications
• Example: Facebook has a chat feature and e-
mail offering – How do you capture those
communications?
54
Privacy
55
Privacy Issues
• Lack of Awareness
• Trust
• Application (games)
56
Background Checks
• A lot of Information on a lot of sites
• Easily Collected through search engines
• But
– Due Diligence v. Discrimination
– Information not vetted – may not be accurate
– Martin Gaskell – University of Kentucky
• $125K out of court settlement
57
Hiring Practices
• NLRB stepping in and saying FCRA Notice is
required if Social Media used in hiring decision
58
Geotagging
• Wikipedia:
Geotagging (also written as GeoTagging) is the
process of adding geographical identification
metadata to various media such as photographs,
videos, websites, SMS messages, or RSS feeds and
is a form of geospatial metadata
59
Geotagging
• Photo taken inside factory (or outside) with GPS
coordinates, uploaded to social networking
where metadata might not be stripped
• Anyone downloading the photo, and gets
metadata has location also
• Can find out where your secret factory is located
• Photo might be taken by someone you don’t have
control over
60
GPS Tracking
• Each day device collects and stores data of
where the device was located
• GPS devices used in cars can track at intervals
where the device has been. Used in GPS
forensics to get Travel history
• All of a sudden people were surprised that
Apple and Google did the tracking in phones
as well.
61
Facebook Places
• Lets you share where you are
• And you can find out where friends are as well
• Are you at risk because someone knows where
you are?
• Are you at risk because you are not where you
are supposed to be?
• If they know where you are, then they know
where you aren’t – like your house is empty!
• Facebook Timeline – where have you been?
• Is a badge on Foursquare worth your life?
62
Please Rob Me dot Com
63
Legal
64
Regulatory Compliance
• Payment Card Industry (PCI)
• The Health Insurance Portability and Accountability Act
(HIPAA) of 1996
• Securities and Exchange Commission (SEC) Rule 17-a
• Financial Industry Regulatory Authority (FINRA) Notice
10-06 and Notice 07-59
• Sarbanes-Oxley Act
• The Federal Energy Regulatory Commission (FERC)
• The Gramm-Leach-Bliley Act (GLBA)
• 21 CFR Part 11 (FDA)
65
Facebook Pictures
66
More HIPAA
• Nurses Fired Over Cell Phone Photos Of Patient
• Shark Attack Victim Photos Put Hospital
Employees in Hot Water
• Photos taken in ER room of dying man
• Patient-Doctor Facebook “Friends” Could Be A
HIPAA Violation
67
Illegal Activities
• Harassment
– Bullying, Stalking, Sexting, Extortion, Blackmail
• Discrimination
• Unfair Competition
• Criminal Activity (Cybercrime)
• Civil Unrest, Riots, Demonstrations
• Click Fraud
68
Get out of Jail Free Card
• Applies to Social Media Sites, ISP’s and Cloud Computing
Storage Providers
• Copyright Infringement – Digital Millennium Copyright Act
(DCMA)
– Block or remove (Take-downs)
• Third Party Posted Content – Communications Decency Act
– Not responsible for content posted by third party
69
Block Social Media?
• How do you block at the office?
– BYOD (Bring your own device – Consumerization
of IT)
• Cell Phone with Internet
• Tablet with Internet
• How do you block outside of the office?
– Can control company issued assets
– Can’t control personal non-company assets
– Can’t control outsiders
70
Attack Vectors
• Viruses and Malware
• Scams
• Phishing
• Account Hijacking (Evil Twin)
• Shortened URLs
• Password Breaches of SM Sites
• Search Engine Poisoning
• Technology Moves Fast, Crime too Widespread
• Blended Attacks
71
Scams
72
Shortened URL
• URL posted in tweets and also used in other
social networking sites are shortened
• Example: Tinyurl.com, Bit.ly, Cli.gs, Zi.ma
• Some provide tracking services as well
• Shortened URL’s can direct anywhere:
– Porn Sites
– Malware Sites
– Spam Sites
– Phishing sites
73
FB SPAM - Virus
• OMG! Its unbeliveable now you can get to
know who views your facebook profile.. i can
see my top profile visitors and i am so
shocked that my EX is still creeping my profile
every hour. click below
• 21 hours ago via Reviews ·LikeUnlike · · See
Friendship · CLICK 2 SEE YOUR STALKERS
74
Passwords Hacked
• Linkedin – 6M (June 2012)
• Formspring – 420K (July 2012)
• eHarmony – 1.5M (June 2012)
• Yahoo 400K – July 2012
• Phandriod’s AndroidForums 1M – (July 2012)
• Dropbox (Aug 2012)
• Battle.net (Aug 2012) (Blizzard’s multiplayer)
• NVIDIA Developer Forum (July 2013)
• Twitter – 55K (May 2012)
75
Firesheep
• Simple Firefox browser plug-in
• Wireless sniffer to pick up social media
passwords.
76
Operational
77
Operations
• Employee Productivity
• Resource Usage
• Monitoring Costs
78
What is the Solution?
• Assume it can’t be blocked effectively
• The damage may be caused by someone NOT
in the company – a third party outsider
• For the employees, contractors, and
temporary workers – a Social Media Policy,
and Security Awareness Training
• For anyone else – monitoring and surveillance
• Moderation of Publication for SM Posts
79
Data Loss Prevention
• Data Loss (Leak) Prevention can be used to
detect data leaving the site
• Most Web 2.0 data is unstructured
• May provide some protection for company
issued assets, but does not provide protection
for employee owned assets not under the
company’s control
80
What is Needed
• May require software
• May require a service
• Requires Policy!
• Requires Awareness Training!
81
Q&A
82
Contact Info
• E-mail: Robert.Shullich@SystemExperts.com
• Twitter: rshullic
• Related whitepaper:
http://www.sans.org/reading_room/whitepaper
s/privacy/risk-assessment-social-media_33940
83

Contenu connexe

Tendances

8th grade presentation for slideshare
8th grade presentation for slideshare8th grade presentation for slideshare
8th grade presentation for slideshareMarian Merritt
 
Social Zombies: Rise of the Mobile Dead
Social Zombies: Rise of the Mobile DeadSocial Zombies: Rise of the Mobile Dead
Social Zombies: Rise of the Mobile DeadTom Eston
 
The Digital Footprint: An Understanding of What It Means for Kids and Criminals
The Digital Footprint: An Understanding of What It Means for Kids and CriminalsThe Digital Footprint: An Understanding of What It Means for Kids and Criminals
The Digital Footprint: An Understanding of What It Means for Kids and CriminalsCreepSquash
 
Ethics in Social Media: Digital Dilemmas?
Ethics in Social Media: Digital Dilemmas?Ethics in Social Media: Digital Dilemmas?
Ethics in Social Media: Digital Dilemmas?Martin Hirst
 
Marywright 120326114508 Phpapp02 (1)
Marywright 120326114508 Phpapp02 (1)Marywright 120326114508 Phpapp02 (1)
Marywright 120326114508 Phpapp02 (1)J. Kim Scholes
 
#LTEC4121: Presentation of Self Online
#LTEC4121: Presentation of Self Online #LTEC4121: Presentation of Self Online
#LTEC4121: Presentation of Self Online Laura Pasquini
 
How big is your digital footprint fall 2012
How big is your digital footprint fall 2012How big is your digital footprint fall 2012
How big is your digital footprint fall 2012kschermerhorn
 
Social media privacy issues
Social media privacy issuesSocial media privacy issues
Social media privacy issuesNousheen Arshad
 
Social Media and E-Discovery
Social Media and E-DiscoverySocial Media and E-Discovery
Social Media and E-DiscoveryJeremy Richter
 
Cohoes Jan 13 Cyberbullying
Cohoes Jan 13 CyberbullyingCohoes Jan 13 Cyberbullying
Cohoes Jan 13 Cyberbullyingkschermerhorn
 
Professional and Ethical Impact of Using Social Networking in a Professional ...
Professional and Ethical Impact of Using Social Networking in a Professional ...Professional and Ethical Impact of Using Social Networking in a Professional ...
Professional and Ethical Impact of Using Social Networking in a Professional ...Claudia Romeo GurreaNozaleda
 
Legal Implications Of Social Media
Legal Implications Of Social MediaLegal Implications Of Social Media
Legal Implications Of Social MediaDaliahSaper
 
Legal issues of social media 2016
Legal issues of social media 2016Legal issues of social media 2016
Legal issues of social media 2016Brian Huonker
 
Social Media And The Law For Students By Toronto Police Officer Laurie McCan...
Social  Media And The Law For Students By Toronto Police Officer Laurie McCan...Social  Media And The Law For Students By Toronto Police Officer Laurie McCan...
Social Media And The Law For Students By Toronto Police Officer Laurie McCan...Scott Mills
 
Ethics in Social Media
Ethics in Social MediaEthics in Social Media
Ethics in Social MediaJanet Johnson
 
Social Networks And Phishing
Social Networks And PhishingSocial Networks And Phishing
Social Networks And Phishingecarrow
 
Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...Justin Denton
 
2013: The Connected Workplace
2013: The Connected Workplace2013: The Connected Workplace
2013: The Connected Workplacemkeane
 

Tendances (20)

8th grade presentation for slideshare
8th grade presentation for slideshare8th grade presentation for slideshare
8th grade presentation for slideshare
 
Social Zombies: Rise of the Mobile Dead
Social Zombies: Rise of the Mobile DeadSocial Zombies: Rise of the Mobile Dead
Social Zombies: Rise of the Mobile Dead
 
The Digital Footprint: An Understanding of What It Means for Kids and Criminals
The Digital Footprint: An Understanding of What It Means for Kids and CriminalsThe Digital Footprint: An Understanding of What It Means for Kids and Criminals
The Digital Footprint: An Understanding of What It Means for Kids and Criminals
 
Ethics in Social Media: Digital Dilemmas?
Ethics in Social Media: Digital Dilemmas?Ethics in Social Media: Digital Dilemmas?
Ethics in Social Media: Digital Dilemmas?
 
Marywright 120326114508 Phpapp02 (1)
Marywright 120326114508 Phpapp02 (1)Marywright 120326114508 Phpapp02 (1)
Marywright 120326114508 Phpapp02 (1)
 
#LTEC4121: Presentation of Self Online
#LTEC4121: Presentation of Self Online #LTEC4121: Presentation of Self Online
#LTEC4121: Presentation of Self Online
 
How big is your digital footprint fall 2012
How big is your digital footprint fall 2012How big is your digital footprint fall 2012
How big is your digital footprint fall 2012
 
Social media privacy issues
Social media privacy issuesSocial media privacy issues
Social media privacy issues
 
Social Media and E-Discovery
Social Media and E-DiscoverySocial Media and E-Discovery
Social Media and E-Discovery
 
Cohoes Jan 13 Cyberbullying
Cohoes Jan 13 CyberbullyingCohoes Jan 13 Cyberbullying
Cohoes Jan 13 Cyberbullying
 
Professional and Ethical Impact of Using Social Networking in a Professional ...
Professional and Ethical Impact of Using Social Networking in a Professional ...Professional and Ethical Impact of Using Social Networking in a Professional ...
Professional and Ethical Impact of Using Social Networking in a Professional ...
 
Legal Implications Of Social Media
Legal Implications Of Social MediaLegal Implications Of Social Media
Legal Implications Of Social Media
 
Legal issues of social media 2016
Legal issues of social media 2016Legal issues of social media 2016
Legal issues of social media 2016
 
Social mediawebinar2013cosn
Social mediawebinar2013cosnSocial mediawebinar2013cosn
Social mediawebinar2013cosn
 
Social Media And The Law For Students By Toronto Police Officer Laurie McCan...
Social  Media And The Law For Students By Toronto Police Officer Laurie McCan...Social  Media And The Law For Students By Toronto Police Officer Laurie McCan...
Social Media And The Law For Students By Toronto Police Officer Laurie McCan...
 
Ethics in Social Media
Ethics in Social MediaEthics in Social Media
Ethics in Social Media
 
Social Networks And Phishing
Social Networks And PhishingSocial Networks And Phishing
Social Networks And Phishing
 
Chapter 9_dp-pertemuan_14
 Chapter 9_dp-pertemuan_14 Chapter 9_dp-pertemuan_14
Chapter 9_dp-pertemuan_14
 
Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...
 
2013: The Connected Workplace
2013: The Connected Workplace2013: The Connected Workplace
2013: The Connected Workplace
 

Similaire à Risk Assessment of Social Media Use v3.01

A Privacy Framework for Social Machines
A Privacy Framework for Social MachinesA Privacy Framework for Social Machines
A Privacy Framework for Social MachinesUlrik Lyngs
 
Why your digital reputation matters?
Why your digital reputation matters? Why your digital reputation matters?
Why your digital reputation matters? Parakum Pathirana
 
Social engineering The Good and Bad
Social engineering The Good and BadSocial engineering The Good and Bad
Social engineering The Good and BadTzar Umang
 
Conference about Social Engineering (by Wh0s)
Conference about Social Engineering (by Wh0s)Conference about Social Engineering (by Wh0s)
Conference about Social Engineering (by Wh0s)Marta Barrio Marcos
 
CHI 2014 Panel: Opportunities and Risks of Discovering Personality Traits fro...
CHI 2014 Panel: Opportunities and Risks of Discovering Personality Traits fro...CHI 2014 Panel: Opportunities and Risks of Discovering Personality Traits fro...
CHI 2014 Panel: Opportunities and Risks of Discovering Personality Traits fro...Jeffrey Nichols
 
Social Media & Legal Risk
Social Media & Legal Risk Social Media & Legal Risk
Social Media & Legal Risk Endcode_org
 
Online Privacy, the next Battleground
Online Privacy, the next BattlegroundOnline Privacy, the next Battleground
Online Privacy, the next BattlegroundSensePost
 
Privacy and libraries
Privacy and librariesPrivacy and libraries
Privacy and librariesDorothea Salo
 
The State of Social Media (and How to Use It and Not Lose Your Job)
The State of Social Media (and How to Use It and Not Lose Your Job)The State of Social Media (and How to Use It and Not Lose Your Job)
The State of Social Media (and How to Use It and Not Lose Your Job)Andrew Krzmarzick
 
How people should act on the social media
How people should act on the social mediaHow people should act on the social media
How people should act on the social mediastacieisman
 
fissea-conference-2012_srinivasan.pdf
fissea-conference-2012_srinivasan.pdffissea-conference-2012_srinivasan.pdf
fissea-conference-2012_srinivasan.pdfRobin540999
 
Cybersecurity - Thinking like a hacker
Cybersecurity - Thinking like a hackerCybersecurity - Thinking like a hacker
Cybersecurity - Thinking like a hackerFacundo Mauricio
 
How children's fingerprints on the web could mean the end of PII Authenticati...
How children's fingerprints on the web could mean the end of PII Authenticati...How children's fingerprints on the web could mean the end of PII Authenticati...
How children's fingerprints on the web could mean the end of PII Authenticati...Jisc
 
Ethics and IA - seven deadly sins that prevent us from building a better world
Ethics and IA - seven deadly sins that prevent us from building a better worldEthics and IA - seven deadly sins that prevent us from building a better world
Ethics and IA - seven deadly sins that prevent us from building a better worldEric Reiss
 

Similaire à Risk Assessment of Social Media Use v3.01 (20)

Ethics in Cyber Space
Ethics in Cyber SpaceEthics in Cyber Space
Ethics in Cyber Space
 
A Privacy Framework for Social Machines
A Privacy Framework for Social MachinesA Privacy Framework for Social Machines
A Privacy Framework for Social Machines
 
Why your digital reputation matters?
Why your digital reputation matters? Why your digital reputation matters?
Why your digital reputation matters?
 
Social engineering The Good and Bad
Social engineering The Good and BadSocial engineering The Good and Bad
Social engineering The Good and Bad
 
Social media presentation
Social media presentationSocial media presentation
Social media presentation
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Conference about Social Engineering (by Wh0s)
Conference about Social Engineering (by Wh0s)Conference about Social Engineering (by Wh0s)
Conference about Social Engineering (by Wh0s)
 
CHI 2014 Panel: Opportunities and Risks of Discovering Personality Traits fro...
CHI 2014 Panel: Opportunities and Risks of Discovering Personality Traits fro...CHI 2014 Panel: Opportunities and Risks of Discovering Personality Traits fro...
CHI 2014 Panel: Opportunities and Risks of Discovering Personality Traits fro...
 
Do it Best Corp. Techapalooza 2014 Presentation
Do it Best Corp. Techapalooza 2014 PresentationDo it Best Corp. Techapalooza 2014 Presentation
Do it Best Corp. Techapalooza 2014 Presentation
 
Social Media & Legal Risk
Social Media & Legal Risk Social Media & Legal Risk
Social Media & Legal Risk
 
Online Privacy, the next Battleground
Online Privacy, the next BattlegroundOnline Privacy, the next Battleground
Online Privacy, the next Battleground
 
Privacy and libraries
Privacy and librariesPrivacy and libraries
Privacy and libraries
 
The State of Social Media (and How to Use It and Not Lose Your Job)
The State of Social Media (and How to Use It and Not Lose Your Job)The State of Social Media (and How to Use It and Not Lose Your Job)
The State of Social Media (and How to Use It and Not Lose Your Job)
 
How people should act on the social media
How people should act on the social mediaHow people should act on the social media
How people should act on the social media
 
DECEPTICONv2
DECEPTICONv2DECEPTICONv2
DECEPTICONv2
 
fissea-conference-2012_srinivasan.pdf
fissea-conference-2012_srinivasan.pdffissea-conference-2012_srinivasan.pdf
fissea-conference-2012_srinivasan.pdf
 
Social Media in the Workplace
Social Media in the WorkplaceSocial Media in the Workplace
Social Media in the Workplace
 
Cybersecurity - Thinking like a hacker
Cybersecurity - Thinking like a hackerCybersecurity - Thinking like a hacker
Cybersecurity - Thinking like a hacker
 
How children's fingerprints on the web could mean the end of PII Authenticati...
How children's fingerprints on the web could mean the end of PII Authenticati...How children's fingerprints on the web could mean the end of PII Authenticati...
How children's fingerprints on the web could mean the end of PII Authenticati...
 
Ethics and IA - seven deadly sins that prevent us from building a better world
Ethics and IA - seven deadly sins that prevent us from building a better worldEthics and IA - seven deadly sins that prevent us from building a better world
Ethics and IA - seven deadly sins that prevent us from building a better world
 

Dernier

APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtrahman018755
 
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...SUHANI PANDEY
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445ruhi
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Call Girls in Nagpur High Profile
 
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls DubaiDubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubaikojalkojal131
 
VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...
VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...
VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...SUHANI PANDEY
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirtrahman018755
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...Escorts Call Girls
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...tanu pandey
 
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...nilamkumrai
 
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.soniya singh
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)Delhi Call girls
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.soniya singh
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceDelhi Call girls
 
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...SUHANI PANDEY
 
Dubai Call Girls Milky O525547819 Call Girls Dubai Soft Dating
Dubai Call Girls Milky O525547819 Call Girls Dubai Soft DatingDubai Call Girls Milky O525547819 Call Girls Dubai Soft Dating
Dubai Call Girls Milky O525547819 Call Girls Dubai Soft Datingkojalkojal131
 

Dernier (20)

APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
Russian Call Girls in %(+971524965298  )#  Call Girls in DubaiRussian Call Girls in %(+971524965298  )#  Call Girls in Dubai
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
 
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
 
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls DubaiDubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
 
VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...
VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...
VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
 
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
 
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
 
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
 
Dubai Call Girls Milky O525547819 Call Girls Dubai Soft Dating
Dubai Call Girls Milky O525547819 Call Girls Dubai Soft DatingDubai Call Girls Milky O525547819 Call Girls Dubai Soft Dating
Dubai Call Girls Milky O525547819 Call Girls Dubai Soft Dating
 

Risk Assessment of Social Media Use v3.01

  • 1. Risk Assessment of Social Media Use Robert Shullich, CPP, CISSP
  • 2. Agenda • Who Am I • Rules of Engagement • Social Media • Risk • Case Studies • Recommendations • Q&A 2
  • 3. Who Am I • About a year in current job • 8 years in Corporate Security • 16 years at the Stock Exchanges (NYSE/AMEX) • 8 years at a software company • 3+ years in CUNY • IT security for more than 20 years • In IT for 40 years 3
  • 4. Disclaimer • I am not a lawyer, any information presented here is not meant to be legal advice. If you need legal advice, please seek counsel with a qualified and licensed professional who practices law in the subject matter and jurisdiction that applies. • Opinions expressed here are my own, and are not meant to be opinions of ASIS, ISC2, or anyone I work for. 4
  • 5. Rules of Engagement • Pure Risk, Not Opportunist • Chicken Little – The Sky is Falling • Objective is to Protect • No Recommendation on Block v. Allow • Legal and Regulatory compliance is focused on USA • This is NOT legal advice • Suggestions, but Not Solutions 5
  • 6. Disruptive Technologies • Social Media • Consumerization of IT (BYOD, BYOT, BYOB) – Bring Your Own • Devices, Technology • Disaster, Toys, Botnet • Cloud Computing • Mobile 6
  • 9. Social Media Social Engineering • Two different concepts • Both have the adjective “Social” • Social Media can be used as platform for Social Engineering • Social means “Human” • Largest threat “Human” • No Brain Patches 9
  • 14. Behavior It has long been accepted that online behavior differs from the behavior people would exhibit in the real world due, largely, to the anonymity it allows. 14
  • 15. Digital Gen Z “With all of the social media outlets out there- from Facebook and Myspace to Twitter to Instagram to cell phone texting-kids today are communicating and challenging each other in a completely new way, doing and saying things they wouldn't if they were talking face-to- face”. 15
  • 18. Lack of Common Sense • Are people getting dumber? 18
  • 20. The Dark Knight’s Secrets 20
  • 22. What is Social Media? • One of the key ingredients is: – User Generated Content • Earlier Applications – Collaboration – Instant Message – E-Mail – Forums 22
  • 23. Social Media Not New • Prior to Internet • BBS • Services 23
  • 24. Social Media is Big 24
  • 26. Rise of Social Networks RANK Category Share of Time June 2010 Share of Time June 2009 % Change in Share of Time 1 Social Networks 22.7% 15.8% 43% 2 Online Games 10.2% 9.3% 10% 3 E-mail 8.3% 11.5% -28% 4 Portals 4.4% 5.5% -19% 5 Instant Messaging 4.0% 4.7% -15% 6 Videos/Movies** 3.9% 3.5% 12% 7 Search 3.5% 3.4% 1% 26
  • 27. Social Media Uses • Media – Sharing of Photos, Videos – Flickr, YouTube • Networking – Staying Connected – Linkedin, Facebook, Friendster • Publishing – Blogging, Wikis, MicroBlogging • Commerce – eBay, Pazap.com, MyStore.com • Collaboration – Google Apps 27
  • 28. To Ban or Not to Ban • Decision should be based on: – Risk and Risk Appetite – Business Need – Business Culture – Business Regulatory Requirements – Other business factors In the end - It is a business decision 28
  • 29. What does Block Mean? 29
  • 31. Who is at Risk? • Each Individual – Shoot yourself in the foot • Organizations – Employee puts organization at risk – Insider • Third-Party Observers – Put target at risk – Outsider 31
  • 32. Individual • Write Blog entry about themselves – Teacher Loses Job After Commenting About Students, Parents on Facebook • Post Picture about themselves – Drunken Pirate – Student can’t get Teaching License • Tweet about themselves – Cisco just offered me a job! Now I have to weigh the utility of a fatty paycheck against the daily commute to San Jose and hating the work 32
  • 36. Organizations • Tweet Gives up Location – IT Consultant tweet’s Osama Bin Laden Raid • Linkedin – Company’s Configuration exposed – Spam attacks with malicious code to linkedin communities (Spear Phishing) – Know who is looking for job, ready to jump ship 36
  • 37. Third-Party Observers • Drive by paparazzi – Cop Undone By Photos Of Bikini Girls On Facebook – Falsely Tagged Facebook Photo Gets Palestinian Jail Time And Trial • Rodney King • Occupy Movements • Hacktivism • Facial Recognition 37
  • 39. Risk Management • Can’t Assess unless Threats are Known • Have to keep up with the news • Social Media Policy has to be customized 39
  • 40. How to Address Risk • Avoid • Mitigate • Transfer • Accept 40
  • 44. I have been burned • Forums for unsatisfied customers to report their negative experiences • If a company is running a scam, it is a good way to get the word out 44
  • 45. Information Leakage • Data Loss • Piracy and Infringement, IP • Corporate Espionage • Reconnaissance • Organizational Financials 45
  • 46. VIP Protection • Also Executive Protection • Movement sometimes restricted 46
  • 47. Credential Leakage • ID Cards for Olympic Village, no special protection, standard bar codes, tweet your safety away! 47
  • 48. Content • Printed word • Photographs • Images • Music • Video • Content imbedded in Content 48
  • 49. Content Management • Litigation Lawyers looking for the Smoking Gun • Social Media rich in discoverable information (e-discovery) and the courts are willing to accept it 49
  • 50. Public Relations • Who Speaks for the Corporation? • 1/3 Employees Disciplined for Inappropriate comments about company made on personal social media sites. 50
  • 51. Content Management • Permanence • Stale or Outdated Information 51
  • 52. Content Censorship “Everyone is entitled to his own opinion but not his own facts” (Daniel Patrick Moynihan) 52
  • 53. Content Management • Ownership • Control • Moderation • Forensics 53
  • 54. Recording & Archiving • Various regulations require archiving and retention of communications • This has included e-mail and instant messenger • Social Media is all about communications • Example: Facebook has a chat feature and e- mail offering – How do you capture those communications? 54
  • 56. Privacy Issues • Lack of Awareness • Trust • Application (games) 56
  • 57. Background Checks • A lot of Information on a lot of sites • Easily Collected through search engines • But – Due Diligence v. Discrimination – Information not vetted – may not be accurate – Martin Gaskell – University of Kentucky • $125K out of court settlement 57
  • 58. Hiring Practices • NLRB stepping in and saying FCRA Notice is required if Social Media used in hiring decision 58
  • 59. Geotagging • Wikipedia: Geotagging (also written as GeoTagging) is the process of adding geographical identification metadata to various media such as photographs, videos, websites, SMS messages, or RSS feeds and is a form of geospatial metadata 59
  • 60. Geotagging • Photo taken inside factory (or outside) with GPS coordinates, uploaded to social networking where metadata might not be stripped • Anyone downloading the photo, and gets metadata has location also • Can find out where your secret factory is located • Photo might be taken by someone you don’t have control over 60
  • 61. GPS Tracking • Each day device collects and stores data of where the device was located • GPS devices used in cars can track at intervals where the device has been. Used in GPS forensics to get Travel history • All of a sudden people were surprised that Apple and Google did the tracking in phones as well. 61
  • 62. Facebook Places • Lets you share where you are • And you can find out where friends are as well • Are you at risk because someone knows where you are? • Are you at risk because you are not where you are supposed to be? • If they know where you are, then they know where you aren’t – like your house is empty! • Facebook Timeline – where have you been? • Is a badge on Foursquare worth your life? 62
  • 63. Please Rob Me dot Com 63
  • 65. Regulatory Compliance • Payment Card Industry (PCI) • The Health Insurance Portability and Accountability Act (HIPAA) of 1996 • Securities and Exchange Commission (SEC) Rule 17-a • Financial Industry Regulatory Authority (FINRA) Notice 10-06 and Notice 07-59 • Sarbanes-Oxley Act • The Federal Energy Regulatory Commission (FERC) • The Gramm-Leach-Bliley Act (GLBA) • 21 CFR Part 11 (FDA) 65
  • 67. More HIPAA • Nurses Fired Over Cell Phone Photos Of Patient • Shark Attack Victim Photos Put Hospital Employees in Hot Water • Photos taken in ER room of dying man • Patient-Doctor Facebook “Friends” Could Be A HIPAA Violation 67
  • 68. Illegal Activities • Harassment – Bullying, Stalking, Sexting, Extortion, Blackmail • Discrimination • Unfair Competition • Criminal Activity (Cybercrime) • Civil Unrest, Riots, Demonstrations • Click Fraud 68
  • 69. Get out of Jail Free Card • Applies to Social Media Sites, ISP’s and Cloud Computing Storage Providers • Copyright Infringement – Digital Millennium Copyright Act (DCMA) – Block or remove (Take-downs) • Third Party Posted Content – Communications Decency Act – Not responsible for content posted by third party 69
  • 70. Block Social Media? • How do you block at the office? – BYOD (Bring your own device – Consumerization of IT) • Cell Phone with Internet • Tablet with Internet • How do you block outside of the office? – Can control company issued assets – Can’t control personal non-company assets – Can’t control outsiders 70
  • 71. Attack Vectors • Viruses and Malware • Scams • Phishing • Account Hijacking (Evil Twin) • Shortened URLs • Password Breaches of SM Sites • Search Engine Poisoning • Technology Moves Fast, Crime too Widespread • Blended Attacks 71
  • 73. Shortened URL • URL posted in tweets and also used in other social networking sites are shortened • Example: Tinyurl.com, Bit.ly, Cli.gs, Zi.ma • Some provide tracking services as well • Shortened URL’s can direct anywhere: – Porn Sites – Malware Sites – Spam Sites – Phishing sites 73
  • 74. FB SPAM - Virus • OMG! Its unbeliveable now you can get to know who views your facebook profile.. i can see my top profile visitors and i am so shocked that my EX is still creeping my profile every hour. click below • 21 hours ago via Reviews ·LikeUnlike · · See Friendship · CLICK 2 SEE YOUR STALKERS 74
  • 75. Passwords Hacked • Linkedin – 6M (June 2012) • Formspring – 420K (July 2012) • eHarmony – 1.5M (June 2012) • Yahoo 400K – July 2012 • Phandriod’s AndroidForums 1M – (July 2012) • Dropbox (Aug 2012) • Battle.net (Aug 2012) (Blizzard’s multiplayer) • NVIDIA Developer Forum (July 2013) • Twitter – 55K (May 2012) 75
  • 76. Firesheep • Simple Firefox browser plug-in • Wireless sniffer to pick up social media passwords. 76
  • 78. Operations • Employee Productivity • Resource Usage • Monitoring Costs 78
  • 79. What is the Solution? • Assume it can’t be blocked effectively • The damage may be caused by someone NOT in the company – a third party outsider • For the employees, contractors, and temporary workers – a Social Media Policy, and Security Awareness Training • For anyone else – monitoring and surveillance • Moderation of Publication for SM Posts 79
  • 80. Data Loss Prevention • Data Loss (Leak) Prevention can be used to detect data leaving the site • Most Web 2.0 data is unstructured • May provide some protection for company issued assets, but does not provide protection for employee owned assets not under the company’s control 80
  • 81. What is Needed • May require software • May require a service • Requires Policy! • Requires Awareness Training! 81
  • 83. Contact Info • E-mail: Robert.Shullich@SystemExperts.com • Twitter: rshullic • Related whitepaper: http://www.sans.org/reading_room/whitepaper s/privacy/risk-assessment-social-media_33940 83

Notes de l'éditeur

  1. Robert Shullich is a member of the professional staff of SystemExperts Corporation and is a Graduate student in the Forensics Computing program at John Jay College of Criminal Justice (CUNY). He holds a BS and MS in Computer Science from the College of Staten Island (CUNY), MBA from Baruch College (CUNY), and a MS in Telecommunications Networking from NYU/Polytechnic University. He serves on the SANS Advisory Board. With over 40 years in IT including disciplines of Mainframe Operations, Systems Programming, Program Application Development, LAN Administration, Networking, IT Risk Management, Security Architecture and Information Security, he holds many professional computer certifications including: CPP, CISSP, CISSP-ISSMP, CISSP-ISSAP, SSCP, CISA, CISM, CGEIT, CRISC, CEH, CHFI, ECSA, Security+, CASP, CIPP/US, GSEC, GCIH, GCFW, GREM, and GCFA.
  2. These technologies provide new attack vectors to attack the user, the organization, and data. Figure out where you are going. The landscape is very complex and confusing – it is on the innovative edge, and not enough guidance as Social Media is a work in progress.
  3. No patch for the Human The Human becomes the weakest link Social Media becomes a large threat to security, SM ad Mobile are becoming the platform of choice for attacks.
  4. If someone develops personal habits and exhibits certain behavior, will those habits and behavior carry over to the workplace? The boundaries between personal and work life also become blurred as companies make use of social media (originally designed for personal use) for business purposes, and likewise employees access personal sites while at work. A 2011 DLA Piper survey found social media is used for personal and work related activities by 95% of employees. Duty of Care Social media blurs the boundaries between personal and work life. When personal opinions expressed through social media (either on a personal profile or an online forum) refer to a company, it raises an ethical challenge. It is unclear what control, if any, the company has over comments communicated in this way and what action it can/should take.
  5. Well, I guess not always a dog Can’t even trust that the dog is really a dog!
  6. Also , in some cases technology behind the scenes, such as Web 2.0 software and interfaces.
  7. Pazap.com – A student trading site for buying and selling on-campus books with other students. MyStore.com – A social market place for buyers and sellers. MicroBloggin (Twitter)
  8. Drunken Pirate Woman claims teaching degree denied because of single MySpace photo http://www.thesmokinggun.com/documents/crime/college-sued-over-drunken-pirate-sanctions Cisco Fatty Incident What You Post On Twitter Can Cost You The Job: The Cisco Fatty Incident Cisco just offered me a job! Now I have to weigh the utility of a fatty paycheck against the daily commute to San Jose and hating the work. http://www.gradversity.com/what-you-post-on-twitter-can-cost-you-the-job/ Facebook Teacher Loses Job After Commenting About Students, Parents on Facebook http://abcnews.go.com/Technology/facebook-firing-teacher-loses-job-commenting-students-parents/story?id=11437248
  9. Why are this guy’s tweets interesting? Interesting neighbor, 1 AM in the morning a big racket going on at his neighbor’s house (compound). Helicopter hovering above Abbottabad at 1AM (is a rare event). 1 May 2011 12:58pm Go away helicopter - before I take out my giant swatter :-/ 1 May 2011 1:05 pm A huge window shaking bang here in Abbottabad Cantt. I hope its not the start of something nasty :-S 1 May 2011 1:09pm @m0hcin all silent after the blast, but a friend heard it 6 km away too... the helicopter is gone too. 1 May 2011 1:44pm Loose lips sink ships
  10. http://www.allfacebook.com/police-bikini-facebook-2010-09 Cop Undone By Photos Of Bikini Girls On Facebook A word to the wise: If you are a cop, it’s probably not a good idea to allow photos of bikini-clad women draped over your official police vehicle to wind up on Facebook. One police officer in Moncks Corner, South Carolina did that and is now out of a job, according to The State newspaper. The photos were taken at a car wash last Sunday at Rockstar Tattoo Studio on Redbank Road. It’s understood the bikini-clad dancers were from Diamonds North night club in North Charleston Falsely Tagged Facebook Photo Gets Palestinian Jail Time And Trial http://www.allfacebook.com/falsely-tagged-facebook-photo-gets-palestinian-jail-time-and-trial-2011-01 Imagine someone else tagging you in a Facebook photo you don’t even appear in and then getting arrested because of it.  That’s  what  journalist Mamdouh Hamamreh is going through. He was falsely labeled in an image mocking Palestinian President Mahmoud Abbas by superimposing his likeness into a picture of a well-known Syrian soap opera villain. Facebook Tagging Facebook tagging, even in the case where it is a true picture can get you into trouble. Someone may have taken a photo that includes you in the picture, and maybe you are doing something you should not be. What happens if they TAG you? You are linked to the picture, you are identified in the picture. Now, what happens if the tagging becomes automatic, i.e. through Facial Recognition – Tagging on autopilot.
  11. If the Health Department rated a restaurant as a B or even a C, would you still consider eating there? And if you did, would you at least be concerned? Sometimes negative press is to shame someone or a company.
  12. Data loss can include sending of confidential information, leaking trade secrets Piracy – sharing of music, videos, images, ebooks, file lockers Corporate Espionage - stealing information, stealing trade secrets Recon – Getting intelligence to launch an attack Financials – getting insider information for stock manipulation, getting info on M&A, information on contract bidding, client lists, pricing lists, etc
  13. Blog owner controls own blog Can also control and edit any posted comments (moderate) on blog and delete anything they don’t like or agree with.
  14. Using Social Media for background checks require the same notice as if you pulled a credit report.
  15. Supposed it was your bat cave?
  16. Rule 17a-3 -- Records to Be Made by Certain Exchange Members, Brokers and Dealers http://taft.law.uc.edu/CCL/34ActRls/rule17a-3.html Rule 17a-4 -- Records to Be Preserved by Certain Exchange Members, Brokers and Dealers http://taft.law.uc.edu/CCL/34ActRls/rule17a-4.html FINRA Issues Guidance to Firms, Brokers on Communications with Public Through Social Networking Web Sites http://www.finra.org/Newsroom/NewsReleases/2010/P120780 FINRA Provides Guidance Regarding the Review and Supervision of Electronic Communications http://www.finra.org/Industry/Regulation/Notices/2007/P037554
  17. Discrimination – mentioned before, including background checks Unfair competition –hacking your competitor, espionage, posting untrue information about your competitor
  18. The difficulty in Blocking Social Media BYOD aggravates the situation But what about assets not company owned and managed – used outside of the office – outside of the network and outside the physical perimeter?
  19. A notice on the NVIDIA Developer Zone website has reminded users of the importance of ensuring that you do not use the same passwords on multiple websites. Can you trust these social media sites to keep your data safe if they can’t protect their own site.
  20. Productivity works both ways. Social Media can improve productivity, think of collaboration, through e-mail and chat. But a lot of game playing may be unproductive. All of this, plus social media must be monitored. Resource usage may involve machine cycles, internet bandwidth, and when used on mobile, extra cell phone usage charges.