SlideShare une entreprise Scribd logo
1  sur  28
Social Media and Security Risks
http://www.isaca.lk/ info@isaca.lk
Parakum Pathirana
Principal Consultant – LOLC Technologies, President – ISACA Sri Lanka Chapter
MSc, FBCS, CISA, CISM, CGEIT, CISSP, ISO 27001 LA, MCP, CHFI, QCS, ITIL, CCSK
Disclaimer
• I’m employed in the #infosec industry, however not
authorized to speak on behalf of my employer/
clients
• Everything I say can be blamed on the voices in
your head
My credentials
• 9+ years in #Infosec field
• Tutor, consultant/ advisor,
auditor, head of InfoSec
• Sectors: financial, leisure,
manufacturing, advertising,
gov, insurance, etc.
• Crazy about #cycling, #infosec,
#socialmedia
• Still learning and not an expert
at anything
• lk.linkedin.com/pub/parakum-
pathirana/2/a52/2a2/
Agenda
• Key facts
• Sri Lanka digital overview
• Security threats
• Case study
• Facebook graph search
• Threats arising from third party applications
• TMI
• Defense
Social Media Jungle !!!
Facebook
Twitter
Key facts
• Facebook has over 1.11 billion monthly active
users, and daily active users passed 665 million 1
• Research suggests that only 14% of consumers
trust advertisements 2
• Social media & Arab spring
• Impact on Sri Lanka Presidential Elections 2015
• Free wi-fi
• Impact on individuals, organizations, etc.
Sri Lanka digital overview
Attribute Sri Lanka Indonesia Malaysia
Total population 21,675,648 251,160,124 29,628,392
Internet users 3,927,948 72,700,000 19,200,408
Internet penetration 18% 29% 65%
Active Facebook accounts 2,000,000 62,000,000 15,600,000
Facebook penetration 9% 25% 53%
Active mobile subscriptions 20,324,070 281,963,665 41,324,700
Mobile subscription penetration 94% 112% 139%
Percentage of mobile subscriptions
that are 3G connections
13% 22% 43%
Number of active mobile broadband
subscriptions
953,000 80,100,000 4,000,000
Mobile broadband subscriptions as a
percentage of the total population
4.4% 32% 14%
Active social media users accessing
social media on a mobile device
1,400,000 52,000,000 13,000,000
Penetration of mobile social as a
percentage of the total population
6.6% 21% 44%
Security threats
• Malware distribution
• Koobface - a worm masquerading as Adobe Flash Player update
• Started in 2009, users were enticed to watch a funny video, then
conned into “updating” Flash
• Koobface connected infected computers to botnet, served
machines ads for fake antivirus software
• Estimated 400,000–800,000 bots in 2010
• Cyber stalking/ harassment
• Privacy concerns
• Impact on employment, reputation, etc.
• Concerns for organizations: brand reputation, laws
and regulations
Security threats
Case Study
Case Study
•Not the first time Sir
John has been left red-
faced over photos posted
on Facebook.
• His wife, Lady Sawers,
put up a picture of Sir
John wearing skimpy
swimming shorts on her
Facebook page last May
when he was appointed
to the MI6 top job.
News Highlights
Facebook Graph Search
Social Networking – Local context
Cricket Sri Lanka
J.P. Morgan
Threats arising from third party applications
• Anyone can write one…No assurance on security
or privacy
• No complete Terms and Conditions – either allow
or deny
• Once installed, developers will have access rights
to look at your profile and overrides your privacy
settings!
TMI
• Lack of common sense: it’s very difficult to delete
information after it’s been posted online
• Indiscreet information can adversely affect college
employment, your personal life, etc.
“Connor Riley: “Cisco just offered me a job! Now I have to weigh
the utility of a [big] paycheck against the daily commute to San
Jose and hating the work.”
• Location services, be careful when you check-in
• URL shortner services
• E.g. bit.ly
How to defend yourself?
• Reasonable “Common sense” measures
• Use strong, unique passwords
• Provide minimal personal information: avoid entering birthdate,
address, etc.
• Review privacy settings, set them to “maximum privacy”
• “Friends of friends” includes far more people than “friends only”
• Exercise discretion about posted material:
• Pictures, videos, etc.
• Opinions on controversial issues
• Anything involving coworkers, bosses, classmates
• Anything related to employer (unless authorized to do so)
• Be wary of third party apps
• Supervise children on social media
How to defend yourself?
• “If it sounds too good to be true, it probably is”
• Use browser security tools for protection:
• Anti-phishing filters (IE, Firefox, Chrome)
• Web of Trust
• AdBlock/NoScript
• Personal reputation management:
• Search for yourself online, look at the results…
• Google Alerts
• Extreme cases:
• Cease using, delete accounts?
• Contact law enforcement
How to defend yourself?
• Combatting url shortners
• Think before you click?
Defense strategy for organizations
• Monitoring & Responding
• Formulating the necessary policy framework
• Awareness
….
Thank you

Contenu connexe

Tendances

Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
MOE515253
 

Tendances (20)

Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Social media & cyber crime
Social media & cyber crimeSocial media & cyber crime
Social media & cyber crime
 
Cyber crime in a Smart Phone & Social Media Obsessed World
Cyber crime in a Smart Phone & Social Media Obsessed WorldCyber crime in a Smart Phone & Social Media Obsessed World
Cyber crime in a Smart Phone & Social Media Obsessed World
 
What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Social Media & Crime
Social Media & CrimeSocial Media & Crime
Social Media & Crime
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Social Media and the Future of Privacy
Social Media and the Future of PrivacySocial Media and the Future of Privacy
Social Media and the Future of Privacy
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
 
Privacy issues in social networking
Privacy issues in social networkingPrivacy issues in social networking
Privacy issues in social networking
 
Difference between Cyber and digital Forensic.pptx
Difference between Cyber and digital Forensic.pptxDifference between Cyber and digital Forensic.pptx
Difference between Cyber and digital Forensic.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Protecting children in cyberspace
Protecting children in cyberspace Protecting children in cyberspace
Protecting children in cyberspace
 
Cybercrime ppt competition
Cybercrime ppt competitionCybercrime ppt competition
Cybercrime ppt competition
 

En vedette

Social media and security essentials.pptx
Social media and security essentials.pptxSocial media and security essentials.pptx
Social media and security essentials.pptx
Pink Elephant
 
Introduction to ICTA - Org Study Presentation
Introduction to ICTA - Org Study Presentation  Introduction to ICTA - Org Study Presentation
Introduction to ICTA - Org Study Presentation
Jackseen Jeyaluck
 
[Challenge:Future] Rallying Youth Against Cyber Crime
[Challenge:Future] Rallying Youth Against Cyber Crime[Challenge:Future] Rallying Youth Against Cyber Crime
[Challenge:Future] Rallying Youth Against Cyber Crime
Challenge:Future
 

En vedette (20)

Social media and security essentials.pptx
Social media and security essentials.pptxSocial media and security essentials.pptx
Social media and security essentials.pptx
 
Social Media From a Security Point Of View - Telenor GoToSec and Telenor Peop...
Social Media From a Security Point Of View - Telenor GoToSec and Telenor Peop...Social Media From a Security Point Of View - Telenor GoToSec and Telenor Peop...
Social Media From a Security Point Of View - Telenor GoToSec and Telenor Peop...
 
Social Media Security Risk Slide Share Version
Social Media Security Risk Slide Share VersionSocial Media Security Risk Slide Share Version
Social Media Security Risk Slide Share Version
 
The Lanka Gate Initiative
The Lanka Gate InitiativeThe Lanka Gate Initiative
The Lanka Gate Initiative
 
The Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian OrganizationsThe Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian Organizations
 
IGF Sri Lanka
IGF Sri LankaIGF Sri Lanka
IGF Sri Lanka
 
HRM RELATED USE OF ICT IN JUDICIARY
HRM RELATED USE OF ICT IN JUDICIARYHRM RELATED USE OF ICT IN JUDICIARY
HRM RELATED USE OF ICT IN JUDICIARY
 
Computer Network Security
Computer Network SecurityComputer Network Security
Computer Network Security
 
ISOC Sri Lanka Way Forward
ISOC Sri Lanka Way ForwardISOC Sri Lanka Way Forward
ISOC Sri Lanka Way Forward
 
ION Sri Lanka - DANE: The Future of TLS
ION Sri Lanka - DANE: The Future of TLSION Sri Lanka - DANE: The Future of TLS
ION Sri Lanka - DANE: The Future of TLS
 
Introduction to ICTA - Org Study Presentation
Introduction to ICTA - Org Study Presentation  Introduction to ICTA - Org Study Presentation
Introduction to ICTA - Org Study Presentation
 
[Challenge:Future] Rallying Youth Against Cyber Crime
[Challenge:Future] Rallying Youth Against Cyber Crime[Challenge:Future] Rallying Youth Against Cyber Crime
[Challenge:Future] Rallying Youth Against Cyber Crime
 
Executive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security StudyExecutive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security Study
 
Intellectual Property in Sri Lanka
Intellectual Property in Sri LankaIntellectual Property in Sri Lanka
Intellectual Property in Sri Lanka
 
Sri Lankan Context for Electronic Commerce
Sri Lankan Context for Electronic CommerceSri Lankan Context for Electronic Commerce
Sri Lankan Context for Electronic Commerce
 
Guide to-social-media--2016
Guide to-social-media--2016Guide to-social-media--2016
Guide to-social-media--2016
 
Intellectual Property, Sri Lanka and Copyrights
Intellectual Property, Sri Lanka and CopyrightsIntellectual Property, Sri Lanka and Copyrights
Intellectual Property, Sri Lanka and Copyrights
 
Ict act in sri lanka
Ict act in sri lankaIct act in sri lanka
Ict act in sri lanka
 
SRI LANKA, CHINA MARITIME INFRASTRUCTURE
SRI LANKA, CHINA MARITIME INFRASTRUCTURESRI LANKA, CHINA MARITIME INFRASTRUCTURE
SRI LANKA, CHINA MARITIME INFRASTRUCTURE
 
2016 Scalar Security Study Roadshow
2016 Scalar Security Study Roadshow2016 Scalar Security Study Roadshow
2016 Scalar Security Study Roadshow
 

Similaire à Social media and Security risks

Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525
chadolivard
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
Sadaf Walliyani
 

Similaire à Social media and Security risks (20)

Cyber security
Cyber security Cyber security
Cyber security
 
Infocom Security
Infocom SecurityInfocom Security
Infocom Security
 
Security beyond compliance
Security beyond complianceSecurity beyond compliance
Security beyond compliance
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
Social Networks - The Good and the Bad
Social Networks - The Good and the BadSocial Networks - The Good and the Bad
Social Networks - The Good and the Bad
 
Managing Your Digital Footprint - 2012 National BDPA Conference Presentation
Managing Your Digital Footprint - 2012 National BDPA Conference PresentationManaging Your Digital Footprint - 2012 National BDPA Conference Presentation
Managing Your Digital Footprint - 2012 National BDPA Conference Presentation
 
Interop 2011 las vegas - session se31 - rothke
Interop 2011   las vegas - session se31 - rothkeInterop 2011   las vegas - session se31 - rothke
Interop 2011 las vegas - session se31 - rothke
 
NENA 2017 Doxing and Social Engineering
NENA 2017 Doxing and Social EngineeringNENA 2017 Doxing and Social Engineering
NENA 2017 Doxing and Social Engineering
 
2019 FRSecure CISSP Mentor Program: Class One
2019 FRSecure CISSP Mentor Program: Class One2019 FRSecure CISSP Mentor Program: Class One
2019 FRSecure CISSP Mentor Program: Class One
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Digital citizenship pp
Digital citizenship ppDigital citizenship pp
Digital citizenship pp
 
[r]evolution Digital Literacy Workshop Slides
[r]evolution Digital Literacy Workshop Slides[r]evolution Digital Literacy Workshop Slides
[r]evolution Digital Literacy Workshop Slides
 
Building a professional digital identity
Building a professional digital identityBuilding a professional digital identity
Building a professional digital identity
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awareness
 
Faculty presentation 21 st december 2015
Faculty presentation 21 st december 2015Faculty presentation 21 st december 2015
Faculty presentation 21 st december 2015
 
SocialSafe for SMEs/SMBs - V1
SocialSafe for SMEs/SMBs - V1SocialSafe for SMEs/SMBs - V1
SocialSafe for SMEs/SMBs - V1
 
Breakfast Briefings - February 2018
Breakfast Briefings - February 2018Breakfast Briefings - February 2018
Breakfast Briefings - February 2018
 
Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525Chad olivard internet safety powerpoint presentation itc 525
Chad olivard internet safety powerpoint presentation itc 525
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
 
Click or Not to Click (Cyber Security Awareness )
Click or Not to Click (Cyber Security Awareness )Click or Not to Click (Cyber Security Awareness )
Click or Not to Click (Cyber Security Awareness )
 

Plus de Parakum Pathirana

Plus de Parakum Pathirana (10)

Cyber Threat Landscape - A Local Perspective
Cyber Threat Landscape - A Local PerspectiveCyber Threat Landscape - A Local Perspective
Cyber Threat Landscape - A Local Perspective
 
Unplug Yourself
Unplug YourselfUnplug Yourself
Unplug Yourself
 
Why your digital reputation matters?
Why your digital reputation matters? Why your digital reputation matters?
Why your digital reputation matters?
 
IoT Adoption
IoT AdoptionIoT Adoption
IoT Adoption
 
Social Media Adoption among the Banking Sector in Sri Lanka: Paper presented ...
Social Media Adoption among the Banking Sector in Sri Lanka: Paper presented ...Social Media Adoption among the Banking Sector in Sri Lanka: Paper presented ...
Social Media Adoption among the Banking Sector in Sri Lanka: Paper presented ...
 
Social Media Governance
Social Media GovernanceSocial Media Governance
Social Media Governance
 
Disruptive Technologies
Disruptive TechnologiesDisruptive Technologies
Disruptive Technologies
 
Software Standards
Software StandardsSoftware Standards
Software Standards
 
Social media & the Financial Sector
Social media & the Financial SectorSocial media & the Financial Sector
Social media & the Financial Sector
 
digital tattoo
digital tattoodigital tattoo
digital tattoo
 

Dernier

Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
ZurliaSoop
 
Sociocosmos empowers you to go trendy on social media with a few clicks..pdf
Sociocosmos empowers you to go trendy on social media with a few clicks..pdfSociocosmos empowers you to go trendy on social media with a few clicks..pdf
Sociocosmos empowers you to go trendy on social media with a few clicks..pdf
SocioCosmos
 
Panjim Goa Escort Girls ✿✸ 9971646499 ₢♚ Call Girls Panjim Goa Direct Cash O...
Panjim Goa Escort Girls ✿✸ 9971646499  ₢♚ Call Girls Panjim Goa Direct Cash O...Panjim Goa Escort Girls ✿✸ 9971646499  ₢♚ Call Girls Panjim Goa Direct Cash O...
Panjim Goa Escort Girls ✿✸ 9971646499 ₢♚ Call Girls Panjim Goa Direct Cash O...
ritikaroy0888
 
Call Girls in Chattarpur (delhi) call me [9953056974] escort service 24X7
Call Girls in Chattarpur (delhi) call me [9953056974] escort service 24X7Call Girls in Chattarpur (delhi) call me [9953056974] escort service 24X7
Call Girls in Chattarpur (delhi) call me [9953056974] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Dernier (20)

Vellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Vellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceVellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Vellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
 
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
 
Unlock the power of Instagram with SocioCosmos. Start your journey towards so...
Unlock the power of Instagram with SocioCosmos. Start your journey towards so...Unlock the power of Instagram with SocioCosmos. Start your journey towards so...
Unlock the power of Instagram with SocioCosmos. Start your journey towards so...
 
VIP Call Girls Morena 9332606886 Free Home Delivery 5500 Only
VIP Call Girls Morena 9332606886 Free Home Delivery 5500 OnlyVIP Call Girls Morena 9332606886 Free Home Delivery 5500 Only
VIP Call Girls Morena 9332606886 Free Home Delivery 5500 Only
 
Marketing Plan - Social Media. The Sparks Foundation
Marketing Plan -  Social Media. The Sparks FoundationMarketing Plan -  Social Media. The Sparks Foundation
Marketing Plan - Social Media. The Sparks Foundation
 
Film show pre-production powerpoint for site
Film show pre-production powerpoint for siteFilm show pre-production powerpoint for site
Film show pre-production powerpoint for site
 
Film show post-production powerpoint for site
Film show post-production powerpoint for siteFilm show post-production powerpoint for site
Film show post-production powerpoint for site
 
The Butterfly Effect
The Butterfly EffectThe Butterfly Effect
The Butterfly Effect
 
Busty Desi⚡Call Girls in Sector 49 Noida Escorts >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Sector 49 Noida Escorts >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Sector 49 Noida Escorts >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Sector 49 Noida Escorts >༒8448380779 Escort Service
 
Film show evaluation powerpoint for site
Film show evaluation powerpoint for siteFilm show evaluation powerpoint for site
Film show evaluation powerpoint for site
 
College & House wife Call Girls in Paharganj 9634446618 -Best Escort call gi...
College & House wife  Call Girls in Paharganj 9634446618 -Best Escort call gi...College & House wife  Call Girls in Paharganj 9634446618 -Best Escort call gi...
College & House wife Call Girls in Paharganj 9634446618 -Best Escort call gi...
 
Film show production powerpoint for site
Film show production powerpoint for siteFilm show production powerpoint for site
Film show production powerpoint for site
 
Sociocosmos empowers you to go trendy on social media with a few clicks..pdf
Sociocosmos empowers you to go trendy on social media with a few clicks..pdfSociocosmos empowers you to go trendy on social media with a few clicks..pdf
Sociocosmos empowers you to go trendy on social media with a few clicks..pdf
 
SEO Expert in USA - 5 Ways to Improve Your Local Ranking - Macaw Digital.pdf
SEO Expert in USA - 5 Ways to Improve Your Local Ranking - Macaw Digital.pdfSEO Expert in USA - 5 Ways to Improve Your Local Ranking - Macaw Digital.pdf
SEO Expert in USA - 5 Ways to Improve Your Local Ranking - Macaw Digital.pdf
 
Panjim Goa Escort Girls ✿✸ 9971646499 ₢♚ Call Girls Panjim Goa Direct Cash O...
Panjim Goa Escort Girls ✿✸ 9971646499  ₢♚ Call Girls Panjim Goa Direct Cash O...Panjim Goa Escort Girls ✿✸ 9971646499  ₢♚ Call Girls Panjim Goa Direct Cash O...
Panjim Goa Escort Girls ✿✸ 9971646499 ₢♚ Call Girls Panjim Goa Direct Cash O...
 
Capstone slide deck on the TikTok revolution
Capstone slide deck on the TikTok revolutionCapstone slide deck on the TikTok revolution
Capstone slide deck on the TikTok revolution
 
Hire↠Young Call Girls in Hari Nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esco...
Hire↠Young Call Girls in Hari Nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esco...Hire↠Young Call Girls in Hari Nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esco...
Hire↠Young Call Girls in Hari Nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esco...
 
BVG BEACH CLEANING PROJECTS- ORISSA , ANDAMAN, PORT BLAIR
BVG BEACH CLEANING PROJECTS- ORISSA , ANDAMAN, PORT BLAIRBVG BEACH CLEANING PROJECTS- ORISSA , ANDAMAN, PORT BLAIR
BVG BEACH CLEANING PROJECTS- ORISSA , ANDAMAN, PORT BLAIR
 
Pondicherry Call Girls Book Now 8617697112 Top Class Pondicherry Escort Servi...
Pondicherry Call Girls Book Now 8617697112 Top Class Pondicherry Escort Servi...Pondicherry Call Girls Book Now 8617697112 Top Class Pondicherry Escort Servi...
Pondicherry Call Girls Book Now 8617697112 Top Class Pondicherry Escort Servi...
 
Call Girls in Chattarpur (delhi) call me [9953056974] escort service 24X7
Call Girls in Chattarpur (delhi) call me [9953056974] escort service 24X7Call Girls in Chattarpur (delhi) call me [9953056974] escort service 24X7
Call Girls in Chattarpur (delhi) call me [9953056974] escort service 24X7
 

Social media and Security risks

  • 1. Social Media and Security Risks http://www.isaca.lk/ info@isaca.lk Parakum Pathirana Principal Consultant – LOLC Technologies, President – ISACA Sri Lanka Chapter MSc, FBCS, CISA, CISM, CGEIT, CISSP, ISO 27001 LA, MCP, CHFI, QCS, ITIL, CCSK
  • 2. Disclaimer • I’m employed in the #infosec industry, however not authorized to speak on behalf of my employer/ clients • Everything I say can be blamed on the voices in your head
  • 3. My credentials • 9+ years in #Infosec field • Tutor, consultant/ advisor, auditor, head of InfoSec • Sectors: financial, leisure, manufacturing, advertising, gov, insurance, etc. • Crazy about #cycling, #infosec, #socialmedia • Still learning and not an expert at anything • lk.linkedin.com/pub/parakum- pathirana/2/a52/2a2/
  • 4. Agenda • Key facts • Sri Lanka digital overview • Security threats • Case study • Facebook graph search • Threats arising from third party applications • TMI • Defense
  • 8. Key facts • Facebook has over 1.11 billion monthly active users, and daily active users passed 665 million 1 • Research suggests that only 14% of consumers trust advertisements 2 • Social media & Arab spring • Impact on Sri Lanka Presidential Elections 2015 • Free wi-fi • Impact on individuals, organizations, etc.
  • 9. Sri Lanka digital overview Attribute Sri Lanka Indonesia Malaysia Total population 21,675,648 251,160,124 29,628,392 Internet users 3,927,948 72,700,000 19,200,408 Internet penetration 18% 29% 65% Active Facebook accounts 2,000,000 62,000,000 15,600,000 Facebook penetration 9% 25% 53% Active mobile subscriptions 20,324,070 281,963,665 41,324,700 Mobile subscription penetration 94% 112% 139% Percentage of mobile subscriptions that are 3G connections 13% 22% 43% Number of active mobile broadband subscriptions 953,000 80,100,000 4,000,000 Mobile broadband subscriptions as a percentage of the total population 4.4% 32% 14% Active social media users accessing social media on a mobile device 1,400,000 52,000,000 13,000,000 Penetration of mobile social as a percentage of the total population 6.6% 21% 44%
  • 10. Security threats • Malware distribution • Koobface - a worm masquerading as Adobe Flash Player update • Started in 2009, users were enticed to watch a funny video, then conned into “updating” Flash • Koobface connected infected computers to botnet, served machines ads for fake antivirus software • Estimated 400,000–800,000 bots in 2010 • Cyber stalking/ harassment • Privacy concerns • Impact on employment, reputation, etc. • Concerns for organizations: brand reputation, laws and regulations
  • 13. Case Study •Not the first time Sir John has been left red- faced over photos posted on Facebook. • His wife, Lady Sawers, put up a picture of Sir John wearing skimpy swimming shorts on her Facebook page last May when he was appointed to the MI6 top job.
  • 15.
  • 17. Social Networking – Local context
  • 20. Threats arising from third party applications • Anyone can write one…No assurance on security or privacy • No complete Terms and Conditions – either allow or deny • Once installed, developers will have access rights to look at your profile and overrides your privacy settings!
  • 21. TMI • Lack of common sense: it’s very difficult to delete information after it’s been posted online • Indiscreet information can adversely affect college employment, your personal life, etc. “Connor Riley: “Cisco just offered me a job! Now I have to weigh the utility of a [big] paycheck against the daily commute to San Jose and hating the work.” • Location services, be careful when you check-in • URL shortner services • E.g. bit.ly
  • 22. How to defend yourself? • Reasonable “Common sense” measures • Use strong, unique passwords • Provide minimal personal information: avoid entering birthdate, address, etc. • Review privacy settings, set them to “maximum privacy” • “Friends of friends” includes far more people than “friends only” • Exercise discretion about posted material: • Pictures, videos, etc. • Opinions on controversial issues • Anything involving coworkers, bosses, classmates • Anything related to employer (unless authorized to do so) • Be wary of third party apps • Supervise children on social media
  • 23. How to defend yourself? • “If it sounds too good to be true, it probably is” • Use browser security tools for protection: • Anti-phishing filters (IE, Firefox, Chrome) • Web of Trust • AdBlock/NoScript • Personal reputation management: • Search for yourself online, look at the results… • Google Alerts • Extreme cases: • Cease using, delete accounts? • Contact law enforcement
  • 24. How to defend yourself? • Combatting url shortners • Think before you click?
  • 25. Defense strategy for organizations • Monitoring & Responding • Formulating the necessary policy framework • Awareness
  • 26.
  • 27. ….

Notes de l'éditeur

  1. PR Newswire. (2013, May 1) Facebook Reports First Quarter 2013 Results. Retrieved August 15th, 2013, from http://www.prnewswire.com/news-releases/205652631.html. Qualman, E. (2012) Digital Leader. McGraw-Hill Gunawardene, N. (2015) Was #PresPollSL 2015 Sri Lanka’s first Cyber Election?, accessed on 13th January 2015, available at http://groundviews.org/2015/01/13/was-prespollsl-2015-sri-lankas-first-cyber-election/
  2. We are Social's 2014 Asia-Pacific Digital Overview (2014). Retrieved March18th, 2014, from http://www.slideshare.net/wearesocialsg/social-digital-mobile-in-apac
  3. Alexa Dell posing with her father 2012: dell spends 2.7million/ year on family security The Twitter account of Michael Dell’s daughter has been closed with speculation blaming the teen’s habit of carelessly broadcasting her family’s movements, including that of her father, in a way that undermined security