Session # 52 Social Media: Manage the Security to Manage Your Experience Ross C. Hughes, U.S. Department of Education.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Surfing the net: Ways to protect yourself. Internet Safety Look into safeguarding programs or options your online service provider might offer. Look into.
How to protect yourself, your computer, and others on the internet
Thank you to IT Training at Indiana University Computer Malware.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
7 Effective Habits when using the Internet Philip O’Kane 1.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
INTERNET SAFETY FOR EVERYONE A QUICK AND EASY CRASH COURSE.
What is identity theft, and how can you protect yourself from it?
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Social media threats. Warning! May contain mild peril.
Facebook Security and Privacy Issues Brian Allen Network Security Analyst Washington University December 2, 2010 Alumni House.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
INTERNET SAFETY FOR EVERYONE
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Teach a man (person) to Phish Recognizing scams, spams and other personal security attacks July 17 th, 2013 High Tea at IT, Summer, 2013.
Scams Stevie's Scam School videos
Identity-Theft is the fastest growing crime in America; 9.9 MILLION victims were reported last year, according to a Federal Trade Commission survey!
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Notes to Teachers At the time we embedded the links in these lessons, they all worked. If they don’t, you can google the website, find the link, open it.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
Threats to I.T Internet security By Cameron Mundy.
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
Protecting Information. Who We Are We are working on our Information Assurance MBA This is part of our curriculum; to present on information security.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Protecting Yourself Online (Information Assurance)
Social Media Attacks By Laura Jung. How the Attacks Start Popularity of these sites with millions of users makes them perfect places for cyber attacks.
Staying Safe Online Keep your Information Secure.
You, Me & Technology. Overview Technology –Our relationship with technology Threats –What, Who, When, Where, Why & How Protection –What we can do to protect.
IT security By Tilly Gerlack.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
What is social networking? 1.Social networking is the grouping of individuals into specific groups 2.networking is possible in person, for example in.
Internet Security & Safety. What makes up the internet? Protecting and securing your password Protecting your identity What is social networking? Benefits.
 Facebook  Twitter  MySpace  Windows LiveSpace.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
 Two types of malware propagating through social networks, Cross Site Scripting (XSS) and Koobface worm.  How these two types of malware are propagated.
Pitfalls and Mistakes. Agenda Who We Are Social Media Today Pitfalls and Mistakes –Policies –Poor Decisions Online Reputation Accepting Random People.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
What is Spam? d min.
Digital Citizen Project By: Frances Murphey Technology and Education.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Session # 52 Social Media: Manage the Security to Manage Your Experience Ross C. Hughes, U.S. Department of Education.
INTRODUCTION & QUESTIONS.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
A Quick and Easy Crash Course Internet Safety for Everyone.
The internet is a place of both useful and bad information. It has both good and bad side- and it’s all too easy for kids to stray into it. And no parents/guardian.
Managing Money Workshop The National Autistic Society AGM
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Computer Security Keeping you and your computer safe in the digital world.
Avoiding Frauds and Scams Barbara Martin-Worley Director, Consumer Fraud Protection 18 th Judicial District Attorney’s Office Serving Arapahoe, Douglas,
Safety.
INTERNET SAFETY FOR EVERYONE
An Introduction to Phishing and Viruses
Social Media Attacks.
Digital Citizenship Middle School
Internet Safety for Everyone
Internet Safety for Everyone
Computer Security.
ICT Communications Lesson 3: Internet Life and Privacy
Session # 52 Social Media: Manage the Security to Manage Your Experience Ross C. Hughes, U.S. Department of Education.
Internet Safety – Social Media
Internet Safety for Everyone
Internet Safety for Everyone
Internet Safety for Everyone
Internet Safety for Everyone
Presentation transcript:

Session # 52 Social Media: Manage the Security to Manage Your Experience Ross C. Hughes, U.S. Department of Education

2

What’s Out There 3

Social Media – Key Features Social Networking and Web 2.0 Member of an online community Key features are “Profiles” and “Friend lists” The most commonly used is still Facebook 2009 saw the rapid emergence of Twitter A lot of “Trust” going on It is a marketer’s dream 4

Let’s Crunch Some Numbers 5

Welcome to the Perfect Storm In 2009, Facebook announced they had surpassed 300M users. Twitter claims 100M registered users Almost 68% of all Internet traffic is social media or search Facebook is the 4 th largest website in the world having grown 157% between 2008 and 2009 – 1,928% in the US alone Social media marketing will grow from $714M in 2009 to $3.1B by 2014* Attacks on social media sites is up 240% from phishing attacks alone * Forrester Research 6

Attacks Are On The Rise Spam, phishing and malware attacks through social media are growing: 70% rise in firms encountering spam and malware attacks via social networks in 2009 ‒ Over 50% received spam via social networks ‒ Over 33% received malware via social networks Organizations that have been victims of attack through social networking sites Source: Sophos survey

And They Are Getting Worse Computer worm - a self-replicating malware computer program. It uses a computer network to send copies of itself to other nodes (computers on the network) and it may do so without any user intervention –Blaster (Aug 2003): Infected 55,000 users in the first 24 hours –Code Red (Jul 2001): Infected 359,000 users in the first 24 hours –Samy (Oct 2005): Infected 1,000,000 MySpace users in the first 24 hours 8

What Else is Out There Almost three quarters of Twitter's 100M accounts are unused or responsible for delivering malicious links Easy to use hacker program (Firesheep) that steals Facebook information A glitch allows mobile Facebook users to log into other users’ accounts Twitter worm that posts obscene messages to victims' Twitter feeds A Twitter flaw allows messages to pop-up and websites to open in your browser just by moving your mouse over a link 9

Being Number 1 – Not So Good Over 50,000 web pages hosting malware are discovered EVERY DAY It’s a global problem, with the US at the top of the list for the number of infected web pages Top 10 countries hosting malware on the web 10

A Look at the Real World 11

Scareware Tweets Scareware is fake anti-virus – instead of protecting your computer it infects it Scammers create multiple tweets that direct you to a scareware page. They then try to frighten you into believing you have a security problem and need their software to address it Other scareware attacks aim to: – Take control of your computer to send spam – Hold your computer to ransom Result: Malware infection 12

Facebook Privacy Flub July 2009: The wife of the chief of the British secret service MI6 posted highly revealing details on her Facebook page Her privacy settings meant anyone in the "London" network could view her updates – up to 200 million people Information revealed included – Family details – Personal photos – Location of their home Result: National security risk 13

Fake Tweet to Malware A Tweet was posted by Guy Kawasaki, an Apple Mac evangelist with 140,000 followers Leighton Meester sex tape video free download! Following the link hops you to websites offering to show you a video of the Gossip Girl star, but doesn’t The websites can tell if you are using a Mac or PC … and serves up appropriate malware Result: Malware infection 14

Fake Link to Malware 15 WHAT.pif botnet Malicious Links on popular Facebook pages Infected 257,000 accounts Could have been worst – Justin Timberlake has 2.1M friends Result: Malware infection

Fake Facebook Steals the Goods Ronald Noble, Interpol’s Secretary General, has revealed that cybercriminals have opened two fake Facebook accounts using his name and used them to gather sensitive information –Obtain information on fugitives targeted during the recent Operation Infra Red –Bringing investigators from 29 member countries to exchange information on international fugitives that would lead to more than 130 arrests in 32 countries 16

You Just Lost Control Here's a message seen spreading across Facebook Clicking on the link takes you to what poses as a Fox News TV report Once it has your permission, a rogue application will be able send you s, access your friend lists, gather your personal information, and post messages to your wall Result: Compromised account 17

Information Risks users publishing information social media attacks 18

Reveal sensitive information Defamation of others / organizations This can be inadvertent or deliberate And the repercussions include – Reputation damage – Damage to organization – Fines Users Publishing Information 19

Hackers and Script Kiddies Hobbies/showing off Financially-motivated organized crime Motivations Are Changing 20

Social media accounts are valuable to hackers They can use them to send spam, spread malware, steal identities... … in the quest to acquire personal information for financial gain Social Media Attacks 21

Data = $$$ Steal your money directly Sell your data Trick your friends and family into supplying personal data Sell your identity Use your accounts to spread spam, malware and more data theft scams Sell your organization's data or sensitive information Blackmail individuals and organizations 22

How the Threats Work Spam Phishing Malware 23

Social Media Spam 24 Unsolicited s

Social Media Spam 25 Click on the link and you don’t get your Victoria Secret Card But you do get to visit this guy

Social Media Spam 26 Instead of a job with Google, you may get conned out of $$

Social Media Spam 27 Compromised Facebook account. Victim is now promoting a shady pharmaceutical

of social media users report being hit by spam via these services 57% 70.6% That’s an increase of from a year ago Social Media Spam 28

Social Media Phishing 29 Trying to trick people into revealing sensitive information

Social Media Phishing 30 Trawling the web, trying to hook unwitting victims Click the link and where do you go?

Social Media Phishing 31 To: T V V I T T E R.com Now they will have your username and password

Social Media Phishing 32 Another fake site

Social Media Phishing 33 You followed the link, but no immediate fun follows. Instead, you first had to follow what has become a usual procedure for this kind of scam: "like" the page, share the link, complete a survey. You just earned some money for the scammers, since they are paid for every filled out questionnaire. You have also practically recommended it to your friends, some of which will go on to perpetuate the scam circle.

of social media users report phishing attacks via these sites 30% 42.9% That’s an increase of from a year ago Social Media Phishing 34

Social Media Malware 35 Malicious software, including viruses, trojans, worms and other threats

Social Media Malware 36 Clicking on the links takes you to sites that will infect your computer with malware

Social Media Malware 37 Clicking gets you more than a video

Social Media Malware 38 Clicking gets you a funny image + Koobface malware

Social Media Malware 39 Koobface is very sophisticated malware. It can create bogus accounts, verify them via Gmail, randomly choose friends and post messages to their walls… pointing (typically) to a malicious video page

What Now! (Scared Yet?) 40

KNOW THE RULES - check your organization’s policy on social media USE SECURE PASSWORDS - minimum 14 characters including non- letters CHECK THE DEFAULT SETTINGS - don’t provide personal information by default BE PICTURE PRUDENT - think before posting images that might cause embarrassment BEWARE OF BIG BROTHER - assume everyone can read your posts, including hackers SECURE YOUR COMPUTERS - use up-to-date security software and firewalls THINK BEFORE YOU CLICK - if the looks dodgy, it probably is STRANGER DANGER - beware of unsolicited invitations from spammers Top Tips for Staying Secure 41

Education is the Key QUOTABLE "I think this level of awareness and communication needs to start in elementary school, because I'd like to say everyone is armed today. Everyone you see has a cell phone and a cell phone has an IP address, and every device with an IP address is a point of entry or intrusion into our network because we are so well-connected and we communicate so well to each other so therefore we need to start this education as early as possible." Zal Azmi, former FBI Chief Information Officer 42

Helpful Links Links: –Federal Trade Commission –Microsoft Security –Sophos - –"Own Your Space--Keep Yourself and Your Stuff Safe Online" Digital Book for Teens by Linda McCarthy 28-ef a649-0fd34bd19d ef a649-0fd34bd19d13 –Consumer Reports computers/resource-center/cyber-insecurity/cyber-insecurity-hub.htmhttp:// computers/resource-center/cyber-insecurity/cyber-insecurity-hub.htm –StaySafeOnline.org 43

References This Presentation was brought to you by: –Sophos ThreatBeaters Social Media Toolkit –“Seven Deadliest Social Network Attacks” by Cart Timm and Richard Perez –“Social Networking Spaces” by Todd Kelsey –“Web 2.0 Architectures” by Governor, Hinchcliffe, and Nickull –Department of Homeland Security Daily Cyber Security Report –Defense Information Systems Agency Security Awareness Course –Secure Computing News Wire and other security on-line magazines 44

Summary The risks from social media are real - for you and for your organization Financially-motivated criminals are increasingly using social media sites to steal identities, spread malware and send spam Social networks are getting better at protecting users against these threats – but there’s a long way to go The onus is on YOU to use social media sites safely Don’t stop using social media … just make sure you use it safely! 45

Contact Information We appreciate your feedback and comments. We can be reached at: Phone: Fax: