Social Networking: Risks and realities Nick Barron

Slides:



Advertisements
Similar presentations
E - safety How e-safe are you?.
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Tiffany Phillips CIS What is a Social Networking Website? Social networking websites function like an online community of internet users. Depending.
Developed by Technology Services 1:1 Laptop Initiative
Don’t be bullied, or be a bully.
Protecting children online  How can you protect your child online?  Are you aware of the dangers?  Do you know what you can put in place to protect.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Social Networking Brian Oswald
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
Internet Safety James Fuller Internet Rules To Remember When asked by friends or strangers, online or offline, never share Account IDs and Passwords.
SECURITY AND SOCIAL ENGINEERING US Department of Commerce Office of Security Updated 09/26/11 Security is Everyone's Responsibility – See Something, Say.
How to keep your kids safe online
Lecture 16 Secure Social Networking. Overview What is Social Networking? The Good, the Bad and the Ugly How to protect yourself How to protect your children.
Social Networking and YOU A presentation for the SDC Carey Larson Michael Moss.
Kurt DeMaagd Michigan State University
How To Protect Your Privacy and Avoid Identity Theft Online.
MANAGING YOUR ONLINE PROFILE WHAT DOES THIS MEAN AND WHY SHOULD YOU CARE? Sarah Morris UT Libraries.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
10 Privacy Settings Every Facebook User Should Know.
Safety In CyberSpace. ‘Report Abuse’ in action Look for this link on websites Microsoft have made a real commitment Approx £30,000 per month revenue.
Looking Professional Online. Privacy Measures Facebook allows users to filter visible content Create a second profile for professional use Make personal.
SEARCHING FOR A JOB CCM Mission Station F.I.T. Program 2015.
Creating an Online Professional Presence Using Social Media.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
6.2.1 Computer Applications How the use of technology affects humans GUidelines Slide Show created by Mae Thomas July 2008.
Online Social Networking. Agenda Survey Results What is Online Social Networking? Popular Online Social Networking Sites Privacy Settings for Facebook.
Anti- bullying week Year 4.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
Legal Division CSAA Insurance Group, a AAA Insurer Protecting Your Identity: What to Know, What to Do 2015 Risky Business Week.
Controlling Your Social Networking Privacy Settings Stay safe online!
Parenting in the Internet Age Tips for Keeping Kids Safe and you Connected to your Teen.
 Facebook  Twitter  MySpace  Windows LiveSpace.
Chloe Miles IMPROVING PRODUCTIVITY USING IT. Menu Using Word Advantages Disadvantages Conclusion E-Safety Social Media Dangers of Social Media Sites Staying.
Safe Use of Social Media Cadets – Air Force’s Future.
E-Safety E-safety relates to the education of using new technology responsibly and safely focusing on raising awareness of the core messages of safe content,
 Why is this important to you?  How do digital footprints connect with digital citizenship?  Does everyone have a digital footprint?
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Social Networking Guide Or the web is not a private place.
Online Safety 6th grade. Rules to know Protect your privacy Protect your password Protect the privacy of others Beware of contests, clubs, prizes, & gifts.
Internet Safety Objectives  To be aware of the risks of using the Internet  To use the Internet safely Thursday, October.
Securing Your Facebook Identity Nicholas A. Davis, CISA, CISSP UW-Madison Division of Information Technology 11/10/2015 UNIVERSITY OF WISCONSIN1.
Technology Social Media Unit 1. What is Social Media? Social media is the interaction among people in which they create, share or exchange information.
Social Networking. Freewrite #1 What is Social Networking?
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
Cybersecurity Essentials Lesson 1 Protecting Your Identity ICT Demonstrate an Understanding of Internet Safety and Ethics 3.08 Identify and apply.
PRIVACY BOOTCAMP Jack Vale - Social Media Experiement.
How To Use Social Media to Launch Your Career. The most important social media outlet to be active on is LinkedIn. This site provides valuable tools that.
Awareness raising session for Parents and Carers June Todd Awareness raising session for Parents and Carers June Todd.
Social Networking Practices. Information Security Purpose is to protect your information’s Confidentiality Integrity Availability.
“How do I keep my child safe online?” Miss Johnstone Computing Co-ordinator “Parents / Carers are the one important factor in the home environment to keep.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Internet Safety Sam Farnsworth Utah PTA Technology Specialist
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
Career Readiness Chapter 7 1. In This Chapter You Will: Chapter 7: Career Readiness 2 Learn about how internships, mentoring, part-time work and volunteering.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
This presentation deals with any kind of information you put online. It relates to e- mails, texts, social networking and the sharing of pictures and.
AN INTRODUCTION TO FACEBOOK. Learning Objectives A brief introduction to the social networking site Facebook. Instructions to create an account. How to.
ONLINE DATING SAFETY TIPS EVERY WOMAN SHOULD KNOW AND FOLLOW.
E- SAFETY INFORMATION EVENING 13 July T EACHING E - SAFETY T HINK UK NOW A recommended website for children to look.
Information Guide to Cyber Bullying. Cyber bullying is a relatively new form of bullying which has started happening a lot on social networking sites,
Creating your online identity
Social Media Security: Understanding how to keep yourself safe.
PCS Technology for Staff: Acceptable Use, Privacy, and Safety
Safe Internet Mechatronika Budapest.
Please rate and review on TES.com
Social Media Safety Freshman Seminar.
The Social Networking revolution
Social Media Safety.
Online Safety; Privacy and Sharing
Online Safety; Privacy and Sharing
Presentation transcript:

Social Networking: Risks and realities Nick Barron

2 Who am I? Day job –Employed by Pennant Plc –Head of Group IT, Security controller, software developer Meanwhile... –Freelance security consultant/researcher –SC magazine columnist –IT advisor to DISA Disclaimers –Views expressed are my own, not those of my employer –Don’t try this at work without consent –Check legal aspects

3 What am I talking about? What information can be obtained from online social networks? How can it be (ab)used? What can you do to address the risks Focus on corporate liabilities/risks Mainly about risks of online social networks, but many apply equally to old fashioned ones too!

4 The usual suspects

5 Not just for kids Source: Used with permission

6 How data leaks: users Oversharing Short-temper syndrome Underestimated automation Did you post it online? Probably not private Possibly private

7 How data leaks: hacks

8 How data leaks: loose lips

9

10 How data leaks: apps

11 How data leaks: location

12 Facebook never forgets!

13 Feature creep

14 Risks are real…

15 Risks are real… (2)

16 Risks are real (3)

17 Risks are real (4)

18 Risks are real (5) “All Your Contacts Are Belong to Us” WWW Automatically create fake profiles and request friends Create profiles on other sites

19 Risks are real (6)

20 Who cares?

21 Using the data (1)

22 Using the data (2) Online Privacy Foundation’s “Big 5” experiment –Establish Myers-Briggs characteristics –Linguistic and post statistics analysis –Statistically significant link between FB habits and personality test results (but…) –Twitter: are you a psychopath?! “Augmenting password recovery…” –Use online profiles to help guess passwords –Early days but other research ongoing –What about those password reset questions…?

23 Using the data (3) Facebook analysis to determine Nigerian scammers (PDF) (video)

24 Sanity check Your employees will use Facebook etc –Even if blocked at work –Use takes place outside corporate network perimeter Social network users are not customers, they are product It is not in social network vendors’ commercial interests to make your privacy a priority –Long record of truly awful security –Commercialisation is an incentive for more intrusion

25 Defences

26 Guidance

27 Guidance (2)

28 Countermeasures Education, education, educations –Most users don’t actually want to breach privacy –Usually unaware of how much is available –Better privacy awareness increases personal security as well as business security Used with kind permission of Scott Hampson,

29 Countermeasures (2) Snoop yourself (Google, NodeXL, Maltego etc) Check exposure of key staff Include social networks in scope for penetration tests (but check with ethics/legal departments)

30 Countermeasures (3) Blur data where possible –Your friends will already know most of the useful info –Minimise what goes into profile –Seed a few bogus “facts” –Turn off location features –Check password reset policies But…. –Not having DOB no help when people say “Happy Birthday” on your Facebook wall! –May be breach of terms of service to lie

31 Countermeasures (4) Weed old accounts –FriendsReunited, MySpace etc Compartmentation where possible –Facebook for home stuff –LinkedIn for business –Flickr for pictures –Avoid the use of corporate mail addresses for social networking sites –High value targets should consider use different addresses

32 Countermeasures (5) “Placeholder” profiles on unused systems Look at ‘privacy’ settings –KISS, don’t have too many options –Assume privacy controls will fail, and consider impact –If in doubt, don’t post Used with kind permission of Scott Hampson,

33 Summary Online social networks are not going away any time soon There are real benefits to their use for many staff OSN vendors cannot be trusted to implement strong security Education and defensive monitoring are the best protections The risks apply to non-electronic social networks as well!

34 Links… (Sept 2012, lots of business level info too) for great cartoons! harmonyguy.com nodexl.codeplex.com (free Excel plugin for social network analysis) (industry standard tool for network analysis)

35 Questions?