Download presentation
Presentation is loading. Please wait.
Published byAlexandrina Payne Modified over 8 years ago
1
Presenters: Robert Martin CISSP Social Media (In)Security
2
Robert Martin, CISSP Welcome and Introductions
3
IT Security Awareness Training Agenda Prevention History of Social Media Reconnaissance Demo Social Media Footprint Q&A 66 55 4 4 3 3 2 2 1 1 Social Media Mistakes
4
History of Social Media – Newborn Years Bulletin Board Systems (BBS) –Offered Central System – 80s and early 90s Download Files or Games Post Message to Others CompuServe –Share files –Access news and events –Send message via “email” America Online (AOL) –internet before the Internet –Searchable communities
5
History of Social Media – Teen Years Classmates.com –Virtual reunion SixDegrees.com –Create Profiles –Invite Friends –Surf others profile
6
History of Social Media – College Years MySpace –Social networking –Strong music emphasis –50.6 active users 2 LinkedIn –World’s largest professional network –364 million members 1 Twitter –Create and share ideas –302 million users 3 –Surf others profile Facebook –1.44 billion monthly active users as of March 31, 2015 4 1- https://press.linkedin.com/about-linkedin 2 - http://expandedramblings.com/index.php/myspace-stats-then-now/ 3 - https://about.twitter.com/company 4 - http://newsroom.fb.com/company-info/
7
So What!
8
What is the weakest link in IT Security?
9
Answer: People
10
3 Tenets of Information Security Confidentiality IntegrityAvailability Remember…CIA!
11
1- mashable.com/2011/06/16/weinergate-social-media-job-loss/#gallery/xx-people-whose-tweets-have-impacted-their jobs/50bddfb731829767ca0003c1 2- http://www.cbsnews.com/news/did-the-internet-kill-privacy/ Connor Riley, March 2009 1 –Connor Riley was offered a job at Cisco when she tweeted “Cisco just offered me a job! Now I have to weigh the utility of a fatty paycheck against the daily commute to San Jose and hating the work.” Cisco employees saw the tweet and suffice to say, Connor Riley never had to worry about that commute. Ashley Payne, August 2009 2 –"He told me that I needed to make a decision before I left, or he was going to go ahead and suspend me," she said. Social Media Footprint What people post online!
12
Scott Bartosiewicz was fired for a simple misunderstanding. He worked as a social media strategist for Chrysler and accidentally tweeted profane language via their account when he meant to do it from his personal account. 1 Could I loose my job? 1 - http://www.viralnova.com/twitter-ruins-careers/
13
Nicole Crowther was an actress who worked on the set of Glee for a period of time before she started tweeting out plot spoilers. When show producers saw what she had done, they tweeted this to her, "Hope you're qualified to do something besides work in entertainment." Then she was fired. 1 What could it hurt? 1 - http://www.viralnova.com/twitter-ruins-careers/
14
Patrick Snay, former headmaster of Guillver Preparatory School lost his discrimination case against the school when his daughter posted the details of the settlement to 1,200 of her Facebook friends. 1 What is the cost of posting online? 1- http://www.dailymail.co.uk/news/article-2569226/Daughters-SUCK-IT-Facebook-boast-costs-ex-headmaster-80000-discrimination-settlement-against-prep-school.html
15
What if a hacker took control of your Social Media accounts? –It should be a concern for you, your family, and your friends Handling Your Social Media Footprint
16
Close accounts you no longer use –Not an easy task –Account may be closed but the records are kept How will those records be used? Prevention Delete Inactive Accounts…
17
What can the world see? –Limit who sees what –Limit how your content is shared Complicated privacy agreements –Remove tagged photos –Limit what can trouble you later in life Prevention Limit what you post…
18
If you posted something questionable…try to delete it Prevention Conceal Questionable Material…
19
Watch your mouth Discipline weighs ounces to regret that weighs tons! –Count to 10 before you post Prevention Watch your digital mouth…
20
1.Unused applications –Uninstall unused application –Older apps may contain vulnerabilities 2.Strong Passphrase –Make those easier to remember 3.Multifactor Authentication –Something you know –Something you have 4.Download from secure site –Free apps sometimes have an extra cost! Prevention Technical controls…
21
See what comes up What does your digital footprint look like? Prevention Search for yourself…
22
Instructor Led Demo
23
Let’s see how much of your information is available openly on the Internet! From your web browser, go to www.google.comwww.google.com In the search bar, type your first and last name inside quotes (ex. “Jennifer Minella”) Click on the “Images” tab – did you find any pictures that you thought were private? –Pictures of yourself, your family members, friends, colleagues? Go back to the “Web” tab – how many results were found? How much can I learn about you from the results? Group Exercise
24
Try some other interesting queries: – confidential filetype:ppt | filetype:xls | filetype:doc –site: administrator –site: inurl:tmp –site: logon A great reference by our friends at the NSA: –643 page document released under the Freedom of Information Act –http://www.nsa.gov/public_info/_files/Untangling_the_Web.pdf Group Exercise
25
Questions
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.