SlideShare uma empresa Scribd logo
1 de 22
Baixar para ler offline
Security Aspects
of Social Networks

          Anchises M. G. De Paula
        Security Intelligence Analyst
                iDefense, VeriSign
                  February 25, 2010
Agenda
 Motivation
 History
 Future of Social
 Networking
 Current Problems
 Security aspects of
 Social Networking




                       Source: XKCD - http://xkcd.com
Why Social Networks?
                                      Country Population (in millions)
 Global and cultural
 phenomenon                   1600
                              1400
                              1200

 Facebook: 400 million        1000
                               800

 users                         600
                               400

   3th largest “country” in    200
                                 0
   the world




                                                              A




                                                                                    il
                                             a
                                        a




                                                        ok




                                                                         sia


                                                                                az
                                     in


                                             di




                                                             US
                                                       bo
                                            In
                                 Ch




                                                                       ne


                                                                               Br
                                                   ce




                                                                    do
                                                  Fa




                                                                  In
 New attack vector for                                            Source: Facebook, CIA


 phishers, fraudsters
 and sexual predators
Why Social Networks?

 New organization:
 “egocentric” approach

 Digital Identities
     Profiles
     Fakesters




                         Source: Google
Why Security?



“It’s the great irony of
      the Information
     Age that the very
     technologies that
      empower us to
    create and to build
       also empower
     those who would
        disrupt and
          destroy”
   (Barack Obama)
                           Source: Whitehouse
History
Demographics
 Dominant social network vary greatly between different geographic
 regions
 Majority of the online connections between real-life friends




                            Source: oxyweb
Future of Social Networking
 Virtual Currency

 Mobile Social
 Networking

 Sensor Networks

 Social TV                    Source: Wired
Current Problems
 Decentralization and Interoperability

 Managing Social Identities

 Trust and Reputation
 Management
Current Problems

 Privacy
   Personal data
   Pictures
   Professional
   information
Current Problems

 Privacy
   Personal data
   Pictures
   Professional information


 Content Overload
Current Problems

 Offense, Hate and Discrimination


 Child Safety and Sexual Crimes
   Defamation
   Stalking
   Cyber bullying
   Sexting
Security aspects of Social
Networking
 Current Security Threats
   Identity/Password Theft
     Fake profiles
     Targeted attacks
Security aspects of Social
Networking
 Current Security Threats
   Malicious Code, Viruses
   and Worms
   Spam, Phishing and
   Financial Fraud




                             Malicious Programs Targeting Social Networking Sites
Security aspects of Social
Networking
 Current Security Threats
   URL Shortening
     Hide malicious sites




                            Source: tweetmeme
Security aspects of Social
Networking
 Social Networks
 under Attack
   Exploit of Social
   Network Gadgets
   Security vulnerabilities
      Cross-site scripting
      (XSS)
      SQL injection
   DDoS
   Worms
      Koobface
Security aspects of Social
Networking
 Malicious Actors
   Individuals
      Spammers and
      phishers
      Fraudsters and cyber
      criminals
      Hacktivists and
      terrorist groups
      Sexual predators
Security aspects of Social
Networking

 Malicious Actors
   Terrorism Using Social
   Networks and Online
   Communities
Security aspects of Social
Networking
 Malicious Actors
   Hacking communities
     Recruitment
     Information exchange
     Marketplace
     Hacker for hire
References
 Data Privacy Day:
 http://dataprivacyday2010.org
 Social Media Security:
 http://socialmediasecurity.com
 http://twitter.com/SocialMediaSec
 SocialNetworkingWatch:
 http://www.socialnetworkingwatch.com
 Security and Privacy in Social Networks Bibliography:
 http://www.cl.cam.ac.uk/~jcb82/sns_bib/main.html
 iDefense: www.idefense.com
Thank you :)



 Anchises M. G. De Paula
   http://anchisesbr.blogspot.com
   Twitter: @anchisesbr
Non-commercial Share Alike (by-nc-sa)

    This work is licensed under the Creative Commons
   Attribution-NonCommercial-ShareAlike 2.5 License.
             To view a copy of this license, visit
http://creativecommons.org/licenses/by-nc-sa/2.5/ or send
  a letter to Creative Commons, 543 Howard Street, 5th
        Floor, San Francisco, California, 94105, USA

Mais conteúdo relacionado

Destaque

Utilizing Social Networks for User Model Priming: User Attitudes
Utilizing Social Networks for User Model Priming: User AttitudesUtilizing Social Networks for User Model Priming: User Attitudes
Utilizing Social Networks for User Model Priming: User Attitudes
Adam Moore
 
Twitter in Disaster Mode: Security Architecture
Twitter in Disaster Mode: Security ArchitectureTwitter in Disaster Mode: Security Architecture
Twitter in Disaster Mode: Security Architecture
Theus Hossmann
 
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
Craig Martin
 

Destaque (18)

Security threats in social networks
Security threats in social networksSecurity threats in social networks
Security threats in social networks
 
Security on social networks AVAST
Security on social networks AVASTSecurity on social networks AVAST
Security on social networks AVAST
 
Utilizing Social Networks for User Model Priming: User Attitudes
Utilizing Social Networks for User Model Priming: User AttitudesUtilizing Social Networks for User Model Priming: User Attitudes
Utilizing Social Networks for User Model Priming: User Attitudes
 
Multiparty Access Control For Online Social Networks : Model and Mechanisms.
Multiparty Access Control For Online Social Networks : Model and Mechanisms.Multiparty Access Control For Online Social Networks : Model and Mechanisms.
Multiparty Access Control For Online Social Networks : Model and Mechanisms.
 
Twitter in Disaster Mode: Security Architecture
Twitter in Disaster Mode: Security ArchitectureTwitter in Disaster Mode: Security Architecture
Twitter in Disaster Mode: Security Architecture
 
QQ Overview
QQ  OverviewQQ  Overview
QQ Overview
 
DETECTION AND RECTIFICATION OF DISTORTED FINGERPRINTS
 DETECTION AND RECTIFICATION OF DISTORTED FINGERPRINTS DETECTION AND RECTIFICATION OF DISTORTED FINGERPRINTS
DETECTION AND RECTIFICATION OF DISTORTED FINGERPRINTS
 
Twitter Search Architecture
Twitter Search Architecture Twitter Search Architecture
Twitter Search Architecture
 
Facebook architecture
Facebook architectureFacebook architecture
Facebook architecture
 
Technology stack of social networks [MTS]
Technology stack of social networks [MTS]Technology stack of social networks [MTS]
Technology stack of social networks [MTS]
 
Mobile application architecture
Mobile application architectureMobile application architecture
Mobile application architecture
 
2 Security Architecture+Design
2 Security Architecture+Design2 Security Architecture+Design
2 Security Architecture+Design
 
TOGAF 9 - Security Architecture Ver1 0
TOGAF 9 -  Security Architecture Ver1 0TOGAF 9 -  Security Architecture Ver1 0
TOGAF 9 - Security Architecture Ver1 0
 
Building Secure Open & Distributed Social Networks
Building Secure Open & Distributed Social NetworksBuilding Secure Open & Distributed Social Networks
Building Secure Open & Distributed Social Networks
 
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
 
Scaling Twitter
Scaling TwitterScaling Twitter
Scaling Twitter
 
Facebook Architecture - Breaking it Open
Facebook Architecture - Breaking it OpenFacebook Architecture - Breaking it Open
Facebook Architecture - Breaking it Open
 
Enterprise Security Architecture
Enterprise Security ArchitectureEnterprise Security Architecture
Enterprise Security Architecture
 

Mais de Anchises Moraes

Hunting bugs - C0r0n4con
Hunting bugs - C0r0n4conHunting bugs - C0r0n4con
Hunting bugs - C0r0n4con
Anchises Moraes
 

Mais de Anchises Moraes (20)

Post pandemics threat scenario
Post pandemics threat scenarioPost pandemics threat scenario
Post pandemics threat scenario
 
Como se proteger na internet
Como se proteger na internetComo se proteger na internet
Como se proteger na internet
 
Fatos, mitos e palpites do cenário de segurança pós-pandemia
Fatos, mitos e palpites do cenário de segurança pós-pandemiaFatos, mitos e palpites do cenário de segurança pós-pandemia
Fatos, mitos e palpites do cenário de segurança pós-pandemia
 
A Case Study of the Capital One Data Breach
A Case Study of the Capital One Data BreachA Case Study of the Capital One Data Breach
A Case Study of the Capital One Data Breach
 
Vamos caçar bugs!?
Vamos caçar bugs!?Vamos caçar bugs!?
Vamos caçar bugs!?
 
Praticas de gestão de segurança
Praticas de gestão de segurançaPraticas de gestão de segurança
Praticas de gestão de segurança
 
Ciber crime e desafios de segurança durante uma pandemia e home office
Ciber crime e desafios de segurança durante uma pandemia e home officeCiber crime e desafios de segurança durante uma pandemia e home office
Ciber crime e desafios de segurança durante uma pandemia e home office
 
Cyber Cultura em tempos de Coronavírus
Cyber Cultura em tempos de CoronavírusCyber Cultura em tempos de Coronavírus
Cyber Cultura em tempos de Coronavírus
 
Hunting bugs - C0r0n4con
Hunting bugs - C0r0n4conHunting bugs - C0r0n4con
Hunting bugs - C0r0n4con
 
Fintechs e os desafios de segurança
Fintechs e os desafios de segurançaFintechs e os desafios de segurança
Fintechs e os desafios de segurança
 
5 passos para a Lei Geral de Proteção de Dados (LGPD) - CryptoRave 2019
5 passos para a Lei Geral de Proteção de Dados (LGPD) - CryptoRave 20195 passos para a Lei Geral de Proteção de Dados (LGPD) - CryptoRave 2019
5 passos para a Lei Geral de Proteção de Dados (LGPD) - CryptoRave 2019
 
Segurança além do Pentest
Segurança além do PentestSegurança além do Pentest
Segurança além do Pentest
 
Só o Pentest não resolve!
Só o Pentest não resolve!Só o Pentest não resolve!
Só o Pentest não resolve!
 
Carreira em Segurança da Informação
Carreira em Segurança da InformaçãoCarreira em Segurança da Informação
Carreira em Segurança da Informação
 
IoT Fofoqueiro
IoT FofoqueiroIoT Fofoqueiro
IoT Fofoqueiro
 
Carta de oposição ao Sindpd 2018
Carta de oposição ao Sindpd 2018Carta de oposição ao Sindpd 2018
Carta de oposição ao Sindpd 2018
 
Segurança na Internet
Segurança na InternetSegurança na Internet
Segurança na Internet
 
Como se tornar um Jedi na área de Segurança
Como se tornar um Jedi na área de SegurançaComo se tornar um Jedi na área de Segurança
Como se tornar um Jedi na área de Segurança
 
Deep Web e Ciber Crime
Deep Web e Ciber CrimeDeep Web e Ciber Crime
Deep Web e Ciber Crime
 
É possível existir segurança para IoT?
É possível existir segurança para IoT?É possível existir segurança para IoT?
É possível existir segurança para IoT?
 

Último

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Último (20)

Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 

Security Aspects of Social Networks at Campus Party 2010

  • 1. Security Aspects of Social Networks Anchises M. G. De Paula Security Intelligence Analyst iDefense, VeriSign February 25, 2010
  • 2. Agenda Motivation History Future of Social Networking Current Problems Security aspects of Social Networking Source: XKCD - http://xkcd.com
  • 3. Why Social Networks? Country Population (in millions) Global and cultural phenomenon 1600 1400 1200 Facebook: 400 million 1000 800 users 600 400 3th largest “country” in 200 0 the world A il a a ok sia az in di US bo In Ch ne Br ce do Fa In New attack vector for Source: Facebook, CIA phishers, fraudsters and sexual predators
  • 4. Why Social Networks? New organization: “egocentric” approach Digital Identities Profiles Fakesters Source: Google
  • 5. Why Security? “It’s the great irony of the Information Age that the very technologies that empower us to create and to build also empower those who would disrupt and destroy” (Barack Obama) Source: Whitehouse
  • 7. Demographics Dominant social network vary greatly between different geographic regions Majority of the online connections between real-life friends Source: oxyweb
  • 8. Future of Social Networking Virtual Currency Mobile Social Networking Sensor Networks Social TV Source: Wired
  • 9. Current Problems Decentralization and Interoperability Managing Social Identities Trust and Reputation Management
  • 10. Current Problems Privacy Personal data Pictures Professional information
  • 11. Current Problems Privacy Personal data Pictures Professional information Content Overload
  • 12. Current Problems Offense, Hate and Discrimination Child Safety and Sexual Crimes Defamation Stalking Cyber bullying Sexting
  • 13. Security aspects of Social Networking Current Security Threats Identity/Password Theft Fake profiles Targeted attacks
  • 14. Security aspects of Social Networking Current Security Threats Malicious Code, Viruses and Worms Spam, Phishing and Financial Fraud Malicious Programs Targeting Social Networking Sites
  • 15. Security aspects of Social Networking Current Security Threats URL Shortening Hide malicious sites Source: tweetmeme
  • 16. Security aspects of Social Networking Social Networks under Attack Exploit of Social Network Gadgets Security vulnerabilities Cross-site scripting (XSS) SQL injection DDoS Worms Koobface
  • 17. Security aspects of Social Networking Malicious Actors Individuals Spammers and phishers Fraudsters and cyber criminals Hacktivists and terrorist groups Sexual predators
  • 18. Security aspects of Social Networking Malicious Actors Terrorism Using Social Networks and Online Communities
  • 19. Security aspects of Social Networking Malicious Actors Hacking communities Recruitment Information exchange Marketplace Hacker for hire
  • 20. References Data Privacy Day: http://dataprivacyday2010.org Social Media Security: http://socialmediasecurity.com http://twitter.com/SocialMediaSec SocialNetworkingWatch: http://www.socialnetworkingwatch.com Security and Privacy in Social Networks Bibliography: http://www.cl.cam.ac.uk/~jcb82/sns_bib/main.html iDefense: www.idefense.com
  • 21. Thank you :) Anchises M. G. De Paula http://anchisesbr.blogspot.com Twitter: @anchisesbr
  • 22. Non-commercial Share Alike (by-nc-sa) This work is licensed under the Creative Commons Attribution-NonCommercial-ShareAlike 2.5 License. To view a copy of this license, visit http://creativecommons.org/licenses/by-nc-sa/2.5/ or send a letter to Creative Commons, 543 Howard Street, 5th Floor, San Francisco, California, 94105, USA