Faculty of Computers and Information Science ( FCIS ) Ain Shams University - Computer Science Department 2012 Security Day .. Inspired from Stefanos Karagos Presentaion - XPLAIN.CO and BARRACUDALABS
3. #Fact 01
SOCIAL NETWORKS USAGE
LinkedIn
Twitter
✔ Google+
MySpace
References: BARRACUDALABS 2011
FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY 27-MAY-12
4. #Fact 02
IDENTITY VS PHYSICAL HARM
✔
✔
References: BARRACUDALABS 2011
FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY 27-MAY-12
5. #Fact 03
INFLUNCING FACTORS WHEN CHOOSING
SOCIAL NETWORKS
=
almost
✔
✔
✔
References: BARRACUDALABS 2011
FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY 27-MAY-12
6. Security Aspects
The Way
CONNECTIONS ARE MADE TO THE MAIN INTERFACE.
FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY 27-MAY-12
7. Security Aspects
The Way
COMMUNICATION IS MANAGED INSIDE AND OUTSIDE
THE COLLABORATIVE APPLICATION.
FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY 27-MAY-12
8. Security Aspects
The Way
ADDITIONAL PROCESSES CAN BE ADDED TO THE
SYSTEM ON A SAFE AND EASY FASHION WITHOUT
UPSET THE LEVEL OF RELIABILITY AND EFFICIENCY.
FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY 27-MAY-12
10. Security Characteristics
SO, SOME OF COLLABORATIVE SYSTEMS
CONSIDER THAT BY HAVING PROCEDURES WITH
WHICH IS ABSOLUTELY FALSE;
FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY 27-MAY-12
11. Knowledge Is a Vital fluid
#Rule IN SOCIAL NETWORKS
IT MUST UNDERTAKE ALL THE PROCEDURES THAT ARE NECESSARY FOR
CREATING A SAFETY AND HELPFUL ENVIRONMENT WITHOUT LOWERING
Usa
bility
Accessi
FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY 27-MAY-12
12. Knowledge Is a Vital fluid
#WYSIWYG
SOCIAL NETWORK
---------------------------
PROVIDING:
✔ SAFETY ENVIRONMENT
✔ HELPFUL ENVIRONMENT
✔ Usability
✔ Accessibility
✔
LEADS TO:
FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY 27-MAY-12
13. SWOT ANALAYSIS
Strengths Weaknesses
S W
Authenticity Bad qualified personnel
Encryption Improper network
Confidentiality infrastructure
Opportunities Threats
O T
World Wide Web
Viruses
Millions of users
Hackers
Wide range of means
Negative publicity
of publicity
FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY 27-MAY-12
14. Security Behaviors (Trends)
BEHAVIORS OR TRENDS SOCIAL
NETWORKS TEND TO USE TO
SECURE THEIR USERS..
FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY 27-MAY-12
15. Back End Security Behaviors
Case Study - Early of 2011
Showed that
- USERS AUTHENTICITY
AND THE
AUTHENTICATION
PROCESS.
- INFORMATION
CONFIDENTIALITY.
FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY 27-MAY-12
16. Back End Security Behaviors
Case Study - Early of 2011
- USERS AUTHENTICITY
These processes are implemented
through means of OAuth which is AND THE
an open protocol to allow secure AUTHENTICATION
API authorization.
PROCESS.
The process of authentication is
securely managed by using secure - INFORMATION
a connection through HTTPS CONFIDENTIALITY.
protocol.
FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY 27-MAY-12
17. Front End Security Behaviors
- SECURE BROWSING.
- EMAIL / MOBILE
LOGIN NOTIFICATIONS
& APPROVALS.
- RECOGNIZIED
DEVICES.
FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY 27-MAY-12
18. Front End Security Behaviors
FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY 27-MAY-12
19. That`s all ..
Questions ?
THANK YOU !!
TRACK II | GROUP 15
David Farid, Gamal El-Din Magdy, Hanan Yousry, John Samir and Kholoud Abd El-Salam
FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY 27-MAY-12