SlideShare uma empresa Scribd logo
1 de 20
Social Networking Security


             How to Manage the Information Security Risks of
           Facebook, Linked In and Other Web Marketing Tools


    “Don’t Leave the Keys to the Kingdom Under the Door Mat”

                                    by

                             Scott Wright
                       The Streetwise Security Coach

                               June 19, 2009
                  Ottawa Carleton Research and Innovation



1
What Kind Of Day Would It Be For You?




2
Social Networking Security Agenda
     When you let another entity control your data

     Important Risks and Tips for users

     Insider Risks to Organizations

     A New Approach to Security Awareness

     Summary

     Questions and Answers




3
When You Are Not In Control Of Your Data
      Prevention of risks is not always possible

      Reaction is the other alternative
       Planned reactions are best!

            ALWAYS KNOW YOUR ASSETS!


                                              REPUTATION



4
Risk #1 - Bogus Profiles
     Over 40% of new Facebook profiles are fake
      To initiate ID Theft and Phishing attacks
      Accepting invitations allows more access to info

     Tip 1: #Strangers –
      Don’t accept invitations from strangers
        Hard to prevent in Twitter unless you block followers (not considered
         sociable)
        Don’t feel obligated to reciprocate with strangers




5
Risk #2 - Too Much Info
     The SN value proposition is information sharing
      “Linked In” - defaults for outsider access is not bad
      “Facebook” - defaults very open
      Twitter - no expectation of privacy anyway

     Try this: go to your Facebook account and search
      for:
      <any company name in your city or area> and
       “Software” or “Technology”
      From the list of results click until you find one that has
       all their profile information visible... there are usually
       many!
      Can lead to guessed passwords or recovery questions


6
Sarah’s Hacker: Just a heartbeat away…




    “…it took seriously 45 mins on wikipedia and google to find the info,
    Birthday? 15 seconds on wikipedia, zip code? well she had always
    been from wasilla, and it only has 2 zip codes (thanks online postal
    service!) the second was somewhat harder, the question was “where
    did you meet your spouse?”


7
Security Tip #2 - #Settings and
                 #Sensitivity
     #Settings –
      Check your profile’s privacy settings
        Facebook – “Friends Only” in “Settings”
          Free guide to privacy settings
        Linked In – check the defaults (Account & Settings)
      #Sensitivity – Remember, Mom may be watching!




8
Risk #3: Deception
     Identity Thieves, Hackers, Corporate Spies

     Which site is likely to be least dangerous?
      http://contest.microsoft.com.cn/windows7.html
      http://tinyurl.com/windowscontest
      http://www.2months-interestfree.com

     They can ALL be dangerous!




     Malware spreads 10 times faster on Social Networks!
9
The Honey Stick Project
      Simulating a
       potentially dangerous
       risk decision
       E.g. Conficker worm

      Over 60% made the
       wrong risk decision
      Over 80% of data
       breaches have
       internal causes
              - Ponemon Institute



10
Security Tip #3 - #Suspicion
      #Suspicion
       Be suspicious of unexpected messages and
        unknown links (or devices!)
         Unexpected changes in patterns, wordings
         Single sources of info
       Get help from security tools: firewalls, antivirus




11
Risk #4 - Account Hijacking / ID Theft
      Poor password practices
        Weak passwords, used everywhere
        “Blending” of business/personal
     Most common passwords (2006 from
     Bruce Schneier):
                                              Best password?
     password1
     abc123                           “dokitty17darling7g7darling7”
     myspace1
     password
     Blink182
     qwerty1


               The more information you have in one account,
          or protected by the same password, the greater the risk!

12
Security Tip #4 - #Separate Accounts
      #Separate accounts for business and personal
       use
       Different passwords for across accounts
       Special characters in the middle of words


           Password Management Programs

           Keepass (www.keepass.info)
           Onepassword (agilewebsolutions.com)




13
Risk #5 - Insider Threats

      HR issues – absence, harassment, hiring

      Abuse of computers and networks for personal use

      Theft of data for “insurance against layoffs”




14
Oh yeah? Prove it…
          Niresh = HR   Kyle = Absentee




15
Security Tip #5 - #Security Standards
      Have #Security standards, policies or rules
         Acceptable use, absenteeism, harrassment,
          recruitment screening, risk management
         “Stupidity is not protected Information”
                                          - Melanie Polowin (Gowlings)

      Communication between execs and IT
       managers

      e.g. Cisco posting policy
      http://blogs.cisco.com/news/comments/ciscos_internet_postings_policy/




16
An Alternative Security Awareness Approach
        For Business Managers
         Leveraging the Internet With Acceptable Risk

        For IT Managers
         Workflow-based Risk Assessment Process

        Beyond lectures
         Interactive workshops engage people!

           Streetwise Security Awareness means using
          collaborative techniques to complement a top-
                     down IT security program


17
For More Help
      Streetwise Security Zone Collaborative Community
       http://www.streetwise-security-zone.com

      Scott is “@streetsec” on Twitter:
       twitter.com/streetsec
       Email scott@streetwise-security-zone.com
       Phone 613-693-0997

      Dalian Enterprises for Security Products and
       Services (Matt Gervais)
       Email mattg@dalian.ca
       Phone 613-234-1995 x390


18
Social Networking Security Summary
      Don’t accept invitations from #Strangers

      Check privacy #Settings and #Sensitivity

      Be #Suspicious of messages and links

      Use #Separate Accounts for business and
       personal, with multiple passwords

      Have #Security Standards Policies or Rules on
       use of Internet

      Think #Risk Management by “#Workflow”


19
The Security Awareness Revolution
      Human risk decisions are becoming much more
       important

      Technology will lag and leave vulnerabilities

      We must educate the people we care about to
       consider the risks, before they have a breach!


             Don’t Leave the Keys to the Kingdom
                     Under the Door Mat!



20

Mais conteúdo relacionado

Mais procurados

Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Programdavidcurriecia
 
Itsa end user 2013
Itsa end user 2013Itsa end user 2013
Itsa end user 2013salleh1n
 
Social Engineering
Social EngineeringSocial Engineering
Social EngineeringAhmed Musaad
 
Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)Michele Chubirka
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness TrainingJen Ruhman
 
Security Awareness Training: Are We Getting Any Better at Organizational and ...
Security Awareness Training: Are We Getting Any Better at Organizational and ...Security Awareness Training: Are We Getting Any Better at Organizational and ...
Security Awareness Training: Are We Getting Any Better at Organizational and ...Enterprise Management Associates
 
Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Moumita Chatterjee
 
Cyber security awareness for students
 Cyber security awareness for students Cyber security awareness for students
Cyber security awareness for studentsAkhil Nadh PC
 
Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingDepartment of Defense
 
Cybersecurity Cyber Usalama
Cybersecurity Cyber UsalamaCybersecurity Cyber Usalama
Cybersecurity Cyber UsalamaMuhammadRadwan10
 
Security Awareness Training from KnowBe4
Security Awareness Training from KnowBe4Security Awareness Training from KnowBe4
Security Awareness Training from KnowBe4Carol Montgomery Adams
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness TrainingJen Ruhman
 
Cybercriminals and security attacks
Cybercriminals and security attacksCybercriminals and security attacks
Cybercriminals and security attacksGFI Software
 
Top Ten Ways to Shockproof Your Use of Social Media (Lightning Talk)
Top Ten Ways to Shockproof Your Use of Social Media (Lightning Talk)Top Ten Ways to Shockproof Your Use of Social Media (Lightning Talk)
Top Ten Ways to Shockproof Your Use of Social Media (Lightning Talk)Ben Woelk, CISSP, CPTC
 
IT Security DOs and DON'Ts
IT Security DOs and DON'Ts IT Security DOs and DON'Ts
IT Security DOs and DON'Ts Sophos
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteAngelito Quiambao
 
Cyber crime awareness
Cyber crime awarenessCyber crime awareness
Cyber crime awarenessArjun Chetry
 

Mais procurados (20)

Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
Itsa end user 2013
Itsa end user 2013Itsa end user 2013
Itsa end user 2013
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
Security Awareness Training: Are We Getting Any Better at Organizational and ...
Security Awareness Training: Are We Getting Any Better at Organizational and ...Security Awareness Training: Are We Getting Any Better at Organizational and ...
Security Awareness Training: Are We Getting Any Better at Organizational and ...
 
Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri Cyber Security For Kids by Shounak Ray Chaudhuri
Cyber Security For Kids by Shounak Ray Chaudhuri
 
Cyber security awareness for students
 Cyber security awareness for students Cyber security awareness for students
Cyber security awareness for students
 
Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness Briefing
 
Cybersecurity Cyber Usalama
Cybersecurity Cyber UsalamaCybersecurity Cyber Usalama
Cybersecurity Cyber Usalama
 
Security Awareness Training from KnowBe4
Security Awareness Training from KnowBe4Security Awareness Training from KnowBe4
Security Awareness Training from KnowBe4
 
Dos and Don'ts of Internet Security
Dos and Don'ts of Internet SecurityDos and Don'ts of Internet Security
Dos and Don'ts of Internet Security
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
Cybercriminals and security attacks
Cybercriminals and security attacksCybercriminals and security attacks
Cybercriminals and security attacks
 
Top Ten Ways to Shockproof Your Use of Social Media (Lightning Talk)
Top Ten Ways to Shockproof Your Use of Social Media (Lightning Talk)Top Ten Ways to Shockproof Your Use of Social Media (Lightning Talk)
Top Ten Ways to Shockproof Your Use of Social Media (Lightning Talk)
 
Cyber safety
Cyber safetyCyber safety
Cyber safety
 
IT Security DOs and DON'Ts
IT Security DOs and DON'Ts IT Security DOs and DON'Ts
IT Security DOs and DON'Ts
 
Online safety, security, ethics & etiquette
Online safety, security, ethics & etiquetteOnline safety, security, ethics & etiquette
Online safety, security, ethics & etiquette
 
Cyber crime awareness
Cyber crime awarenessCyber crime awareness
Cyber crime awareness
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 

Semelhante a Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009

SECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptSECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptCakraWicaksono3
 
SECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptSECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptpixvilx
 
Getting users to care about security
Getting users to care about securityGetting users to care about security
Getting users to care about securityAlison Gianotto
 
Unveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureUnveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureLourdes Paloma Gimenez
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxBarakaMuyengi
 
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about CybersecurityMark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecuritycentralohioissa
 
Pci compliance training agents
Pci compliance training  agentsPci compliance training  agents
Pci compliance training agentsocinc
 
Customer information security awareness training
Customer information security awareness trainingCustomer information security awareness training
Customer information security awareness trainingAbdalrhmanTHassan
 
Slides to the online event "Creating an effective cybersecurity strategy" by ...
Slides to the online event "Creating an effective cybersecurity strategy" by ...Slides to the online event "Creating an effective cybersecurity strategy" by ...
Slides to the online event "Creating an effective cybersecurity strategy" by ...Berezha Security Group
 
CyberSecThreats_R_U_atRisk_Watson
CyberSecThreats_R_U_atRisk_WatsonCyberSecThreats_R_U_atRisk_Watson
CyberSecThreats_R_U_atRisk_WatsonPatricia M Watson
 
Cyber Security - Moving Past "Best Practices"
Cyber Security - Moving Past "Best Practices"Cyber Security - Moving Past "Best Practices"
Cyber Security - Moving Past "Best Practices"Billtrust
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet SecurityAshley Zimmerman
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet SecurityJFashant
 
Cybersecurity for children
Cybersecurity for childrenCybersecurity for children
Cybersecurity for childrenSaurav Jha
 
End user security awareness
End user security awarenessEnd user security awareness
End user security awarenessKanishk Raj
 
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfCybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfSoo Chin Hock
 
BUILDING AWARENESS AND AWARENESS PROGRAM - Vasil Tsvimitidze
BUILDING AWARENESS AND AWARENESS PROGRAM - Vasil TsvimitidzeBUILDING AWARENESS AND AWARENESS PROGRAM - Vasil Tsvimitidze
BUILDING AWARENESS AND AWARENESS PROGRAM - Vasil TsvimitidzeDataExchangeAgency
 

Semelhante a Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009 (20)

SECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptSECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.ppt
 
SECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.pptSECURITY AND SOCIAL ENGINEERING.ppt
SECURITY AND SOCIAL ENGINEERING.ppt
 
Users guide
Users guideUsers guide
Users guide
 
Getting users to care about security
Getting users to care about securityGetting users to care about security
Getting users to care about security
 
Unveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity postureUnveiling the dark web. The importance of your cybersecurity posture
Unveiling the dark web. The importance of your cybersecurity posture
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
 
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about CybersecurityMark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
 
Pci compliance training agents
Pci compliance training  agentsPci compliance training  agents
Pci compliance training agents
 
Customer information security awareness training
Customer information security awareness trainingCustomer information security awareness training
Customer information security awareness training
 
Slides to the online event "Creating an effective cybersecurity strategy" by ...
Slides to the online event "Creating an effective cybersecurity strategy" by ...Slides to the online event "Creating an effective cybersecurity strategy" by ...
Slides to the online event "Creating an effective cybersecurity strategy" by ...
 
Ict lec#9
Ict lec#9Ict lec#9
Ict lec#9
 
CyberSecThreats_R_U_atRisk_Watson
CyberSecThreats_R_U_atRisk_WatsonCyberSecThreats_R_U_atRisk_Watson
CyberSecThreats_R_U_atRisk_Watson
 
Cyber Security - Moving Past "Best Practices"
Cyber Security - Moving Past "Best Practices"Cyber Security - Moving Past "Best Practices"
Cyber Security - Moving Past "Best Practices"
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
 
Computer And Internet Security
Computer And Internet SecurityComputer And Internet Security
Computer And Internet Security
 
Information Security Awareness Session -2020
Information Security Awareness Session -2020Information Security Awareness Session -2020
Information Security Awareness Session -2020
 
Cybersecurity for children
Cybersecurity for childrenCybersecurity for children
Cybersecurity for children
 
End user security awareness
End user security awarenessEnd user security awareness
End user security awareness
 
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfCybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
 
BUILDING AWARENESS AND AWARENESS PROGRAM - Vasil Tsvimitidze
BUILDING AWARENESS AND AWARENESS PROGRAM - Vasil TsvimitidzeBUILDING AWARENESS AND AWARENESS PROGRAM - Vasil Tsvimitidze
BUILDING AWARENESS AND AWARENESS PROGRAM - Vasil Tsvimitidze
 

Último

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 

Último (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

Social Networking Security For OCRI - Scott Wright - Condensed July 9, 2009

  • 1. Social Networking Security How to Manage the Information Security Risks of Facebook, Linked In and Other Web Marketing Tools “Don’t Leave the Keys to the Kingdom Under the Door Mat” by Scott Wright The Streetwise Security Coach June 19, 2009 Ottawa Carleton Research and Innovation 1
  • 2. What Kind Of Day Would It Be For You? 2
  • 3. Social Networking Security Agenda  When you let another entity control your data  Important Risks and Tips for users  Insider Risks to Organizations  A New Approach to Security Awareness  Summary  Questions and Answers 3
  • 4. When You Are Not In Control Of Your Data  Prevention of risks is not always possible  Reaction is the other alternative  Planned reactions are best! ALWAYS KNOW YOUR ASSETS! REPUTATION 4
  • 5. Risk #1 - Bogus Profiles  Over 40% of new Facebook profiles are fake  To initiate ID Theft and Phishing attacks  Accepting invitations allows more access to info  Tip 1: #Strangers –  Don’t accept invitations from strangers  Hard to prevent in Twitter unless you block followers (not considered sociable)  Don’t feel obligated to reciprocate with strangers 5
  • 6. Risk #2 - Too Much Info  The SN value proposition is information sharing  “Linked In” - defaults for outsider access is not bad  “Facebook” - defaults very open  Twitter - no expectation of privacy anyway  Try this: go to your Facebook account and search for:  <any company name in your city or area> and “Software” or “Technology”  From the list of results click until you find one that has all their profile information visible... there are usually many!  Can lead to guessed passwords or recovery questions 6
  • 7. Sarah’s Hacker: Just a heartbeat away… “…it took seriously 45 mins on wikipedia and google to find the info, Birthday? 15 seconds on wikipedia, zip code? well she had always been from wasilla, and it only has 2 zip codes (thanks online postal service!) the second was somewhat harder, the question was “where did you meet your spouse?” 7
  • 8. Security Tip #2 - #Settings and #Sensitivity  #Settings –  Check your profile’s privacy settings  Facebook – “Friends Only” in “Settings”  Free guide to privacy settings  Linked In – check the defaults (Account & Settings)  #Sensitivity – Remember, Mom may be watching! 8
  • 9. Risk #3: Deception  Identity Thieves, Hackers, Corporate Spies  Which site is likely to be least dangerous?  http://contest.microsoft.com.cn/windows7.html  http://tinyurl.com/windowscontest  http://www.2months-interestfree.com They can ALL be dangerous! Malware spreads 10 times faster on Social Networks! 9
  • 10. The Honey Stick Project  Simulating a potentially dangerous risk decision  E.g. Conficker worm  Over 60% made the wrong risk decision  Over 80% of data breaches have internal causes - Ponemon Institute 10
  • 11. Security Tip #3 - #Suspicion  #Suspicion  Be suspicious of unexpected messages and unknown links (or devices!)  Unexpected changes in patterns, wordings  Single sources of info  Get help from security tools: firewalls, antivirus 11
  • 12. Risk #4 - Account Hijacking / ID Theft  Poor password practices  Weak passwords, used everywhere  “Blending” of business/personal Most common passwords (2006 from Bruce Schneier): Best password? password1 abc123 “dokitty17darling7g7darling7” myspace1 password Blink182 qwerty1 The more information you have in one account, or protected by the same password, the greater the risk! 12
  • 13. Security Tip #4 - #Separate Accounts  #Separate accounts for business and personal use  Different passwords for across accounts  Special characters in the middle of words Password Management Programs Keepass (www.keepass.info) Onepassword (agilewebsolutions.com) 13
  • 14. Risk #5 - Insider Threats  HR issues – absence, harassment, hiring  Abuse of computers and networks for personal use  Theft of data for “insurance against layoffs” 14
  • 15. Oh yeah? Prove it… Niresh = HR Kyle = Absentee 15
  • 16. Security Tip #5 - #Security Standards  Have #Security standards, policies or rules  Acceptable use, absenteeism, harrassment, recruitment screening, risk management  “Stupidity is not protected Information” - Melanie Polowin (Gowlings)  Communication between execs and IT managers e.g. Cisco posting policy http://blogs.cisco.com/news/comments/ciscos_internet_postings_policy/ 16
  • 17. An Alternative Security Awareness Approach  For Business Managers  Leveraging the Internet With Acceptable Risk  For IT Managers  Workflow-based Risk Assessment Process  Beyond lectures  Interactive workshops engage people! Streetwise Security Awareness means using collaborative techniques to complement a top- down IT security program 17
  • 18. For More Help  Streetwise Security Zone Collaborative Community  http://www.streetwise-security-zone.com  Scott is “@streetsec” on Twitter: twitter.com/streetsec  Email scott@streetwise-security-zone.com  Phone 613-693-0997  Dalian Enterprises for Security Products and Services (Matt Gervais)  Email mattg@dalian.ca  Phone 613-234-1995 x390 18
  • 19. Social Networking Security Summary  Don’t accept invitations from #Strangers  Check privacy #Settings and #Sensitivity  Be #Suspicious of messages and links  Use #Separate Accounts for business and personal, with multiple passwords  Have #Security Standards Policies or Rules on use of Internet  Think #Risk Management by “#Workflow” 19
  • 20. The Security Awareness Revolution  Human risk decisions are becoming much more important  Technology will lag and leave vulnerabilities  We must educate the people we care about to consider the risks, before they have a breach! Don’t Leave the Keys to the Kingdom Under the Door Mat! 20