Professional Documents
Culture Documents
Social Network Security Reading
Social Network Security Reading
Based on material from H. Townsend (Kansas State U.), G. Bahadur et al. [1],
NSA, and U.S. Dept. of State.
Outline
Overview of Online Social Networking
Threats and Attacks
Defense Measures
MySpace is a
place for
friends.
MySpace is
Your Space.
MySpace
keeps you
connected.
OSN Popularity
Over 900 million Facebook users worldwide
[6]
Over 150 million in U.S. [5]
Over 450 million access via mobile [6]
300 million pictures uploaded to Facebook daily [6]
Outline
Overview of Online Social Networking
Threats and Attacks
Defense Measures
Malware distribution
Cyber harassment, stalking, etc.
Information shelf life in cyberspace
Privacy issues:
Information about person posted by him/herself, others
Information about people collected by OSNs
Source: [14]
only add,
to your
privacy
settings
orand
(ii) commercialize,
enable a user to in
Post
, including
by
remove, retain,
process,
analyze,
use
any
way now
known or in
the futureadiscovered,
any information
you provide,
or your name,
offering
Share Link
on your website
anddirectly
(b) to use
indirectly to
LinkedIn,
limitedincluding
to any user
generatedor advertising, each
likeness
and including
image forbut
anynot
purpose,
commercial
content, ideas,
concepts,
techniques
or data towith
the the
services,
you Service
submit toor the promotion
of (a)
and (b) on
or in connection
Facebook
LinkedIn, without
consent,
notice
compensation
to at
you
thereof. any
Youfurther
may remove
your
Userand/or
Content
from the Site
anyortime. If you
to any thirdchoose
parties.toAny
information
you
submit the
to us
is at your
ownabove
risk ofwill
remove
your User
Content,
license
granted
loss.
automatically expire, however you acknowledge that the Company may retain
archived copies of your User Content.
URL Shorteners
bit.ly, TinyUrl, ReadThisURL, NotLong
Hides the true destination URL hard to
tell where youre going until you click!
http://www.evil.com/badsite?%20infect
yourpc.html
is now
http://bit.ly/aaI9KV
Source: [17]
Outline
Overview of Online Social Networking
Threats and Attacks
Defense Measures
Extreme cases:
Cease using OSNs, delete accounts
Contact law enforcement re. relentless online harassment
Source: [1],
Table 1.1
Thank You
References (1)
1. G. Bahadur, J. Inasi, and A. de Carvalho, Securing the Clicks: Network Security in the Age of Social
Media, McGraw-Hill, New York, 2012.
2. H. Townsend, 4 Jun. 2010,
http://www.k-state.edu/its/security/training/roundtables/presentations/SIRT_roundtable-RisksofSocia
lNetworking-Jun10.ppt
3. U.S. Dept. of State, Social Networking Cyber Security Awareness Briefing,
http://www.slideshare.net/DepartmentofDefense/social-media-cyber-security-awareness-briefing
4. National Security Agency, Social Networking Sites,
http://www.nsa.gov/ia/_files/factsheets/I73-021R-2009.pdf
5. Consumer Reports, Jun. 2012,
http://www.consumerreports.org/cro/magazine/2012/06/facebook-your-privacy/index.htm
6. S. Sengupta, 14 May 2012,
http://www.nytimes.com/2012/05/15/technology/facebook-needs-to-turn-data-trove-into-investor-go
ld.html?_r=1&pagewanted=all
7. T. Wasserman, 21 Mar. 2012, http://mashable.com/2012/03/21/twitter-has-140-million-users/
8. LinkedIn Corp., 2012, http://press.linkedin.com/about
9. R. Richmond, Web Gang Operating in the Open, 16 Jan. 2012,
https://www.nytimes.com/2012/01/17/technology/koobface-gang-that-used-facebook-to-spread-wormoperates-in-the-open.html?_r=1
References (2)
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.