Social Networking Security Resaerch
-
Upload
gamal-el-din-magdy -
Category
Education
-
view
254 -
download
0
description
Transcript of Social Networking Security Resaerch
FCIS’12
27-MAY-12FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY
SECURITY DAY
NETWORKS SECURITYSOCIAL
TRACK II | GROUP 15David Farid, Gamal El-Din Magdy, Hanan Yousry, John Samir and Kholoud Abd El-Salam
Agenda
27-MAY-12FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY
SOME FACTS
SECURITYASPECTSCHARACTERISTICS
SOCIAL NETWORKS SUCCESS FACTORSSWOT ANALYSISSECURITY BEHAVIOURS (TRENDS)
#Fact 01SOCIAL NETWORKS USAGE
27-MAY-12FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY
✔
Google+
MySpace
References: BARRACUDALABS 2011
#Fact 02IDENTITY VS PHYSICAL HARM
27-MAY-12FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY
✔
✔
References: BARRACUDALABS 2011
#Fact 03INFLUNCING FACTORS WHEN CHOOSING
SOCIAL NETWORKS
27-MAY-12FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY
✔
✔
✔
almost
=
References: BARRACUDALABS 2011
Security Aspects
27-MAY-12FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY
The Way CONNECTIONS ARE MADE TO THE MAIN INTERFACE.
Security Aspects
27-MAY-12FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY
The Way COMMUNICATION IS MANAGED INSIDE AND OUTSIDE
THE COLLABORATIVE APPLICATION.
Security Aspects
27-MAY-12FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY
The Way ADDITIONAL PROCESSES CAN BE ADDED TO THE
SYSTEM ON A SAFE AND EASY FASHION WITHOUT UPSET THE LEVEL OF RELIABILITY AND EFFICIENCY.
Security Characteristics
27-MAY-12FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY
UTHENTICITY
Security Characteristics
SO, SOME OF COLLABORATIVE SYSTEMSCONSIDER THAT BY HAVING PROCEDURES WITH
WHICH IS ABSOLUTELY FALSE;
27-MAY-12FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY
Knowledge Is a Vital fluid
#Rule IN SOCIAL NETWORKS
IT MUST UNDERTAKE ALL THE PROCEDURES THAT ARE NECESSARY FOR
CREATING A SAFETY AND HELPFUL ENVIRONMENT WITHOUT LOWERING
27-MAY-12FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY
UsaAccessibility
Knowledge Is a Vital fluid
#WYSIWYG
SOCIAL NETWORK
PROVIDING:
✔ SAFETY ENVIRONMENT
✔ HELPFUL ENVIRONMENT
✔ Usability
✔ Accessibility
✔
LEADS TO:
27-MAY-12FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY
---------------------------
SWOT ANALAYSIS
27-MAY-12FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY
S W
T
Strengths
AuthenticityEncryptionConfidentiality
Opportunities
World Wide WebMillions of usersWide range of means of publicity
Threats
VirusesHackersNegative publicityO
Weaknesses
Bad qualified personnelImproper networkinfrastructure
Security Behaviors (Trends)
27-MAY-12FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY
BEHAVIORS OR TRENDS SOCIAL NETWORKS TEND TO USE TO SECURE THEIR USERS..
Back End Security Behaviors
27-MAY-12FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY
Case Study - Early of 2011Showed that
- USERS AUTHENTICITY AND THE AUTHENTICATION PROCESS.
- INFORMATION CONFIDENTIALITY.
Back End Security Behaviors
27-MAY-12FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY
Case Study - Early of 2011
- USERS AUTHENTICITY AND THE AUTHENTICATION PROCESS.
- INFORMATION CONFIDENTIALITY.
These processes are implemented through means of OAuth which is an open protocol to allow secure API authorization.
The process of authentication is securely managed by using secure a connection through HTTPS protocol.
Front End Security Behaviors
27-MAY-12FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY
- SECURE BROWSING.- EMAIL / MOBILE
LOGIN NOTIFICATIONS & APPROVALS.
- RECOGNIZIED DEVICES.
Front End Security Behaviors
27-MAY-12FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY
That`s all ..
27-MAY-12FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY
Questions ?THANK YOU !!
TRACK II | GROUP 15David Farid, Gamal El-Din Magdy, Hanan Yousry, John Samir and Kholoud Abd El-Salam