Social Networking Security Resaerch

19
FCIS’12 27-MAY-12 FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY SECURITY DAY NETWORKS SECURITY SOCIAL TRACK II | GROUP 15 David Farid, Gamal El-Din Magdy, Hanan Yousry, John Samir and Kholoud Abd El-Salam

description

Faculty of Computers and Information Science ( FCIS ) Ain Shams University - Computer Science Department 2012 Security Day .. Inspired from Stefanos Karagos Presentaion - XPLAIN.CO and BARRACUDALABS

Transcript of Social Networking Security Resaerch

Page 1: Social Networking Security Resaerch

FCIS’12

27-MAY-12FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY

SECURITY DAY

NETWORKS SECURITYSOCIAL

TRACK II | GROUP 15David Farid, Gamal El-Din Magdy, Hanan Yousry, John Samir and Kholoud Abd El-Salam

Page 2: Social Networking Security Resaerch

Agenda

27-MAY-12FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY

SOME FACTS

SECURITYASPECTSCHARACTERISTICS

SOCIAL NETWORKS SUCCESS FACTORSSWOT ANALYSISSECURITY BEHAVIOURS (TRENDS)

Page 3: Social Networking Security Resaerch

#Fact 01SOCIAL NETWORKS USAGE

27-MAY-12FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY

LinkedIn

Twitter

Google+

MySpace

References: BARRACUDALABS 2011

Page 4: Social Networking Security Resaerch

#Fact 02IDENTITY VS PHYSICAL HARM

27-MAY-12FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY

References: BARRACUDALABS 2011

Page 5: Social Networking Security Resaerch

#Fact 03INFLUNCING FACTORS WHEN CHOOSING

SOCIAL NETWORKS

27-MAY-12FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY

almost

=

References: BARRACUDALABS 2011

Page 6: Social Networking Security Resaerch

Security Aspects

27-MAY-12FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY

The Way CONNECTIONS ARE MADE TO THE MAIN INTERFACE.

Page 7: Social Networking Security Resaerch

Security Aspects

27-MAY-12FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY

The Way COMMUNICATION IS MANAGED INSIDE AND OUTSIDE

THE COLLABORATIVE APPLICATION.

Page 8: Social Networking Security Resaerch

Security Aspects

27-MAY-12FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY

The Way ADDITIONAL PROCESSES CAN BE ADDED TO THE

SYSTEM ON A SAFE AND EASY FASHION WITHOUT UPSET THE LEVEL OF RELIABILITY AND EFFICIENCY.

Page 9: Social Networking Security Resaerch

Security Characteristics

27-MAY-12FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY

UTHENTICITY

Page 10: Social Networking Security Resaerch

Security Characteristics

SO, SOME OF COLLABORATIVE SYSTEMSCONSIDER THAT BY HAVING PROCEDURES WITH

WHICH IS ABSOLUTELY FALSE;

27-MAY-12FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY

Page 11: Social Networking Security Resaerch

Knowledge Is a Vital fluid

#Rule IN SOCIAL NETWORKS

IT MUST UNDERTAKE ALL THE PROCEDURES THAT ARE NECESSARY FOR

CREATING A SAFETY AND HELPFUL ENVIRONMENT WITHOUT LOWERING

27-MAY-12FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY

UsaAccessibility

Page 12: Social Networking Security Resaerch

Knowledge Is a Vital fluid

#WYSIWYG

SOCIAL NETWORK

PROVIDING:

✔ SAFETY ENVIRONMENT

✔ HELPFUL ENVIRONMENT

✔ Usability

✔ Accessibility

LEADS TO:

27-MAY-12FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY

---------------------------

Page 13: Social Networking Security Resaerch

SWOT ANALAYSIS

27-MAY-12FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY

S W

T

Strengths

AuthenticityEncryptionConfidentiality

Opportunities

World Wide WebMillions of usersWide range of means of publicity

Threats

VirusesHackersNegative publicityO

Weaknesses

Bad qualified personnelImproper networkinfrastructure

Page 14: Social Networking Security Resaerch

Security Behaviors (Trends)

27-MAY-12FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY

BEHAVIORS OR TRENDS SOCIAL NETWORKS TEND TO USE TO SECURE THEIR USERS..

Page 15: Social Networking Security Resaerch

Back End Security Behaviors

27-MAY-12FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY

Case Study - Early of 2011Showed that

- USERS AUTHENTICITY AND THE AUTHENTICATION PROCESS.

- INFORMATION CONFIDENTIALITY.

Page 16: Social Networking Security Resaerch

Back End Security Behaviors

27-MAY-12FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY

Case Study - Early of 2011

- USERS AUTHENTICITY AND THE AUTHENTICATION PROCESS.

- INFORMATION CONFIDENTIALITY.

These processes are implemented through means of OAuth which is an open protocol to allow secure API authorization.

The process of authentication is securely managed by using secure a connection through HTTPS protocol.

Page 17: Social Networking Security Resaerch

Front End Security Behaviors

27-MAY-12FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY

- SECURE BROWSING.- EMAIL / MOBILE

LOGIN NOTIFICATIONS & APPROVALS.

- RECOGNIZIED DEVICES.

Page 18: Social Networking Security Resaerch

Front End Security Behaviors

27-MAY-12FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY

Page 19: Social Networking Security Resaerch

That`s all ..

27-MAY-12FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY

Questions ?THANK YOU !!

TRACK II | GROUP 15David Farid, Gamal El-Din Magdy, Hanan Yousry, John Samir and Kholoud Abd El-Salam