facebook security

30
Social Networking Security Milos Stankovic

Upload: presentationsforesl

Post on 17-Jun-2015

195 views

Category:

Documents


2 download

DESCRIPTION

Prezentacija studenta sa Računarskog fakulteta u Beogradu

TRANSCRIPT

Page 1: Facebook security

Social Networking Security

Milos Stankovic

Page 2: Facebook security

Social Networking Security Secure your Social environment.

Facebook, MySpace, My Life, Google +

Privacy and Security Settings Do not leave settings as default

Go through the custom settings 87% of Facebook users have Friends of Friends

set.

Settings change when Facebook changes need to check these as we all know how often Facebook changes

Page 3: Facebook security

Social Networking Security To whom is your information available?

Friends, groups, friends of friends, everyone Applications – privacy policies

What’s available? Where you are and long you will be there

“Checking in” Vacations – I’m going to be away, so I’m

not HOME! Confidential Information Useful for:

ID Theft or answers to your secret questions

Posing as friend

Page 4: Facebook security

Table of Contents

Definition of social networking sites Potential threats Real life examples Related work A proposed model

Page 5: Facebook security

Fig. 1 Fast growing number of patent applications in social network

Page 6: Facebook security

Mimicking in-person interactions Storing large amount of personal

information Violating the principle of least privilege Users inclined to reveal private

info/activities to someone they know

Bringing security issues

Social Network Sites/Services (SNS)continued

Page 7: Facebook security

Security issues from SNS

Accidental data release Intentional use of private data for

marketing purposes Identity theft Worms and viruses And many more

Page 8: Facebook security

A recent famous case:

M16 chief’s wife blows his cover on Facebook

Details on where they liveand work, their friends’ identities

Sir John Sawer on the beachin one of the family photos

Page 9: Facebook security

Another case

US Marines prohibits Twitter, MySpace, Facebook. Effective immediately. (As of Aug 03, 2009 )

Will last a year.

A waiver is possible.

Page 10: Facebook security

Facebook’s new features Facebook: change in geography networks and new privacy features.

Page 11: Facebook security

Facebook Options

Facebook User Facebook Page Facebook Group

Open: All content is public Closed: Limited public content; members

can see all content. Secret: Members and content are

private.

Page 12: Facebook security

Facebook Group Problems

1. Members can add friends Friends could add you to the new group

2. When Facebook group administrators step down, anyone else can take over For small groups, administrators can edit group name or info moderate discussion message group members

Page 13: Facebook security

Are there other risks? “Checking In” shares your current location

on… Foursquare and Facebook Places

Benefits: Discounts and Offers Risks: Confrontations and Break-ins

Page 14: Facebook security

Cyberbullying vs. Traditional Bullying

The perpetrator can be anonymous The size of the audience is enormous The perpetrator has finer access to the

target There are no non-verbal cues (gestures,

tone of voice, etc.) to clarify communication

The perpetrator does not witness the harm directly – no opportunity for empathy

Page 15: Facebook security

Why don’t young people report it?

Adults are incapable of Technology Young people are digital natives while

adults are digital immigrants They expected solution - “just don’t

use the device or site” Misunderstanding the importance of

technology to young people

Page 16: Facebook security

Minimize chances of being a victim

Setting privacy settings carefully Do NOT share passwords Avoid websites that are designed for

malicious Be vigilant Report abuse on websites when it occurs Save “cyber-footprints” Block or de-friend offenders.

Page 17: Facebook security

Facebook – the new background check

Employers are using social networks to screen job applicants – 91%

Screening is done early on Facebook, Twitter, Flickr, YouTube

give employers a personal view of candidates

Social Intelligence Corp., scours the Internet

Page 18: Facebook security

Work that is being done Matthew M. Lucas - flyByNight Encrypts private information separates sensitive data from

Facebook servers and public access Users must install a javascript client The vulnerability of the flyByNight

server is unknown

Page 19: Facebook security

Andrew Besmer - user-to-application policy, in addition to existing user-to-user policy and default application policy

Effectively limits the applications’ access to users private information

Complex, time-consuming settings for applications may impel users to skip applying proper policies

Work that is being done, cont’d

Page 20: Facebook security

Facebook Security

Facebook provides easy tools to help you: Keep track of your activity Keep track of your logins Control the information you share Prove your identity if you ever lose

access to your account

Page 21: Facebook security

Facebook Security Tips

Page 22: Facebook security

A User-Server-Agent Model

USER SERVER

INDEPENDENTINVESTIGATOR (AGENT)

View Audition Log

Report Suspicious Activities

Report Investigation Inve

stig

atio

n

Page 23: Facebook security

Server audits users’ activities Log in time, duration, IP

addresses, access information

Users can view activities related to their own accounts

Agents can view all activitiesof specified accounts

A User-Server-Agent Model

SERVER

Provideslog uponrequest

Audits all access information

Page 24: Facebook security

USER INDEPENDENTINVESTIGATOR (AGENT)

A User-Server-Agent Model

Kevin’s visitBella’s visitSara’s visitMike’s visitDave’s visit

.

.

.

Kevin visits SaraKevin visits MikeKevin visits DaveKevin visits Alice

.

.

.

What a user sees What an agent sees

Page 25: Facebook security

INDEPENDENTINVESTGATOR (AGENT)

ProvidesResults toUser

AcceptsInvestigationRequests

AnalyzeInformationOn server

Step I

Step II

Step III

A User-Server-Agent Model

Page 26: Facebook security

Agent receives decrypted request from user Alice sends request for concern about Kevin’s

activities Agent will see “03tn90a” and “01ad53h” in

stead of “Alice” and “Kevin”, in the request

Agent connects to server, asks for information on account 01ad53h

After decryption server recognizes account name is Kevin

A User-Server-Agent Model

Page 27: Facebook security

What action can an agent perform? Use combined policies to detect unusual

activities: IP address, multiple profiles access in a short term, inactive socializing activities

How can an agent help a user? Simplest: suggest revoking “friend” label of

malicious users Suggest server take action on malicious

accounts Report to authorities when necessary

A User-Server-Agent Model

Page 28: Facebook security

Conclusion

Increasing use of SNS Security/privacy is a big issue User-Server-Agent model

Page 29: Facebook security

Future work

Investigate/watch privacy frequently Other functions will be added

Page 30: Facebook security

Thank you!

Any questions..