social networking security workshop
DESCRIPTION
Social Networking Security Workshop (Facebook and Twitter)TRANSCRIPT
![Page 1: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/1.jpg)
www.acisonline.net/snscon2010
A. Prathan Phongthiproek A. Sharkrit Piyavanich
SNS M3-0
![Page 2: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/2.jpg)
www.acisonline.net/snscon2010 2
ACIS Professional
Ce
Aug-18-10
RSS feed
Example of Social Network
![Page 3: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/3.jpg)
www.acisonline.net/snscon2010
เว็บไซต ์Social Network ที่ได้รับความนิยมสูงสุด 10 อันดับ
3
Social Networking Security Conference 2010
![Page 4: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/4.jpg)
www.acisonline.net/snscon2010
Social Network Phishing Attack Statistic
ACIS Professional Center
![Page 5: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/5.jpg)
www.acisonline.net/snscon2010
Hi5 Phishing Attack
ACIS Professional Center
http://www.hi5.vs
![Page 6: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/6.jpg)
www.acisonline.net/snscon2010
Facebook Phishing Attack ACIS Professional Center
![Page 7: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/7.jpg)
www.acisonline.net/snscon2010
Social Network Worm (Koobface)
ACIS Professional Center
Effect various social network site: Facebook Hi5 MySpace Bebo Tagged Friendster Fubar LiveJournal myYearbook Netlog
![Page 8: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/8.jpg)
www.acisonline.net/snscon2010
Koobface Attack Step: 1
ACIS Professional Center
![Page 9: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/9.jpg)
www.acisonline.net/snscon2010
Koobface Attack Step: 2
ACIS Professional Center
เว็บไซต์ที่แฮกเกอร์เตรียมไว้ เพื่อหลอกล่อให้เหยื่อติดตั้ง Adobe Flash Player
![Page 10: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/10.jpg)
www.acisonline.net/snscon2010
Koobface Attack Step: 3
ACIS Professional Center
ตัวอย่างข้อความที่ส่งออกไปยังสมาชิกคนอื่นๆ หลังจากที่เหยื่อติด Worm Koobface
See The Others in “Social Networking Security Live Show”
![Page 11: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/11.jpg)
www.acisonline.net/snscon2010
Short Descriptions To Gen-Y
11
Social Networking Security Conference 2010
Pop Culture Own All Gadgets
Working with PC Eminem/ Britney Fans
Harry Potter Series Social Networking
![Page 12: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/12.jpg)
www.acisonline.net/snscon2010
Gen-Y Behaviors
Continually connected
Speak their own language
Skeptical of authority
Influenced by peers
Seek recognition and fame
Enjoy absurdity and off humor
Embrace subcultures
Skim text and information quickly
Easily bored
Expressive and digitally creative
![Page 13: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/13.jpg)
www.acisonline.net/snscon2010
Percentage of staff using their PC for personal reasons
0 10 20 30 40 50 60 70 80 90
Email Websites Banking/ Personal Finance
Social Networking
Percentage
Social Networking Security Conference 2010
13
![Page 14: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/14.jpg)
www.acisonline.net/snscon2010
How do the Gen Y bypass enterprise control to visit social networking?
Social Networking Security Conference 2010
14
See Full Version in “Social Networking Security Live Show”
Hack Tools Gen Y
![Page 15: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/15.jpg)
www.acisonline.net/snscon2010
SNS M7-3
![Page 16: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/16.jpg)
www.acisonline.net/snscon2010
What is "Good Sites Gone Bad"?
The web’s greatest accomplishments have become its biggest threats. Compromised sites, user-generated content and social networks challenge traditional domain-based trust mechanisms.
The growth of the web has outpaced traditional URL filters.
Web applications bypass legacy file-based anti-virus engines.
Search engine optimization and trending topics are used by attackers to increase their attack performance.
Social Networking Security Conference 2010
16
![Page 17: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/17.jpg)
www.acisonline.net/snscon2010
Facebook Clickjacking
Social Networking Security Conference 2010
17
![Page 18: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/18.jpg)
www.acisonline.net/snscon2010
Facebook Clickjacking
Social Networking Security Conference 2010
18
![Page 19: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/19.jpg)
www.acisonline.net/snscon2010
Twitter Clickjacking
Social Networking Security Conference 2010
19
![Page 20: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/20.jpg)
www.acisonline.net/snscon2010
Cross Site Scripting Attack on Twitter
Social Networking Security Conference 2010
20
![Page 21: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/21.jpg)
www.acisonline.net/snscon2010
Cross Site Scripting Attack on Facebook
Social Networking Security Conference 2010
21
![Page 22: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/22.jpg)
www.acisonline.net/snscon2010
Cross Site Scripting Attack on Hi5
Social Networking Security Conference 2010
22
![Page 23: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/23.jpg)
www.acisonline.net/snscon2010
Cross Site Scripting Attack on YouTube
Social Networking Security Conference 2010
23
![Page 24: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/24.jpg)
www.acisonline.net/snscon2010
Twitter Phishing – www.tvvitter.com
Social Networking Security Conference 2010
24
![Page 25: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/25.jpg)
www.acisonline.net/snscon2010
Website URL Shortener
Social Networking Security Conference 2010
25
![Page 26: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/26.jpg)
www.acisonline.net/snscon2010
Simple URL Shortener – bit.ly
Social Networking Security Conference 2010
26
![Page 27: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/27.jpg)
www.acisonline.net/snscon2010
Simple URL Shorten on Twitter
Social Networking Security Conference 2010
27
![Page 28: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/28.jpg)
www.acisonline.net/snscon2010
Twitter Attack via URL Shortener
Social Networking Security Conference 2010
28
![Page 29: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/29.jpg)
www.acisonline.net/snscon2010
Twitter Attack with Drive-By-Download
Social Networking Security Conference 2010
29
![Page 30: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/30.jpg)
www.acisonline.net/snscon2010
Drive by Download – Java Applet
Social Networking Security Conference 2010
30
![Page 31: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/31.jpg)
www.acisonline.net/snscon2010
Drive by download-attack
Social Networking Security Conference 2010
31
Victim
(4) Download exploit
(1) Client visit the landing page
(2) Redirect to get exploit
(3) Redirect to get exploit
![Page 32: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/32.jpg)
www.acisonline.net/snscon2010
Threats from Bad sites
Social Networking Security Conference 2010
32
Spyware
Viruses
Worms
Trojans
Potentially unwanted applications
Adware
Unwanted/offensive content
Phishing
![Page 33: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/33.jpg)
www.acisonline.net/snscon2010
How to Protect yourself from Bad sites
Windows Patch, Browser, Macromedia, Acrobat Update
Use a desktop browser that includes anti-phishing and
anti-malware blockers. Microsoft’s Internet Explorer,
Mozilla Firefox, and Opera all provide security features to block
malicious sites.
Enable a firewall and apply all Microsoft operating system
updates. Avoid using pirated software
Social Networking Security Conference 2010
33
![Page 34: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/34.jpg)
www.acisonline.net/snscon2010
SNS M8-1
![Page 35: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/35.jpg)
www.acisonline.net/snscon2010
Cross Site Scripting (XSS) Attack
Social Networking Security Conference 2010
35
![Page 36: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/36.jpg)
www.acisonline.net/snscon2010
Firefox – Noscript Add-ons
Social Networking Security Conference 2010
36
![Page 37: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/37.jpg)
www.acisonline.net/snscon2010
Noscript-Prevent XSS and Malicious web
Social Networking Security Conference 2010
37
![Page 38: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/38.jpg)
www.acisonline.net/snscon2010
Facebook Account Setting
Social Networking Security Conference 2010
38
![Page 39: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/39.jpg)
www.acisonline.net/snscon2010
Facebook Account Security
Social Networking Security Conference 2010
39
![Page 40: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/40.jpg)
www.acisonline.net/snscon2010
Notify Facebook Account Login
Social Networking Security Conference 2010
40
![Page 41: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/41.jpg)
www.acisonline.net/snscon2010
Twitter Verify Account
Social Networking Security Conference 2010
41
![Page 42: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/42.jpg)
www.acisonline.net/snscon2010
Twitter Verify Account
Social Networking Security Conference 2010
42
![Page 43: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/43.jpg)
www.acisonline.net/snscon2010
Twitter Verify Account
Social Networking Security Conference 2010
43
![Page 44: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/44.jpg)
www.acisonline.net/snscon2010
SNS M7-5
![Page 45: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/45.jpg)
www.acisonline.net/snscon2010
Reconnaissance personal information
Social Networking Security Conference 2010
45
![Page 46: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/46.jpg)
www.acisonline.net/snscon2010
Reconnaissance personal information
Social Networking Security Conference 2010
46
![Page 47: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/47.jpg)
www.acisonline.net/snscon2010
Visualization Tools
Social Networking Security Conference 2010
47
![Page 48: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/48.jpg)
www.acisonline.net/snscon2010
Reconnaissance personal information
Social Networking Security Conference 2010
48
![Page 49: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/49.jpg)
www.acisonline.net/snscon2010
Facesaerch
Social Networking Security Conference 2010
49
![Page 50: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/50.jpg)
www.acisonline.net/snscon2010
Results from tools (Maltego)
Social Networking Security Conference 2010
50
![Page 51: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/51.jpg)
www.acisonline.net/snscon2010
Open Source Intelligence for Information Gathering
Social Networking Security Conference 2010
51
Ref: http://www.onstrat.com/osint/
![Page 52: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/52.jpg)
www.acisonline.net/snscon2010
SNS M7-5
![Page 53: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/53.jpg)
www.acisonline.net/snscon2010
เพื่อนจริงไม่จริง อย่างนี้ต้องจัดการ Social Networking Security Conference 2010
53
![Page 54: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/54.jpg)
www.acisonline.net/snscon2010
เพื่อนจริงไม่จริง อย่างนี้ต้องจัดการ Social Networking Security Conference 2010
54
![Page 55: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/55.jpg)
www.acisonline.net/snscon2010
เพื่อนจริงไม่จริง อย่างนี้ต้องจัดการ Social Networking Security Conference 2010
55
![Page 56: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/56.jpg)
www.acisonline.net/snscon2010
เทคนิคการซ่อนตัวจากการค้นหาข้อมูลส่วนตัว Social Networking Security Conference 2010
56
![Page 57: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/57.jpg)
www.acisonline.net/snscon2010
เทคนิคการซ่อนตัวจากการค้นหาข้อมูลส่วนตัว Social Networking Security Conference 2010
57
![Page 58: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/58.jpg)
www.acisonline.net/snscon2010
เทคนิคการซ่อนตัวจากการค้นหาข้อมูลส่วนตัว Social Networking Security Conference 2010
58
Ref: http://www.onstrat.com/osint/
Default Setting – Can search
![Page 59: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/59.jpg)
www.acisonline.net/snscon2010
เทคนิคการซ่อนตัวจากการค้นหาข้อมูลส่วนตัว Social Networking Security Conference 2010
59
![Page 60: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/60.jpg)
www.acisonline.net/snscon2010
เทคนิคการซ่อนตัวจากการค้นหาข้อมูลส่วนตัว Social Networking Security Conference 2010
60
![Page 61: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/61.jpg)
www.acisonline.net/snscon2010
เทคนิคการป้องกันการใช้ Application เสริม
Social Networking Security Conference 2010
61
![Page 62: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/62.jpg)
www.acisonline.net/snscon2010
เทคนิคการป้องกันการใช้ Application เสริม
Social Networking Security Conference 2010
62
![Page 63: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/63.jpg)
www.acisonline.net/snscon2010
เทคนิคการป้องกันการใช้ Application เสริม
Social Networking Security Conference 2010
63
![Page 64: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/64.jpg)
www.acisonline.net/snscon2010
เทคนิคการป้องกันการใช้ Application เสริม
Social Networking Security Conference 2010
64
![Page 65: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/65.jpg)
www.acisonline.net/snscon2010
เทคนิคการป้องกันการใช้ Application เสริม
Social Networking Security Conference 2010
65
![Page 66: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/66.jpg)
www.acisonline.net/snscon2010
เทคนิคการระวัง Wall Post จากเพื่อนๆ และ การป้องกันเรื่องราวของฉัน
Social Networking Security Conference 2010
66
Ref: http://www.onstrat.com/osint/
![Page 67: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/67.jpg)
www.acisonline.net/snscon2010
เทคนิคการระวัง Wall Post จากเพื่อนๆ และ การป้องกันเรื่องราวของฉัน
Social Networking Security Conference 2010
67
![Page 68: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/68.jpg)
www.acisonline.net/snscon2010
เทคนิคการระวัง Wall Post จากเพื่อนๆ และ การป้องกันเรื่องราวของฉัน
Social Networking Security Conference 2010
68
![Page 69: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/69.jpg)
www.acisonline.net/snscon2010
เทคนิคการระวัง Wall Post จากเพื่อนๆ และ การป้องกันเรื่องราวของฉัน
Social Networking Security Conference 2010
69
![Page 70: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/70.jpg)
www.acisonline.net/snscon2010
เทคนิคการระวัง Wall Post จากเพื่อนๆ และ การป้องกันเรื่องราวของฉัน
Social Networking Security Conference 2010
70
![Page 71: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/71.jpg)
www.acisonline.net/snscon2010
เทคนิคการระวัง Wall Post จากเพื่อนๆ และ การป้องกันเรื่องราวของฉัน
Social Networking Security Conference 2010
71
![Page 72: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/72.jpg)
www.acisonline.net/snscon2010
ฉันเป็นเพื่อนกับใคร ไม่อยากให้ใครรู้ และ อัลบั้มของฉันเพื่อนดูได้เท่านั้น
Social Networking Security Conference 2010
72
![Page 73: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/73.jpg)
www.acisonline.net/snscon2010
ฉันเป็นเพื่อนกับใคร ไม่อยากให้ใครรู้ และ อัลบั้มของฉันเพื่อนดูได้เท่านั้น
Social Networking Security Conference 2010
73
![Page 74: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/74.jpg)
www.acisonline.net/snscon2010
ฉันเป็นเพื่อนกับใคร ไม่อยากให้ใครรู้ และ อัลบั้มของฉันเพื่อนดูได้เท่านั้น
Social Networking Security Conference 2010
74
![Page 75: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/75.jpg)
www.acisonline.net/snscon2010
ฉันเป็นเพื่อนกับใคร ไม่อยากให้ใครรู้ และ อัลบั้มของฉันเพื่อนดูได้เท่านั้น
Social Networking Security Conference 2010
75
![Page 76: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/76.jpg)
www.acisonline.net/snscon2010
ฉันเป็นเพื่อนกับใคร ไม่อยากให้ใครรู้ และ อัลบั้มของฉันเพื่อนดูได้เท่านั้น
Social Networking Security Conference 2010
76
![Page 77: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/77.jpg)
www.acisonline.net/snscon2010
ข้อมูลการติดต่อที่ไม่อยากให้ใครติดต่อ (เทคนิคการซ่อนข้อมูล)
Social Networking Security Conference 2010
77
![Page 78: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/78.jpg)
www.acisonline.net/snscon2010
ข้อมูลการติดต่อที่ไม่อยากให้ใครติดต่อ (เทคนิคการซ่อนข้อมูล)
Social Networking Security Conference 2010
78
![Page 79: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/79.jpg)
www.acisonline.net/snscon2010
ข้อมูลการติดต่อที่ไม่อยากให้ใครติดต่อ (เทคนิคการซ่อนข้อมูล)
Social Networking Security Conference 2010
79
![Page 80: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/80.jpg)
www.acisonline.net/snscon2010
ข้อมูลการติดต่อที่ไม่อยากให้ใครติดต่อ (เทคนิคการซ่อนข้อมูล)
Social Networking Security Conference 2010
80
![Page 81: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/81.jpg)
www.acisonline.net/snscon2010
ข้อมูลการติดต่อที่ไม่อยากให้ใครติดต่อ (เทคนิคการซ่อนข้อมูล)
Social Networking Security Conference 2010
81
![Page 82: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/82.jpg)
www.acisonline.net/snscon2010
ข้อมูลการติดต่อที่ไม่อยากให้ใครติดต่อ (เทคนิคการซ่อนข้อมูล)
Social Networking Security Conference 2010
82
Set Privacy to Friend Only
![Page 83: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/83.jpg)
www.acisonline.net/snscon2010
เทคนิคการเลิกใช้แบบถาวรทําอย่างไร Social Networking Security Conference 2010
83
![Page 84: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/84.jpg)
www.acisonline.net/snscon2010
เทคนิคการเลิกใช้แบบถาวรทําอย่างไร Social Networking Security Conference 2010
84
![Page 85: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/85.jpg)
www.acisonline.net/snscon2010
เทคนิคการใช้ Twitter และ Facebook สําหรับการทํางานเพื่อให้เกิดประโยชน์แก่องค์กร
Social Networking Security Conference 2010
85
![Page 86: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/86.jpg)
www.acisonline.net/snscon2010
เทคนิคการใช้ Tweetdeck, Twhirl, Echofon และ Yoono
Social Networking Security Conference 2010
86
![Page 87: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/87.jpg)
www.acisonline.net/snscon2010
TweetDeck http://www.tweetdeck.com/desktop/
Social Networking Security Conference 2010
87
![Page 88: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/88.jpg)
www.acisonline.net/snscon2010
TweetDeck Social Networking Security Conference 2010
88
![Page 89: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/89.jpg)
www.acisonline.net/snscon2010
twhirl http://twhirl.org
Social Networking Security Conference 2010
89
![Page 90: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/90.jpg)
www.acisonline.net/snscon2010
echofon http://www.echofon.com
Social Networking Security Conference 2010
90
![Page 91: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/91.jpg)
www.acisonline.net/snscon2010
Yoono http://yoono.com
Social Networking Security Conference 2010
91
![Page 92: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/92.jpg)
www.acisonline.net/snscon2010
รวมกลเม็ด และ เทคนิคการรักษาความปลอดภัยที่ควรรู้สําหรับการใช้ Facebook Twitter, Linkedin, Google,
Hi5 และ YouTube
Social Networking Security Conference 2010
92
Don’t click on links or open attachments in suspicious emails.
Be wary of where you enter your password.
Be suspicious of emails or messages that contain misspellings or use bad grammar, especially if they’re from someone who is usually a good writer.
Make sure you have an up-to-date web browser equipped with an anti-phishing blacklist.
Make sure you have up-to-date comprehensive security software on your computer that includes anti-virus, anti-spyware, anti-phishing, and a firewall.
Make sure you've set your operating system to update automatically.
Make sure you’ve listed a security question and answer for your online accounts
Don’t share your passwords with anyone.
Use different passwords for your various online accounts.
Use a complex password that can’t be easily guessed.
Remember that you choose what you share and with whom you share it.
![Page 93: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/93.jpg)
www.acisonline.net/snscon2010
รวมกลเม็ด และ เทคนิคการรักษาความปลอดภัยที่ควรรู้สําหรับการใช้ Facebook Twitter, Linkedin, Google,
Hi5 และ YouTube
Social Networking Security Conference 2010
93
![Page 94: Social Networking Security Workshop](https://reader038.vdocuments.net/reader038/viewer/2022102722/55756654d8b42a2e248b486d/html5/thumbnails/94.jpg)
www.acisonline.net/snscon2010
รวมกลเม็ด และ เทคนิคการรักษาความปลอดภัยที่ควรรู้สําหรับการใช้ Facebook Twitter, Linkedin, Google,
Hi5 และ YouTube
Social Networking Security Conference 2010
94