Presentation is loading. Please wait.

Presentation is loading. Please wait.

Social Networking Services and User Data Protection

Similar presentations


Presentation on theme: "Social Networking Services and User Data Protection"— Presentation transcript:

1 Social Networking Services and User Data Protection
Big Data and Privacy Social Networking Services and User Data Protection Shuangbao (Paul) Wang Progessor Program Director for Cybersecurity University of Maryland, University College Center For security studies

2 Question: How many Fortune 500 Companies had data breaches last year?
Answer: 500

3

4 Solutions to Privacy? Industry -- Yes Academia -- May be not
Government – Yes, but putting backdoors Trying to find solutions. Why? – Defend? -- Prevent?

5 Social Services Big Data
Twitter Company Statistics Data (7/11/14) Total number of active registered Twitter users 645,750,000 Number of new Twitter users signing up everyday 135,000 Number of unique Twitter site visitors every month 190 million Average number of tweets per day 58 million Number of Twitter search engine queries every day 2.1 billion 40 TB/year == 8500 DVD

6 Individual Account Public Account
weChat has more users than Twitter. Why? Public Account

7 Developers Company Team Individual 88.9% 10% 1.1%
Education is among the 1.1%

8 Industries .net companies software developers .net services others 23.64% 43.31% 31.79% 1.46% They are all working on getting data from it. IRB privacy: no or minimum consent. People are not informed how the data are being used.

9 Education English learning, music, children, math, etc. All free.
Comparing with twitter, Wechat has no limitation for # of chars. Making it better for learning.

10 Data Breaches Card System 2005 $40M TJX 2007 $90M Heartland 2009 $130M Sony 2011 $100M Target 2013 $70M Home Depot 2014 $56M Unlike others, I’m not only list of the numbers. I’m working on finding solutions.

11 How much time is need to steal 300k data record?
It took ten years to reduce the time to identify a data breach from a week to days. GMU 1 Jan. 2005 32,000 A week to identify GMU 2 July 16, 2014 4,400 faculty College Park 1 Tue. Jan. 18, 2014 309,079 Hackers made a copy of DB data College Park 2 One month later 36 hours identify It is a very hard problem. How much time is need to steal 300k data record? < 1ms

12 Solutions? Algorithms - Traditional Algorithms – future Cisco
Google map Dijkstra, core: 10 lines? 10k lines? 10 million? Algorithms – future N Dimensions/Domains

13 HSPM Algorithm – Threat Analysis
INPUT: Some 200 parameters, DB scheme, encryption Vulnerability Assessment Report Hardware configurations Policies in place and Implementation Each assign a weight OUTPUT Threat factor – tf:[0 – 1.00] Recommendations and Guide Security = Hardware + Software + Policy + Management - Wang, 2006

14 HSPM - Experiments Traveler Enterprise 20 million business 1st round
Before: tf = 0.71, blue hat: steal all data After: tf = 0.38, blue hat: steal no data 2nd round tf reduces to 0.18 Merged by a big company

15

16 Free vs. not Free Question:
Suppose you have a full-time job. If there is an service charging $40 a year but does not collect your data. Question: Are you willing to switch to this service or would you rather stay in the current free services by scarifying your privacy? 91% -- Yes After HSPM & training 79% -- Yes

17 Log in with strong password over SSL
Two-factor authentication: login + SMS Is it secure? -- Yes: 98%

18 Protect Privacy? Our Privacy is on the hands of others
What we can do to defend our privacy ourselves? Policies Technologies How to “hide” yourself in this cyber insecurity world?


Download ppt "Social Networking Services and User Data Protection"

Similar presentations


Ads by Google