SOCIAL NETWORKING Keith Watson, CISSP-ISSAP, CISA Information Assurance Research Engineer, CERIAS SECURITY AND PRIVACY.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

®® Microsoft Windows 7 for Power Users Tutorial 7 Enhancing Your Computers Security.
Don’t be bullied, or be a bully.
Protecting children online  How can you protect your child online?  Are you aware of the dangers?  Do you know what you can put in place to protect.
_Protecting Our Kids New Technology: New Pitfalls Purpose: To help families ask the right questions, and make an informed decision for their children regarding.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Privacy: Facebook, Twitter
Managing the Security and Privacy Risks of Social Media Don Knox, CPP, CITRMS Global Security and Risk Analysis Manager Caterpillar (309)
FLORIDA STATE UNIVERSITY College of Communication & Information Your Digital Footprint Michael Helfrich Milton Ramer Courtney Lisenbee MH.
So much alike! What is Personal Branding? 1. Make a clear, specific, and consistent image of yourself on the internet that reflects who YOU are. 2. Make.
Apostolos Paraskevas School Advisor in Primary Education Level.
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
Two-Factor Authentication & Tools for Password Management August 29, 2014 Pang Chamreth, IT Development Innovations 1.
Social Media Staying one step ahead of your children!!
Tracking, Privacy, You & The 21 st Century When you talk online the internet listens.
Small Business Security By Donatas Sumyla. Content Introduction Tools Symantec Corp. Company Overview Symantec.com Microsoft Company Overview Small Business.
 Why would you want to be connected? o To make online connections that will improve your efficiency and speed o To provide a near instant platform.
MANAGING YOUR ONLINE PROFILE WHAT DOES THIS MEAN AND WHY SHOULD YOU CARE? Sarah Morris UT Libraries.
10 Privacy Settings Every Facebook User Should Know.
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
Chapter 3 Introduction to Computing Chapter 3 Structures in Computing William Johnson Julia Benson-Slaughter
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
8/1/2015. Please Ask Questions! 2 Hacks In The News Office of Personnel Management (OPN) Flash vulnerabilities Sony Heartbleed iCloud Leaked Pictures.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
JMU GenCyber Boot Camp Summer, Cyberspace Risks and Defenses Facebook Snapchat P2P filesharing Apps Craigslist Scams JMU GenCyber Boot Camp© 2015.
Information Security and YOU!. Information Assurance Outreach Information Security Online Security Remote Access with Demonstration The Cloud Social.
Internet Safety How to keep your children safe as they use the web.
PRIVACY BOOTCAMP YpJU.
TECHNOLOGY GUIDE THREE Protecting Your Information Assets.
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
Securing Your Facebook Identity Nicholas A. Davis, CISA, CISSP UW-Madison Division of Information Technology 11/10/2015 UNIVERSITY OF WISCONSIN1.
Minding your business on the internet Kelly Trevino Regional Director October 6,2015.
Internet Safety How To Keep Your Children Safe As They Use The Web.
Helping your family to stay in control Living with technology.
Protecting Yourself on Social Media – Friend Requests And Messages.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Activity 4 Protecting Ourselves. Keeping Safe There are lots of different ways we can be at risk on the Internet. How can we protect ourselves and keep.
Cyber Safety. Protect Your Identity Choose screen names/logins that do not give you away Choose password that cannot be easily guessed Do not give away.
Internet Safety and Productivity Tips Presented by ITS Kerri Sorenson and Sean Hernandez December 11, 8:30-9:00 am.
FACEBOOK Material adapted from
Facebook for Beginners One Session Class. What will you learn today? What can you do on Facebook? Creating a profile Privacy Connecting with friends Sending.
PRIVACY BOOTCAMP Jack Vale - Social Media Experiement.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Awareness raising session for Parents and Carers June Todd Awareness raising session for Parents and Carers June Todd.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
Lindsey Velez, Director of Instructional Technology Single Sign-On One Click.
Victor PTSA Fall Forum Don’t Lose Touch With Your Teen Tuesday, October 22, 2013 – 7PM Social media is now an integral part of our every day lives. For.
Phillip Schneider Information Services Librarian Gail Borden Public Library District Cybersecurity: Keeping Your Computers & Devices Safe.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
MOBILE TECHNOLOGY BY: AMANDA HANKS. SKYDRIVE VS. DROPBOX SkyDrive: More Free Storage Space (7 GB) Less Costly for more Storage Space $10,$25,$50 Less.
Social Media Security: Understanding how to keep yourself safe.
File Management in the Cloud
Common Methods Used to Commit Computer Crimes
Information Security.
TECHNOLOGY GUIDE THREE
Name Job Title Library Name
OWASP CONSUMER TOP TEN SAFE WEB HABITS
Shavonne Henry, Nikia Clarke, David Heymann, Brandon Knight
Social Networking Security and Privacy Keith Watson, CISSP-ISSAP, CISA
Information Security Awareness 101
Cyberspace Risks and Defenses
Richland 1 professional development
SOCIAL RESPONSIBILITY
Bethesda Cybersecurity Club
Internet Safety – Social Media
Online Computer Security Tips For Parents
Current State of Security and Privacy
Online Safety; Privacy and Sharing
Online Safety; Privacy and Sharing
Presentation transcript:

SOCIAL NETWORKING Keith Watson, CISSP-ISSAP, CISA Information Assurance Research Engineer, CERIAS SECURITY AND PRIVACY

Find Me Online ikawnoclast.com facebook.com/ikawnoclast twitter.com/ikawnoclast linkedin.com/in/keithwatson Please tweet as we go with #puaware

Overview Own Your Space Definitions and Terms Questions Passwords, Systems, Networks Things to Keep in Mind Service Specific Configuration Options

Own Your Space

A Guide to Facebook Security A guide to risks and security features of Facebook Available in English since August 2011 Translated into seven languages Arabic version available in mid February (guide)

Terms CC-licensed photos by Dr Noah Lott, bnanative on flickr

Types of Services Networking – Facebook, Google+, Linkedin, Twitter Content Sharing – Pinterest, Facebook, Dropbox, Google Drive Location-based Services – foursquare, Google Latitude, Facebook, Gowalla

Types of Protection Security – Prevention of malicious action to systems, info Safety – Prevention from physical or mental harm Privacy – Prevention of exposing sensitive or private info

Default Privacy Modes “Mostly open” – The default sharing mode is public – You must choose to keep content private “Mostly closed” – The default sharing mode is private – You must choose to share content

Questions CC-licensed photos by Colin_K, Mario Belluci, Horia Varian on flickr

Why is it free? If a service does not charge you money, then you are paying in other ways – Marketing and Advertising – Privacy Facebook has 1 Billion monthly active users – Revenues for Q2’12: $1.18 Billion, 84% from ads Linkedin Marketing Solutions: $63.1 Million Twitter uses Promoted Tweets based on you

What are the risks? Privacy Reputation Data Access Control Employment Legal Proceedings

What should I do? Realize that social networking is not free Review the security/privacy settings of sites you use periodically Stop using it!? Deactivate or delete your accounts!? Extract your data Assume the worst case scenario is possible – Prepare for it

Your Memory and System Have Issues CC-licensed photos by ecastro, allaboutgeorge, TounuTouji on flickr

Passwords and Password Tools Weak/short passwords can be discovered – Brute password breaking is cheaper today Strong passwords are needed, everywhere You have too many passwords to remember! Use a password tool to manage passwords – 1Password, LastPass, PasswordSafe, RoboForm – Browser integration, mobile platforms Use one-time password systems

System Security Stay up to date with software – Especially Flash Player, Java, web browsers Upgrade your OS! – XP is now 11 years old; support ended in 2009 Remove internet software you do not use Install anti-malware software – If it’s a Purdue system, this is software is free! – Make sure it’s updating Your regular account should not be an admin

Network Security Avoid using open WiFi connections – A WPA2 connection with public password is safer Use a virtual private network (VPN) – Purdue’s VPN available to Career Account users Enable your OS or anti-malware firewall Enable your home router’s firewall for devices Disconnect your system from the network when not needed

Things to Keep in Mind CC-licensed photo by joguldi on flickr

Content Sharing Privacy Before you post, ask the following: – Will this post/picture cause a problem for me? – Can I say this in front of my mother? Divide your Friends into groups, lists, or circles Limit the number of people that see it Share public information with the public Share inner thoughts and personal feelings with close friends

Networking Privacy Do not Friend or Connect with people that you have not met in person or know well Reject Friend requests and Connections Having a lot of Friends works can against you – Facebook may ask you to identify your Friends Limit your visibility on services

Location Privacy and Safety Limit your check-in information to friends only Never check in at your home, school, work A mayorship is a public “office” Avoid public lists for a location Do not let friends check you in Review posts you are tagged in

Service Specific Configuration Options

Google Security and Privacy Enable 2-step verification – Use Google Authenticator or text-based codes – Applies to (almost) all Google services Create Google+ circles based on sharing needs Turn off geo location data in photos Turn off “find my face” in photos and videos Manage your Dashboard data

Facebook Security Tools Enable – Secure Browsing – Login Notifications (text and ) – Login Approvals (text and mobile Code Generator) Select your Trusted Friends Review and Monitor – Recognized Devices – Active Sessions Delete old and unused Apps

Facebook Privacy Tools Limit App access to your data Set your default audience to Friends Customize your timeline content settings – Who can post, tag you, tag reviews – Disable tag suggestions for photos uploaded Limit search engine inclusion Limit third-party and social ads Limit info that can be included by others in apps

Dropbox Security and Privacy Enable two-step verification Disable LAN sync on laptops Do not put sensitive data into Dropbox Encrypt files if needed Unlink old devices Review Apps linked to your account Turn on for new devices and apps added Review your shared folders periodically

Twitter Security and Privacy Enable Protect My Tweets Enable HTTPS Require personal information for password reset Disable location data for tweets – Delete old location data too

Linkedin Privacy Turn off data sharing with third-party apps and sites Consider changing your photo visibility, activity broadcasts Remove Twitter access Disable ads from third-party sites Enable full-time SSL connections

Foursquare Privacy Do not include yourself in lists of people checked into a location Do not earn mayorships Do not let friends check you into places Do not let venue managers see you

Stay Safe Stay up to date on software and settings Be selective when choosing friends Using your thinkin’ before you’re tweetin’! Be mysterious