Social Networking Services and User Data Protection

Slides:



Advertisements
Similar presentations
SO YOU WANT TO BE A HACKER? Maybe not yet, but you will at the end of the hour!
Advertisements

So much alike! What is Personal Branding? 1. Make a clear, specific, and consistent image of yourself on the internet that reflects who YOU are. 2. Make.
11 Section D: SQL  SQL Basics  Adding Records  Searching for Information  Updating Fields  Joining Tables Chapter 11: Databases1.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
Two-Factor Authentication & Tools for Password Management August 29, 2014 Pang Chamreth, IT Development Innovations 1.
A Cyber Security Company June 16, 2009 Cyber Security: Current Events and White House Cyberspace Policy Review.
Marketing Communications Services Hayward, WI.
Security Controls – What Works
Instructions for Weds. Jan Get your Century 21 Jr. textbook 2.Log in to the computers 3.On page 80, read the Objectives listed under “Lesson 13:
Contact Center Security Strategies Grant Sainsbury Practice Director, Dimension Data.
1 © 2006 Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Cisco Technical Support Presentation Using the Cisco Technical Support.
Introduction to the Secure SMTP Server service. Secure SMTP server is a secure, reliable SMTP mail relay server for your outgoing mail. Secure SMTP service.
GETTING BUTTS INTO THE SEATS. SOCIAL MEDIA FACTS As of tomorrow Facebook will be 10 years old and has an estimated 1.3 BILLION users Facebook StatisticsData.
1 © 2006 Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Using the Cisco Technical Support & Documentation Website for Security.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Obtaining, Storing and Using Confidential Data October 2, 2014 Georgia Department of Audits and Accounts.
External Threats to Healthcare Data Joshua Spencer, CPHIMS, C | EH.
1 Title ECI: Anatomy of a Cyber Investigation Who Are the Actors.
PCI requirements in business language What can happen with the cardholder data?
-Target -Home Depot -Jimmy John’s “No one wants their personal information or sensitive data in the wrong hands”
PAGE 1 Company Proprietary and Confidential Internet Safety and Security Presented January 13, 2014.
PCI: As complicated as it sounds? Gerry Lawrence CTO
Chapter 4.  Can technology alone provide the best security for your organization?
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
SECURITY ENGINEERING 2 April 2013 William W. McMillan.
Analytics. Is your site working?  Lots of ways to measure this.  User feedback  Functional tests (output is what you expect)  But, can we measure.
 Why is this important to you?  How do digital footprints connect with digital citizenship?  Does everyone have a digital footprint?
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
A New Way to Work For the New Century. As a result of several years’ work by you and your co-workers, we have...
Data Security and Payment Card Acceptance Presented by: Brian Ridder Senior Vice President First National September 10, 2009.
CCT355H5 F Presentation: Phishing November Jennifer Li.
Ali Alhamdan, PhD National Information Center Ministry of Interior
Every computer along the path of your data can see what you send and receive. USERNAMES and PASSWORDS  Username can be assigned to you eg. Student ID.
Data Security.
Security Policies. Threats to security and integrity  Threats to information systems include  Human error –keying errors, program errors, operator errors,
Comparing Management-Based Regulation and Prescriptive Legislation: How to Improve Information Security Through Regulation (a.k.a., “The Efficacy of Cybersecurity.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Friday, October 23, Jacqueline Harris, CPM®, CCIM® Director of Training & Administration Digital Realty Jacqueline Harris, CPM®, CCIM® Director.
Develop your Legal Practice using “Cloud” applications, but … Make sure your data is safe! Tuesday 17 November 2015 The Law Society, London Allan Carton,
1 © 2006 Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Using the Cisco Technical Support & Documentation Website for IP Routing.
APolicy EASy Security Project Analysis and Recommendations for TJX Companies, Inc.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Setting up your College Board Account. With a College Board Account, you will be able to: –Access your PSAT, SAT and AP scores online –Send your scores.
 Attempts to steal your identity since most people who use Facebook post personal information and click things without thinking about it.
1 © 2004 Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Cisco Technical Support Seminar Using the Cisco Technical Support Website.
USDA 2016 Financial Management Training Transforming Shared Services Cyber Security Presented by Jack Blount.
Protection of Data 31 Protection of Data 31. Protection of Data 31 Having looked at threats, we’ll now look at ways to protect data: Physical Barriers.
Why Does The Site Need an SSL Certification?. Security should always be a high concern for your website, but do you need an SSL certificate? A secure.
Performing Risk Analysis and Testing: Outsource or In-house
Hotspot Shield Protect Your Online Identity
Michael Menne IT Solutions Chief Information Security Officer
Security Standard: “reasonable security”
Real-time protection for web sites and web apps against ATTACKS
MISY3321- Intro. to Information Assurance
Compliance with hardening standards
Recommending a Security Strategy
Cyber Security Awareness Workshop
ITIS 6200/8200: HCIP 6200 Principles of Information Security and Privacy Dr. Weichao Wang.
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
Today’s Risk. Today’s Solutions. Cyber security and
Office 365 Security Assessment Workshop
Research for Cyber Security Warwick University Industry Day 2018
Network Security Best Practices
IT & Security Training Skills.
Contact Center Security Strategies
Unit 32 Every class minute counts! 2 assignments 3 tasks/assignment
DATA BREACHES 6 4 , 9 3 There were…
Introduction to Networking Security
Presentation transcript:

Social Networking Services and User Data Protection Big Data and Privacy Social Networking Services and User Data Protection Shuangbao (Paul) Wang Progessor Program Director for Cybersecurity University of Maryland, University College Center For security studies

Question: How many Fortune 500 Companies had data breaches last year? Answer: 500

Solutions to Privacy? Industry -- Yes Academia -- May be not Government – Yes, but putting backdoors Trying to find solutions. Why? – Defend? -- Prevent?

Social Services Big Data Twitter Company Statistics Data (7/11/14) Total number of active registered Twitter users 645,750,000 Number of new Twitter users signing up everyday 135,000 Number of unique Twitter site visitors every month 190 million Average number of tweets per day 58 million Number of Twitter search engine queries every day 2.1 billion 40 TB/year == 8500 DVD

Individual Account Public Account weChat has more users than Twitter. Why? Public Account

Developers Company Team Individual 88.9% 10% 1.1% Education is among the 1.1%

Industries .net companies software developers .net services others 23.64% 43.31% 31.79% 1.46% They are all working on getting data from it. IRB privacy: no or minimum consent. People are not informed how the data are being used.

Education English learning, music, children, math, etc. All free. Comparing with twitter, Wechat has no limitation for # of chars. Making it better for learning.

Data Breaches Card System 2005 $40M TJX 2007 $90M Heartland 2009 $130M Sony 2011 $100M Target 2013 $70M Home Depot 2014 $56M Unlike others, I’m not only list of the numbers. I’m working on finding solutions.

How much time is need to steal 300k data record? It took ten years to reduce the time to identify a data breach from a week to days. GMU 1 Jan. 2005 32,000 A week to identify GMU 2 July 16, 2014 4,400 faculty College Park 1 Tue. Jan. 18, 2014 309,079 Hackers made a copy of DB data College Park 2 One month later 36 hours identify It is a very hard problem. How much time is need to steal 300k data record? < 1ms

Solutions? Algorithms - Traditional Algorithms – future Cisco Google map Dijkstra, core: 10 lines? 10k lines? 10 million? Algorithms – future N Dimensions/Domains

HSPM Algorithm – Threat Analysis INPUT: Some 200 parameters, DB scheme, encryption Vulnerability Assessment Report Hardware configurations Policies in place and Implementation Each assign a weight OUTPUT Threat factor – tf:[0 – 1.00] Recommendations and Guide Security = Hardware + Software + Policy + Management - Wang, 2006

HSPM - Experiments Traveler Enterprise 20 million business 1st round Before: tf = 0.71, blue hat: steal all data After: tf = 0.38, blue hat: steal no data 2nd round tf reduces to 0.18 Merged by a big company

Free vs. not Free Question: Suppose you have a full-time job. If there is an email service charging $40 a year but does not collect your data. Question: Are you willing to switch to this email service or would you rather stay in the current free email services by scarifying your privacy? 91% -- Yes After HSPM & training 79% -- Yes

Log in with strong password over SSL Two-factor authentication: login + SMS Is it secure? -- Yes: 98%

Protect Privacy? Our Privacy is on the hands of others What we can do to defend our privacy ourselves? Policies Technologies How to “hide” yourself in this cyber insecurity world?