Security Issues in Social Networking Based on: Security issues in the future of social networking ENISA Position Paper for W3C workshop on the future of.

Slides:



Advertisements
Similar presentations
Its more than a game, its your life…. What do you do online?
Advertisements

How to protect yourself, your computer, and others on the internet
Tiffany Phillips CIS What is a Social Networking Website? Social networking websites function like an online community of internet users. Depending.
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Public Relation.  While NAWS has no specific position on Facebook. NA as a whole has a clearly defined outline for the use of Internet technologies.
Protecting children online  How can you protect your child online?  Are you aware of the dangers?  Do you know what you can put in place to protect.
Privacy: Facebook, Twitter
Social Network Security Issues: Social Engineering and Phishing Attacks Jeffrey Allen, Leon Gomez, Marlon Green, Phillip Ricciardi, Christian Sanabria.
Improving Cybersecurity Through Research & Innovation Dr. Steve Purser Head of Technical Competence Department European Network and Information Security.
Security at the Digital Cocktail Party Sławomir Górniak, ENISA.
Cyber bullying and internet safety Parents meeting: staying safe online.
Social media threats. Warning! May contain mild peril.
Presented by: Dan Landsberg August 12, Agenda  What is Social Media?  Social Media’s Professional Side  Benefits of Social Media  Regulatory.
Social Media Intro to Business & Marketing. The most three most trusted forms of advertising are: Recommendations from people I know - 90% Consumer opinions.
SEXUALISED MEDIA AND SOCIAL MEDIA AMONGST TEENS Teens Online – What is really going on Teens Online – What is really going on Discuss Current Online.
Privacy in Social Networks CSCE 201. Reading Dwyer, Hiltz, Passerini, Trust and privacy concern within social networking sites: A comparison of Facebook.
Social Networking facebook, bebo, MySpace and others.
PewInternet.org The new landscape for civics and politics (especially in mobile) Voting Information Technology Summit - GeekNetNYC December 1, 2011 Lee.
Ajay Joshi. Function  Simple opening screen with large icons for each ‘grouping’ (Efficient)  Opens through a web browser (Efficient)  First time you.
Social Media Staying one step ahead of your children!!
 Digital marketing: Uses digital media to develop communications and exchanges with customers  Electronic media (E-marketing): Refers to the strategic.
Social Networking – The Ways and Means Rosey Broderick May 2011.
Getting Your Message Across Presented by Duncan Craig Communications & Marketing Co-Ordinator.
Awareness raising session for Parents and Carers.
Norman SecureSurf Protect your users when surfing the Internet.
Job Search Suggestions. Career Interest Self Assessment What do I want to do? What are my current options? Is it time for me to pursue a dream? Is this.
Online Information Services and Social Media Social Networking.
How to Surf the Web Safely. What is this a picture of?
David Overton Head of Small Business Technology – Head of Small Business Technology – Microsoft solutions for.
“Social Networking Services: Tribute to Fashion or Vital Necessity?” Tchirkina Victoria.
Introduction Position your online or offline business Quickly and safely grow a huge army of potential clients Productively interact with your new and.
PRIVACY BOOTCAMP YpJU.
Fil Santiago Director of Staff Development and Technology West Orange Public Schools.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
 What are the risks?  Technologies your children use  Tips for protection  Advice and help  Questions? Topics.
E-Safety E-safety relates to the education of using new technology responsibly and safely focusing on raising awareness of the core messages of safe content,
Lecture 17 Page 1 CS 236 Online Privacy CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Regulation of Personal Information Sally Brierley & Emma Harvey.
AUP, Netiquette, Copyright & Fair Use Wilkes University – Internet Literacy for Educators Cathy W. Dowd Spring 2009.
Using Social Media for Fundraising and Communication with Supporters Lindsay Boyle – Communications & Research Coordinator Claire Chapman – Information.
Privacy Issues on The Internet. Login if you want everyone to see your private life * * * * *
Today we are going to find out What facebook is? Why is it popular? Facebook and your school Facebook and you Facebook and the student Facebook/Hatebook–Cyber.
It’s more than a game, it’s your life… What do you do online?
INTERNET SAFETY Thornell Road Library Let’s Discuss: Information Privacy Social Networking CyberbullyingNetiquette.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
Dangers of Online Media and Social Networking By: Micah Cochrane Maurice Gamble Shenne Howell Elvyn Morales.
PRIVACY BOOTCAMP Jack Vale - Social Media Experiement.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
The internet is an inspiring and positive place. It is an amazing resource which enables people (young and old) to connect, communicate and be creative.
“How do I keep my child safe online?” Miss Johnstone Computing Co-ordinator “Parents / Carers are the one important factor in the home environment to keep.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
E-Safety By Ian Hopper. Session Aims Apoyo Training & Consultancy -Develop a shared understanding of E-safety -Understand good practice in this area -Understand.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
E-Safety Parent Talk Helping to keep your children safe online.
>>0 >>1 >> 2 >> 3 >> 4 >> Privacy and SNS in China Comundus-European Master of Arts in Media, Communication and Cultural Study Jin PENG the case of xiaonei.com.
Amy Randolph-Chernis. Blogging Facebook LinkedIn Twitter YouTube Social Networking!
E- SAFETY INFORMATION EVENING 13 July T EACHING E - SAFETY T HINK UK NOW A recommended website for children to look.
Information Security Awareness
Online Safety.
Privacy and Public Policy Implications of IoT
Creating your online identity
E-Safety Briefing
Discover How Your Business Can Benefit from a Facebook Fanpage
Awareness raising session for Digital Citizenship/E-Safety
Internet Privacy and You
Digital Citizenship EIT, Author Gay Robertson, 2017.
Internet Safety – Social Media
Online Safety; Privacy and Sharing
Online Safety; Privacy and Sharing
Presentation transcript:

Security Issues in Social Networking Based on: Security issues in the future of social networking ENISA Position Paper for W3C workshop on the future of social networking By- Giles Hogben, ENISA Privacy and social network sites : Follow the money ! By- Martin Pekarek, Ronald Leenes, TILT, Netherlands Information Revelation and Privacy in Online Social Networks (The face book case). By- Ralph Gross, Alessandro Accquisti, CMU, PA. Presenter : Moinul Zaber, Ph.D Student, Dept.of CS, Kent State University

WHAT TODAY’S TALK IS ABOUT Social Networking (SN) and its benefits SN is an Identity Management System But very much prone to vulnerabilities Discussion will be on : Some key security issues Reasons behind these vulnerabilities Attacking the vulnerabilities at the root

SOCIAL NETWORKING – WHAT’S THAT ALL ABOUT ! One can define his/her profile ( interests, skills, etc..) ‏ Define relations to other profiles (sometimes some access control may exist) ‏ Interact with “Friends” via IM, wall posts, blogs.

SOCIAL NETWORKING IS A GREAT WAY TO SOCIALIZE AND TO STAY CONNECTED SN has More privacy than a blog – one can restrict his/her data within ones network. SN is an IDM tool Helps to discover like-minded individuals and business partners. Biggest repository of personal images on the internet is Facebook ( 30 billion images, 14 million new images are uploaded every day.) Largest number of personal profiles is held in SNSs.

SOCIAL NETWORKS BUSINESS BENEFITS Increase interactivity Exploit the value of relationships Publicise and test results in trusted circles

IDENTITY MANAGEMENT SYSTEM Storage of personal data Tools for managing how data is viewed Access control to personal data based on credentials. Tools for finding out who has accessed personal data.

SOCIAL NETWORKING IS AN IDENTITY MANAGEMENT SYSTEM. Sensitive Personal data can be there: Recognise these ? (a) Racial or ethnic origin (b) Political opinions (c) Religious beliefs (e) Physical or mental health or condition (f) Sex life

TOOLS FOR ORGANISING THE PERSONAL DATA

TOOLS FOR MANAGING ACCESS BASED ON CREDENTIALS

SOCIAL NETWORKING IS AN IDENTITY MANAGEMENT SYSTEM. But FULL of Vulnerabilities

INAPPROPRIATE (AND OFTEN IRREVERSIBLE) DISCLOSURE

10 MINUTES’ SURFING OF MYSPACE - EXAMPLE

INAPPROPRIATE DISCLOSURE

We might think it’s OK because only our own network can see our profile data

ACCESS CONTROL BASED ON CREDENTIALS?

LOW FRIENDING THRESHOLDS (POOR AUTHENTICATION) ‏

WHO CAN SEE MY DATA? Do we know the size of our audience. Only Everyone in the Kent Network? Only Everyone who pays for a LinkedIn Pro account? Only Everyone in your address book? Only Social Network employees? Only anyone who’s willing to pay for behavioural advertising? Only Plastic green frogs?

Am I safe as I don’t use my real name?

DATA MINING TOOLS MyFaceID application will automatically process your photos, find all faces, help you tag them and let you search for similar people.

WHICH FORTUNATELY DON’T WORK VERY WELL

Then... I can delete my embarrassing revelations, Can’t I?

“Social Networking is like the Hotel California. You can check out, but you can never leave” Nipon Das to the New York Times Lock-in – the Hotel California effect.

Caches Internet archives “Deactivation” of the account Delete comments from other people’s walls?

Isn’t my privacy settings enough?

THE THREATS SN-based Spear phishing and corporate espionage Profile-squatting/theft Huge amounts of time wasted on corporate bills. Global Security Systems estimates that SN costs UK Corporations 8 billion Euro every year in lost productivity (infosec 2008) ‏

SN Spam XSS, widgets and other bad programming threats. Extortion and bullying SN Aggregators – one password unlocks all

WHY THEY DO MORE DAMAGE ? The usual-suspects (Cross-site scripting, SPAM, Social Engineering etc…) do more damage because: SN gives away the relationships for free SN is highly viral

WHY? The value of the network (e.g. 15 billion US$ and counting) is: Its personal data Its ability to profile people for advertising Its ability to spread information virally

Economic success is inversely proportional to strength of privacy settings. Speed of spread => Economic and Social Success Privacy

SO WHAT COULD BE THE ALTERNATIVES Portable networks (checking out of the Hotel California and going to another one) ‏ Portable access-control and security. Privacy and anonymity tools for social networks. Including more sophisticated authentication and encryption.

WHAT ELSE ? Clear corporate policies on social network usage inside AND out of the office. E.g. - Hours where SN usage is allowed enforced by firewall. - Clearly define which corporate data is not permitted on social networks. - Recommend privacy settings to be used on networks - Conduct awareness-raising campaigns

WHAT ELSE ? Social Networking as a trust infrastructure: we can use the network to Authenticate people Provide testimonials and recommendations Provide a saleable trust architecture Educating people on the risks is vital.

SUMMARY OF TYPES OF HARM 1. Information based Harm: others could abuse the mobile phone number you listed in your profile. 2. Information inequality: information about purchases and preferences can be used for marketing purposes without SNS user being aware. 3. Information injustice: risqué photographic report of a party! 4. Restriction of moral autonomy: SNS information effectively restricts people from presenting different “faces” in different contexts.

ATTACKER MODEL 1. Other Users: can harvest more or less personal information from the profile page of SSN members. 2. Third Parties: They have only minimal access and can only access publicly available data legitimately. 3. Platform Providers: The owners and operators of SNS itself.

MOTIVATIONS 1.Social : building social capital 2. Monetary: information trade. Few Facts: a. News Corporation’s $580 million cash takeover of Myspace b. Microsoft’s $240 million payment for 1.6 percent stake in Facebook, theoretically valuing the SNS provider at a staggering $15 billion. c. Individuals disclose more information than they intend to (Norberg,Horne et al 2007), d. Any techniques limiting social aspects of SNSs is doomed to fail : users are simply not interested in them. (Grimmelmann 2009).

RECOMMENDATIONS: 1. Restraining the monetary incentive to harvest information use 2. A transfer of SNS use to non commercial platforms. 3. Open source ! ( such as Elgg ) ‏ Problem : SNS users have devoted time and energy to build their current profile on their favorite SNSs, and it will take them once again much effort to build a comparable profile on the new network.

DISCUSSION 1 Is it realistic to dream of portable social networks where the user owns and controls his own data? Are there insurmountable security problems with this idea? What policies should be applied to mitigate threats from inside SN's? How to educate users to protect them from exposing themselves to threats on SN's?

DISCUSSION 2 What are the threats from 3rd party applications on SN's and how can we address them? What advice should we give to businesses about employee SN usage? Can we imagine social networks where the social network provider does not see the data?

REFERENCES Giles.hogben [at thingy] enisa.europa.eu sa_pp_social_networks.pdfhttp:// sa_pp_social_networks.pdf, 2008 Security at the digital cocktail party social networking meets IAM, Giles Hogben European Network and Information Security Agency, Privacy and Social Network Sites: Follow the Money!, Martin Pekarek, Ronald Leenes, TILT, Netherlands, Position Paper W3C workshop, Jan,2009. Information Revelation and Privacy in Online Social Networks (The face book case). By- Ralph Gross, Alessandro Accquisti, CMU, PA.