A Proxy-based Real-time Protection Mechanism for Social Networking Sites Presented by Omar Alzahrani A Proxy-based Real-Time Protection Omar Alzahrani.

Slides:



Advertisements
Similar presentations
Promoting yourself on Facebook Lindsey Jacobs. Facebook.com The 2nd most used website next to Google More than 800 million active users About 700,000.
Advertisements

Privacy: Facebook, Twitter
Social Network Security Issues: Social Engineering and Phishing Attacks Jeffrey Allen, Leon Gomez, Marlon Green, Phillip Ricciardi, Christian Sanabria.
PHAD- A Phishing Avoidance and Detection Tool Using Invisible Digital Watermarking By Sonali Batra Web 2.0 Security and Privacy 2014.
Attacking Session Management Juliette Lessing
THAT STRANGER IS NOT YOUR FRIEND Facebook 101:. Housekeeping This presentation is not exhaustive It is just enough information to get you started; making.
SOCIAL MEDIA. TODAY Business Today Social Media Importance What is Social Media Social Media Platforms Facebook & Twitter Accounts.
Chapter 7: The Web and 1 The Web and Chapter 7.
UNIFORM RESOURCE LOCATOR (URL)
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
What is Dropbox ?– Dropbox is a file storage site which gives you an easy way to save your documents, files, and presentations online and access them from.
How To Protect Your Privacy and Avoid Identity Theft Online.
Top 5 Facebook Tips Mark Smith Rosemary Turner. What is Facebook? Users create a personalised profile for themselves and then add people as friends to.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
10 Privacy Settings Every Facebook User Should Know.
You can customize your privacy settings. The privacy page gives you control over who can view your content. At most only your friends, their friends and.
Web Marketing Strategy DCU Sports Development Service.
Course 201 – Administration, Content Inspection and SSL VPN
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
資安新聞簡報 報告者:劉旭哲、曾家雄. Spam down, but malware up 報告者:劉旭哲.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
How To Manage Your Social Media Presence in Just 10 Minutes A Day! And be more popular than the local news guy!
Social Media for Credit Unions? Facebook – Getting Started Adding content Promoting Advertising Summary W E L O O K A T T H I N G S D I F F E R E N T.
About Facebook Facebook is a social networking service launched in February 2004, owned and operated by Facebook Inc. Facebook was founded by Mark Zuckerberg.
Social Media How Can This New Technology Possibly Help My Congregation?
Introduction Position your online or offline business Quickly and safely grow a huge army of potential clients Productively interact with your new and.
Introduction Position your online or offline business Quickly and safely grow a huge army of potential clients Productively interact with your new and.
FaceBook and Your Business Women in Technology in Nigeria Presented by Mrs M.O Alade Women in Technology in Nigeria
+ Cool Tools, New Rules Don Blake, PR State Relations National Education Association 2010 Membership Best Practices Summit.
Presenter: Evan Scoresby.  1.31 BILLION active users world wide  48% log on in any given day  Each user is connected on average to 80 different pages,
WHAT IS A WEBSITE AND HOW TO GET YOUR BUSINESS ONLINE Anna Gabali – 30/07/ MKLC.
Why I LIKE the Facebook Database… Sharon Viente May 2010.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Serving Sociologists | Advancing Sociology | Promoting Sociology to Society Facebook in the Classroom.
Facebook for Business Greg Clement and Rick Scheeser.
1 FACEBOOK: CAPITALIZING ON AN ECOSYSTEM Joseph Kusnick & Jeunetta Lewis.
Build Relationships and Build Business on Powered by Customer WOW Project.
1 Social Media and Volunteer Engagement Victoria Pacchiana, Online Communications Manager VolunteerMatch Webinar.
Privacy online for healthcare students and professionals.
Where the Wild Things (And People) Are: Facebook for Beginners.
 Computer News/Tip  Facebook  Your Computer Problems  Next meeting January 11th  New & website 
What is Spam? d min.
Social Media Primer. Social Media is Great For: Building awareness and attracting new business Fostering community Providing helpful content and information.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
Social Network Forensic By Xing Liu CSC153 Spring 2009.
Activity 4 Protecting Ourselves. Keeping Safe There are lots of different ways we can be at risk on the Internet. How can we protect ourselves and keep.
Facebook is a social utility that connects you with the people around you. Use Facebook to…  Keep up with friends and family  Share photos and videos.
With OVER 750 Million ACTIVE users it’s NO LONGER a question of ‘IF’ a business should have a Facebook Business Page (FanPage) Discover How QuarterMoonPlumbing.com.
Facebook 101 This class contains content from Saint Paul Public Libraries, Project for Pride in Living, and GCFLearnFree.org.
FriendFinder Location-aware social networking on mobile phones.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
Talks! Get Started on Facebook March 11, 2010 Audio is only available by calling this number: Conference Call: ; Access Code: or
URLs & Web Protocols 18 URLs & Web Protocols 18. URLs & Web Protocols 18 A URL is a web address Uniform Resource Locator You say it like ‘earl’ A resource.
Part 2: Putting a Social Spin on your Business with.
Course Title. You’re on Facebook… Now What? Grant Billings Why Being ‘Liked’ is Better than Having ‘Friends’ Just Now · 901 Million People Like Facebook·
AN INTRODUCTION TO FACEBOOK. Learning Objectives A brief introduction to the social networking site Facebook. Instructions to create an account. How to.
© Janice Regan, CMPT 128, Jan 2007 CMPT 371 Data Communications and Networking HTTP 0.
Computer Security Keeping you and your computer safe in the digital world.
Best Facebook Proxy Login Sites
Social Network.
Facebook in the Classroom
Common Methods Used to Commit Computer Crimes
Personal spaces.
Discover How Your Business Can Benefit from a Facebook Fanpage
Step-By-Step Guide To Install Kaspersky Internet Security For Mac.
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
Presentation transcript:

A Proxy-based Real-time Protection Mechanism for Social Networking Sites Presented by Omar Alzahrani A Proxy-based Real-Time Protection Omar Alzahrani 11/1 by Dwen Ren, Allen Chang, Sheng Chung, You Sheng

A Proxy-based Real-Time Protection Omar Alzahrani 11/2  Index:  Facts about Social Network ?  why should we worry about Social Network Security?  Facebook website threats.  Structures of Social Network.  Facebook website structure.  Paper’s propose.  Real-Time Webpage Scanning Service.  Protection Investigation: 1- Client side. 2- Official server side.

A Proxy-based Real-Time Protection Omar Alzahrani 11/3  Social Network such as ? and others !

 Facts about Facebook : In every 13 people on Earth is on Facebook. In every 13 people on Earth is on Facebook. In 20 minutes : In 20 minutes : 1,000,000 links are shared on Facebook 1,000,000 links are shared on Facebook. 1,851,000 status updates are entered million friend requests are accepted. 1,587,000 wall posts are written. Average user is connected to 80 community pages, groups and events. It is the second biggest website by traffic behind Google (at the moment). More than 650 million active users A Proxy-based Real-Time Protection Omar Alzahrani 11/4

why should we worry about Social Network Security?  why should we worry about Social Network Security? huge amount of unencrypted personal information. Personal information is displayed to public by default. Personal information is displayed to public by default. privacy leads to security issue. privacy leads to security issue. - example of privacy leads to security issue : - example of privacy leads to security issue : - Updates Hi guys… the next weekend I am gonna travel to LA….. I am so excited A Proxy-based Real-Time Protection Omar Alzahrani 11/5

Facebook website threats.  Facebook website threats. 1.Social Engineering. 2.Drive by Download. 3.Phishing. 4.Trojan. 5. Fake friendship invitation. A Proxy-based Real-Time Protection Omar Alzahrani 11/6

Structures of Social Network.  Structures of Social Network. FBML: Facebook Markup Language A Proxy-based Real-Time Protection Omar Alzahrani 11/7

Paper’s propose.  Paper’s propose. A real-time website security protection mechanism based on the concept of proxy. So the proxy is to detect and determine the security threats of the website A Proxy-based Real-Time Protection Omar Alzahrani 11/8

Real-Time Webpage Scanning Service.  Real-Time Webpage Scanning Service. A Proxy-based Real-Time Protection Omar Alzahrani 11/9

Protection Investigation:  Protection Investigation: 1- Client side. - Refer to personal privacy protection programs and solutions offered by scholars such as Facebook. - Make sure each other’s identity before adding to friend list. - Avoid reveling too much personal information. - Review fans groups and communities before join them. - Carefully check every applications before installation. 2- Official server side. - Use https or SSL for user login. This can prevent login information being intercepted due to plain text transmission. - Use secured channel to transmit data between servers. A Proxy-based Real-Time Protection Omar Alzahrani 11/10