Social Networking Security Resaerch

Post on 03-Jul-2015

259 views 0 download

description

Faculty of Computers and Information Science ( FCIS ) Ain Shams University - Computer Science Department 2012 Security Day .. Inspired from Stefanos Karagos Presentaion - XPLAIN.CO and BARRACUDALABS

Transcript of Social Networking Security Resaerch

FCIS’12

27-MAY-12FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY

SECURITY DAY

NETWORKS SECURITYSOCIAL

TRACK II | GROUP 15David Farid, Gamal El-Din Magdy, Hanan Yousry, John Samir and Kholoud Abd El-Salam

Agenda

27-MAY-12FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY

SOME FACTS

SECURITYASPECTSCHARACTERISTICS

SOCIAL NETWORKS SUCCESS FACTORSSWOT ANALYSISSECURITY BEHAVIOURS (TRENDS)

#Fact 01SOCIAL NETWORKS USAGE

27-MAY-12FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY

LinkedIn

Twitter

Google+

MySpace

References: BARRACUDALABS 2011

#Fact 02IDENTITY VS PHYSICAL HARM

27-MAY-12FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY

References: BARRACUDALABS 2011

#Fact 03INFLUNCING FACTORS WHEN CHOOSING

SOCIAL NETWORKS

27-MAY-12FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY

almost

=

References: BARRACUDALABS 2011

Security Aspects

27-MAY-12FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY

The Way CONNECTIONS ARE MADE TO THE MAIN INTERFACE.

Security Aspects

27-MAY-12FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY

The Way COMMUNICATION IS MANAGED INSIDE AND OUTSIDE

THE COLLABORATIVE APPLICATION.

Security Aspects

27-MAY-12FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY

The Way ADDITIONAL PROCESSES CAN BE ADDED TO THE

SYSTEM ON A SAFE AND EASY FASHION WITHOUT UPSET THE LEVEL OF RELIABILITY AND EFFICIENCY.

Security Characteristics

27-MAY-12FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY

UTHENTICITY

Security Characteristics

SO, SOME OF COLLABORATIVE SYSTEMSCONSIDER THAT BY HAVING PROCEDURES WITH

WHICH IS ABSOLUTELY FALSE;

27-MAY-12FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY

Knowledge Is a Vital fluid

#Rule IN SOCIAL NETWORKS

IT MUST UNDERTAKE ALL THE PROCEDURES THAT ARE NECESSARY FOR

CREATING A SAFETY AND HELPFUL ENVIRONMENT WITHOUT LOWERING

27-MAY-12FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY

UsaAccessibility

Knowledge Is a Vital fluid

#WYSIWYG

SOCIAL NETWORK

PROVIDING:

✔ SAFETY ENVIRONMENT

✔ HELPFUL ENVIRONMENT

✔ Usability

✔ Accessibility

LEADS TO:

27-MAY-12FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY

---------------------------

SWOT ANALAYSIS

27-MAY-12FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY

S W

T

Strengths

AuthenticityEncryptionConfidentiality

Opportunities

World Wide WebMillions of usersWide range of means of publicity

Threats

VirusesHackersNegative publicityO

Weaknesses

Bad qualified personnelImproper networkinfrastructure

Security Behaviors (Trends)

27-MAY-12FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY

BEHAVIORS OR TRENDS SOCIAL NETWORKS TEND TO USE TO SECURE THEIR USERS..

Back End Security Behaviors

27-MAY-12FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY

Case Study - Early of 2011Showed that

- USERS AUTHENTICITY AND THE AUTHENTICATION PROCESS.

- INFORMATION CONFIDENTIALITY.

Back End Security Behaviors

27-MAY-12FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY

Case Study - Early of 2011

- USERS AUTHENTICITY AND THE AUTHENTICATION PROCESS.

- INFORMATION CONFIDENTIALITY.

These processes are implemented through means of OAuth which is an open protocol to allow secure API authorization.

The process of authentication is securely managed by using secure a connection through HTTPS protocol.

Front End Security Behaviors

27-MAY-12FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY

- SECURE BROWSING.- EMAIL / MOBILE

LOGIN NOTIFICATIONS & APPROVALS.

- RECOGNIZIED DEVICES.

Front End Security Behaviors

27-MAY-12FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY

That`s all ..

27-MAY-12FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY

Questions ?THANK YOU !!

TRACK II | GROUP 15David Farid, Gamal El-Din Magdy, Hanan Yousry, John Samir and Kholoud Abd El-Salam