TWITTER EDITION BEHAVIORAL ANALYSIS IN RISK MANAGEMENT CREATE HOMELAND SECURITY CENTER Continue.
Twitter Security
-
Upload
neal-chambers -
Category
Education
-
view
393 -
download
0
Transcript of Twitter Security
The Frontier ofTwitter
1) Early Adopters/Experimenters2) Utilizers/Sneezers3) Widespread Use4) Hackers and Spammers move in
Evolution of Major Technologies
Bad Security=Bad Reputation
Bad Reputation=Missed Connections
When you follow someone ...
DM me sometime!Don't mind if I do.By: Townend Photography
I have a treat for you.
Most Common URL Shorteners:tinyurl.com, bit.ly, j.mp, su.pr, ow.ly, tr.im, is.gd, twitpic.com
Tools to check URLS:
Tweetdeck
PowerTwitter for FireFox(You use FireFox right?)
Characteristics of Worm Messages: Ambiguous
Invite you to a quiz
Contain a leading question
What to Do Step 1
What to Do Step 2
Where do worms come from?
Back in the Good ol' Days (a year ago) ...
Oauth to the rescue! (sort of)
Oauth = Permanent Pipe to your account
Rule: When in doubt, revoke.
Action Steps1) Inform users they are hacked
2) Don't click on strange links (no, seriously don't)
3) Oauth = better, username/password = not so good
4) Set SocialToo.com filters