Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Securing the Online Family-Social Network Security_Example v0.4

ali
by

Faham Usman

on 22 May 2014

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Securing the Online Family-Social Network Security_Example v0.4

Information Security
Securing the Online Family/Social Network Security
Awareness Campaign
Agenda
Salim is your Cyber Security Advisor.
Aims at promoting, building and ensuring a safer & secure cyber environment and culture in the UAE.
About aeCERT
One of the initiatives of the UAE Telecommunications Regulatory Authority.
aeCERT is the United Arab Emirates Computer Emergency Response Team.
aeCERT
Salim (aeCERT)
@salim_aecert
For more information
www.aecert.ae
info@aecert.ae
Questions
About aeCERT
Introduction
Facts About Online Social Media
The Changing Tech Environment
Threats to Online Social Networks
Ways to Safely Use Online Social Networks
Future of Social Media
Building Good Security Habits
Social Media Landscape
Social Media Effect

Facebook
See if you have any common friends.
Look for the number of friends. Usually accounts with a very high number of friends are fake accounts.
If the profile says that the person holds a higher office and the profile picture is of a youngster then it may be a fake profile.
If most of the friends in friends list are of opposite gender then the profile is most likely to be illegitimate.
How to Verify an Account?
Security Tips for Social Media Networks
Before adding, subscribing or following someone, always verify their account.
Use different passwords for every social media network website.
Use long and complex passwords consisting of alphabets, numbers and special characters.


Social Networks - Risks
Source: http://www.marketingcharts.com/wp/interactive/almost-all-global-execs-recognize-there-are-risks-to-social-tech-use-28192/
Social Media Risks
Threats to Online Social Networks
Source: http://www.pewinternet.org/Reports/2013/Teens-Social-Media-And-Privacy/Main-Report/Part-1.aspx
Social Media Effect
Social Media Stats for UAE
How to Verify an Account?

Twitter
Before following a person, look for their number of followers and following. If the number of following is way less than followers then there is a possibility that it is a bot.
Look at the tweets of an account, if a link from a particular website is shared multiple times then it would probably be a bot.
The growing popularity and convergence of social media and mobile to
deliver real-time tailored information will provide increased opportunity
for information collection and manipulation both in a positive and negative manner

Future of Social Media Security
Introduction
What is Social Media?

It is a term used to define channels or
websites that allow people from all
over the world to connect, interact and
socialize with each other.

Some of the common ways people
interact through are:

Content (blogs, personal information,
articles, etc)
Pictures
Videos
Ideas and status messages
Tagging
Facial Recognition
Implicit Release of Private Information
Threats to Online Social Networks
Privacy Issues
Once data is entered it is permanently there regardless of deleting it from the page.
Personal information collected by online social networks is shared with third-party applications.
Your kid may be the target of cyber-bullying if he/she:
Cyber Bullying: Parent’s Role
suddenly stops using computer, laptop or other gadgets, or simply turns them off.
shows nervousness when an instant message, text message or email message pops in.
looks upset or depressed after using gadgets.
doesn't want to share his/her online activities with parents.
immediately closes window on computer/laptop when someone approaches.
frequently talks about revenge.
frequently complains of illness.
seems depressed.
isolates from family and friends.
Cyber bullying is very hard to detect as it happens online.
Using internet to victimize, harass or humiliate other people.
Cyber Bullying
How to Secure Your Information
Do not allow your social network to scan your email address book as this may leak out email addresses of your friends.
Do not trust a message if it is from an unknown person.
When sharing information online, always keep in mind that whatever you are sharing, will remain on internet permanently even if you delete your account as it can be copied and re- shared again.
Ways to Safely Use Online Social Networks
Threats to Online Social Networks
Cyber Bullying: Parent’s Role
What to do if an Account Gets Stolen?
Report the case to the social media site.
Delete all the messages that were sent from your account while it was compromised.
Send a message to all your friends and followers stating that your account was compromised.
Revoke access to all the third-party applications associated with your social media account.
Contact support if the password cannot be reset through normal procedure.
Use ‘Forgot Password’ link to reset your password or just change your password if you feel like your account has been compromised.
What to do if an Account Gets Stolen?
See how many people have
recommended that person.
Verify if the company he/she
is working for is legitimate.

How to Verify an Account?
Source: http://www.veracode.com/resources/facebook-google-privacy-security
Social Media Privacy
Threats to Online Social Networks
Some apps also post messages on behalf of the user without their consent and knowledge.
Most of the third-party applications do not have a ‘Terms and Conditions’ section.
Third-party applications can be small plugins or individual applications that further require your permission to access your personal information.
Third-Party Applications
Third-party applications are usually in the form of games, videos, quizzes, etc and can typically be written by anyone.
Always tell your kids to keep their personal
information private.
Work with your kids’ teachers and other parents.
Keep an eye on your kids’ online activities.
Always discuss about internet with your kids.
Keep home computer in a central location.
Parents should take responsibility for the actions
of their children online.
Preventing Cyber Bullying
Static Web (when anti-viruses
and firewall were enough to
secure the system).

Dynamic web/distributed
environment
More (open) data means more security concerns.
Now:
Then:
Dramatic shifts in media and communication.

The Changing Tech Environment
89%
64%
28%
26%
24%
22%
21%
14%
Cyber Bullying Social Network Stats
Facts About Online Social Media
Security Tips for Social Media Networks
Always type the URL of social networking website on your browser.
Do not accept friend request from an unknown person unless you verify their account.
Do not click on any link (specially shortened URLs) from an unknown person.
Use privacy settings to limit who has access
to your personal information.
If you don’t like any information your friends shared about you, ask them to remove it.
Be careful about what you share about your friends as they might do the same with you.

How to Secure Your Information
Static
Social
Real-Time
Geo-located
Driving Technologies
Building Good Security Habits
Be a part of your kid’s friends list to keep a track of the posts (but make sure you are not on their limited profile).
Be sure to use parental control softwares for social media networks e.g. Norton Online Family Premier.
Supervise children when they are using social media websites.
Delete unneeded apps
Strong: P4ssw.rd
Weak: password
Password strength
Got a link from someone you don’t know?
Don’t open it without asking them first, bots
usually do not answer.

Keep a track of the apps you have authorized and
clean them out periodically
Providing as less information online as possible
Building Good Security Habits
Social Media Landscape
Avoid using social networking websites at work as it increases the chances of getting your account compromised.
Do not post too much personal information on the social media network because in case the account gets compromised, that personal information can be used against you (blackmailing).
How to Secure Your Information
Always keep an eye on the ever changing privacy policies of the social networks.
Cyber Bullying Stats
43%
Nearly 43% of kids have been bullied online. 1 in 4 has had it happen more than once.
Girls are about twice as likely as boys to be victims and perpetrators of cyber bullying.
What do teens share on social media?
Social Media Effect
Cyber Bullying Stats
Bullying victims are 2 to 9 times more likely to consider committing suicide.
300 million pictures
uploaded to Facebook
daily.
Over 175 million LinkedIn members in over 200 countries.
Over 150 million in U.S.
Over 450 million access
via mobile.

Over 900 million Facebook
users worldwide.

Over 140 million Twitter users; over 340
million Tweets sent daily.
Percent who share information on the profile they use most often
But is the information real?
26% of teen social media users say they post fake information on their profile to
Help protect their privacy.

Usually when parents recognize that their kids are vicim of cyber bullying, it is already very late.

Parents should always keep an eye over their kids when giving them liberty over social media or on internet in general.

Your kid may be involved in cyber-bullying if he/she:

displays intolerance towards other kids.
gets excited when he/she sees other kids conflicting.
seems to get satisfied from other kid’s discomfort.
uses computer, laptop or other gadgets frequently.
uses multiple online accounts for one service.
doesn't want to share his/her online activities with parents.
immediately closes window on computer/laptop when someone approaches.

70%
70% of students report seeing frequent bullying online.
68% of teens agree that cyber bullying is a serious problem.

Over 80% of teens use a cell phone regularly, making it the most common medium for cyber bullying.
80%
68%
Consider the threats when choosing a new social media website!
When deciding to create an account on a new social media website, it is important to know the website’s credibility.

Consider using the same criteria when entering personal information as you use on a website where you provide you credit card number.

Understand the privacy policy of the website.
Be careful with third-party applications
Limit personal information
Only accept friend requests from people you know directly.
Only post information that you are comfortable with.
Disallow apps to post data on your behalf

03
02
01
Do not allow your social network to scan your email address book as this may leak out email addresses of your friends.
See if the person is from your network or extended network.
Full transcript