SlideShare ist ein Scribd-Unternehmen logo
1 von 15
Presented By El Rumi
@IDSECCONF 2011
Social Network & Facebook
Social Network




        Social Network is a social structure made up of individuals (or
 organizations) called "nodes", which are tied (connected) by one or more
 specific types of interdependency, such as friendship, kinship, common
 interest, financial exchange, dislike, sexual relationships, or relationships of
 beliefs, knowledge or prestige.
 (source: http://en.wikipedia.org/wiki/Social_network)
Social Network & Facebook
Facebook




   A “social networking” site
   Framework for information
   Complex control of who can see what
   Users have a “profile” with a picture* and other personal details as they
    wish, including “limited profile”
   Based on “Networks”
   Facebook creates a newsfeed based on what your “friends” are doing


  (source: http://users.ox.ac.uk/~tony/facebook.ppt)
Facebook Account Security




  (source: https://www.facebook.com/help/?faq=212183815469410)
True Story....
Let’s Start The Game
Proof of Concept! (Identification)
Proof of Concept! (Penetration)
Proof of Concept! (Penetration)
Proof of Concept! (Penetration)
Proof of Concept! (Owned)
Can We Prevent This?
Change Security Question?




     (source: https://www.facebook.com/help/?faq=163063243756483)
So?
 Hide Your Sensitive Data From Public.
 Hide Your Email From Public.
 Make Security Question :
   With Different Thing Answer But Easy To Remember.
   With Right Answer But Encrypted (md5, sha1, rot13, etc)
Video Demo
“If any skiddy community gets too big, we shut them down.
If any lamer causes too much trouble, we shut them down. If
any group keeps fucking stuff up, we stop them.”
-Elz (Kecoak Elektronik)-

(source: http://kecoak.org/log/2010/12/25/owned-and-exposed-pwned-
some-skiddy/)

Weitere ähnliche Inhalte

Was ist angesagt?

Social network privacy & security
Social network privacy & securitySocial network privacy & security
Social network privacy & securitynadikari123
 
FILM 260 Flipbook- Virtually Impossible? Privacy Within Social Media
FILM 260 Flipbook- Virtually Impossible? Privacy Within Social MediaFILM 260 Flipbook- Virtually Impossible? Privacy Within Social Media
FILM 260 Flipbook- Virtually Impossible? Privacy Within Social MediaNicoleDrutz
 
Northern District Department Head Meeting
Northern District Department Head MeetingNorthern District Department Head Meeting
Northern District Department Head MeetingGreg JOhll
 
07 12 19 Technologies And Polarities
07 12 19 Technologies And Polarities07 12 19 Technologies And Polarities
07 12 19 Technologies And PolaritiesJohn David Smith
 
Web 2thtrtgrst
Web 2thtrtgrstWeb 2thtrtgrst
Web 2thtrtgrstOnly1Sam
 
2013: Comp113 lecture 1 part two
2013: Comp113 lecture 1 part two2013: Comp113 lecture 1 part two
2013: Comp113 lecture 1 part twoCOMP 113
 
20090228 Cyber Safety
20090228 Cyber Safety20090228 Cyber Safety
20090228 Cyber Safetymkinzie
 
Web2.0 An Introduction
Web2.0 An IntroductionWeb2.0 An Introduction
Web2.0 An Introductionc_l_b
 
Presentation social media
Presentation social mediaPresentation social media
Presentation social mediaEduardo Ferro
 
New Media Technology- Cyber Society and the Interaction Channel
New Media Technology- Cyber Society and the Interaction ChannelNew Media Technology- Cyber Society and the Interaction Channel
New Media Technology- Cyber Society and the Interaction ChannelFaindra Jabbar
 
Media, Technology and Society - The new trends of social interaction
Media, Technology and Society - The new trends of social interactionMedia, Technology and Society - The new trends of social interaction
Media, Technology and Society - The new trends of social interactionFaindra Jabbar
 
Cloud Computing, Social Networking and Social Media
Cloud Computing, Social Networking and Social MediaCloud Computing, Social Networking and Social Media
Cloud Computing, Social Networking and Social MediaMolly Immendorf
 
Social Media Beyond Facebook and Twitter
Social Media Beyond Facebook and TwitterSocial Media Beyond Facebook and Twitter
Social Media Beyond Facebook and TwitterAALBC.com, LLC
 

Was ist angesagt? (20)

Social network privacy & security
Social network privacy & securitySocial network privacy & security
Social network privacy & security
 
FILM 260 Flipbook- Virtually Impossible? Privacy Within Social Media
FILM 260 Flipbook- Virtually Impossible? Privacy Within Social MediaFILM 260 Flipbook- Virtually Impossible? Privacy Within Social Media
FILM 260 Flipbook- Virtually Impossible? Privacy Within Social Media
 
Northern District Department Head Meeting
Northern District Department Head MeetingNorthern District Department Head Meeting
Northern District Department Head Meeting
 
YANCOI
YANCOIYANCOI
YANCOI
 
07 12 19 Technologies And Polarities
07 12 19 Technologies And Polarities07 12 19 Technologies And Polarities
07 12 19 Technologies And Polarities
 
Web 2thtrtgrst
Web 2thtrtgrstWeb 2thtrtgrst
Web 2thtrtgrst
 
2013: Comp113 lecture 1 part two
2013: Comp113 lecture 1 part two2013: Comp113 lecture 1 part two
2013: Comp113 lecture 1 part two
 
Internet
InternetInternet
Internet
 
Technology empowerment ict today
Technology empowerment ict todayTechnology empowerment ict today
Technology empowerment ict today
 
Class 3 ppt
Class 3 pptClass 3 ppt
Class 3 ppt
 
Web
WebWeb
Web
 
20090228 Cyber Safety
20090228 Cyber Safety20090228 Cyber Safety
20090228 Cyber Safety
 
Web2.0 An Introduction
Web2.0 An IntroductionWeb2.0 An Introduction
Web2.0 An Introduction
 
Presentation social media
Presentation social mediaPresentation social media
Presentation social media
 
New Media Technology- Cyber Society and the Interaction Channel
New Media Technology- Cyber Society and the Interaction ChannelNew Media Technology- Cyber Society and the Interaction Channel
New Media Technology- Cyber Society and the Interaction Channel
 
Media, Technology and Society - The new trends of social interaction
Media, Technology and Society - The new trends of social interactionMedia, Technology and Society - The new trends of social interaction
Media, Technology and Society - The new trends of social interaction
 
2.0
2.02.0
2.0
 
Cloud Computing, Social Networking and Social Media
Cloud Computing, Social Networking and Social MediaCloud Computing, Social Networking and Social Media
Cloud Computing, Social Networking and Social Media
 
What is Social Media?
What is Social Media?What is Social Media?
What is Social Media?
 
Social Media Beyond Facebook and Twitter
Social Media Beyond Facebook and TwitterSocial Media Beyond Facebook and Twitter
Social Media Beyond Facebook and Twitter
 

Andere mochten auch

Password hacking
Password hackingPassword hacking
Password hackingAbhay pal
 
Welcome to the world of hacking
Welcome to the world of hackingWelcome to the world of hacking
Welcome to the world of hackingTjylen Veselyj
 
Hacking with experts 3 (facebook hacking) by anurag dwivedi.
Hacking with experts 3 (facebook hacking) by anurag dwivedi.Hacking with experts 3 (facebook hacking) by anurag dwivedi.
Hacking with experts 3 (facebook hacking) by anurag dwivedi.Esteban Bedoya
 
Phone security code unlock message
Phone security code unlock messagePhone security code unlock message
Phone security code unlock messageMansoor Rafeeq
 
Samsung Mobile Phone Codes
Samsung Mobile Phone CodesSamsung Mobile Phone Codes
Samsung Mobile Phone CodesLenny Henningham
 
Butterfly group( facebook)
Butterfly group( facebook)Butterfly group( facebook)
Butterfly group( facebook)bushra1413
 
MEI Unlock - Use Any Network on your Smartphone without Restriction
MEI Unlock - Use Any Network on your Smartphone without RestrictionMEI Unlock - Use Any Network on your Smartphone without Restriction
MEI Unlock - Use Any Network on your Smartphone without RestrictionAlexia Ruby
 
Password Recovery Tools
Password Recovery ToolsPassword Recovery Tools
Password Recovery ToolsAndrey Belenko
 
All nokia master codes
All nokia master codesAll nokia master codes
All nokia master codesMuhammad Sadiq
 
HOW TO CHECK YOUR GIRLFRIENDS FACEBOOK MESSAGES
HOW TO CHECK YOUR GIRLFRIENDS FACEBOOK MESSAGESHOW TO CHECK YOUR GIRLFRIENDS FACEBOOK MESSAGES
HOW TO CHECK YOUR GIRLFRIENDS FACEBOOK MESSAGESBrown_Laura
 
Facebook Not Just a Social Network!
Facebook Not Just a Social Network!Facebook Not Just a Social Network!
Facebook Not Just a Social Network!Budi Khoirudin
 
Guide to hack Facebook Password
Guide to hack Facebook PasswordGuide to hack Facebook Password
Guide to hack Facebook Passwordauspiciousscene42
 
How to spy on facebook messenger
How to spy on facebook messengerHow to spy on facebook messenger
How to spy on facebook messengerkristin2603
 
Facebook Messages Demystified
Facebook Messages DemystifiedFacebook Messages Demystified
Facebook Messages DemystifiedNFN Labs
 

Andere mochten auch (17)

Password hacking
Password hackingPassword hacking
Password hacking
 
Welcome to the world of hacking
Welcome to the world of hackingWelcome to the world of hacking
Welcome to the world of hacking
 
Secret Codes
Secret CodesSecret Codes
Secret Codes
 
Hacking with experts 3 (facebook hacking) by anurag dwivedi.
Hacking with experts 3 (facebook hacking) by anurag dwivedi.Hacking with experts 3 (facebook hacking) by anurag dwivedi.
Hacking with experts 3 (facebook hacking) by anurag dwivedi.
 
Phone security code unlock message
Phone security code unlock messagePhone security code unlock message
Phone security code unlock message
 
Samsung Mobile Phone Codes
Samsung Mobile Phone CodesSamsung Mobile Phone Codes
Samsung Mobile Phone Codes
 
Butterfly group( facebook)
Butterfly group( facebook)Butterfly group( facebook)
Butterfly group( facebook)
 
MEI Unlock - Use Any Network on your Smartphone without Restriction
MEI Unlock - Use Any Network on your Smartphone without RestrictionMEI Unlock - Use Any Network on your Smartphone without Restriction
MEI Unlock - Use Any Network on your Smartphone without Restriction
 
Password Recovery Tools
Password Recovery ToolsPassword Recovery Tools
Password Recovery Tools
 
All nokia master codes
All nokia master codesAll nokia master codes
All nokia master codes
 
Nokia secret codes.
Nokia secret codes.Nokia secret codes.
Nokia secret codes.
 
HOW TO CHECK YOUR GIRLFRIENDS FACEBOOK MESSAGES
HOW TO CHECK YOUR GIRLFRIENDS FACEBOOK MESSAGESHOW TO CHECK YOUR GIRLFRIENDS FACEBOOK MESSAGES
HOW TO CHECK YOUR GIRLFRIENDS FACEBOOK MESSAGES
 
Food Fight—MPI St. Louis
Food Fight—MPI St. LouisFood Fight—MPI St. Louis
Food Fight—MPI St. Louis
 
Facebook Not Just a Social Network!
Facebook Not Just a Social Network!Facebook Not Just a Social Network!
Facebook Not Just a Social Network!
 
Guide to hack Facebook Password
Guide to hack Facebook PasswordGuide to hack Facebook Password
Guide to hack Facebook Password
 
How to spy on facebook messenger
How to spy on facebook messengerHow to spy on facebook messenger
How to spy on facebook messenger
 
Facebook Messages Demystified
Facebook Messages DemystifiedFacebook Messages Demystified
Facebook Messages Demystified
 

Ähnlich wie Social Network Security Best Practices

The Future of Social Networks: The Need for Semantics
The Future of Social Networks: The Need for SemanticsThe Future of Social Networks: The Need for Semantics
The Future of Social Networks: The Need for SemanticsJohn Breslin
 
The Social Semantic Web: An Introduction
The Social Semantic Web: An IntroductionThe Social Semantic Web: An Introduction
The Social Semantic Web: An IntroductionJohn Breslin
 
DM110 - Week 4 - Social Networks
DM110 - Week 4 - Social NetworksDM110 - Week 4 - Social Networks
DM110 - Week 4 - Social NetworksJohn Breslin
 
Social Semantic Web (Social Activity and Facebook)
Social Semantic Web (Social Activity and Facebook)Social Semantic Web (Social Activity and Facebook)
Social Semantic Web (Social Activity and Facebook)Myungjin Lee
 
Chapter 5 Groups & Networks
Chapter 5  Groups & NetworksChapter 5  Groups & Networks
Chapter 5 Groups & NetworksRay Brannon
 
Chapter 5 Groups & Networks
Chapter 5  Groups & NetworksChapter 5  Groups & Networks
Chapter 5 Groups & NetworksRay Brannon
 
Chapter 5 Groups & Networks
Chapter 5  Groups & NetworksChapter 5  Groups & Networks
Chapter 5 Groups & NetworksRay Brannon
 
Interactive Innovation Through Social Software And Web 2.0
Interactive Innovation Through Social Software And Web 2.0Interactive Innovation Through Social Software And Web 2.0
Interactive Innovation Through Social Software And Web 2.0Thomas Ryberg
 
Social Networking And Social Media May 5 2009 Final V1
Social Networking And Social Media May 5 2009  Final V1Social Networking And Social Media May 5 2009  Final V1
Social Networking And Social Media May 5 2009 Final V1Molly Immendorf
 
Social media for social learning
Social media for social learningSocial media for social learning
Social media for social learningLisa Colton
 
Social Networking and Collaboration Tools for Enterprise 2.0
Social Networking and Collaboration Tools for Enterprise 2.0Social Networking and Collaboration Tools for Enterprise 2.0
Social Networking and Collaboration Tools for Enterprise 2.0John Breslin
 
Social media impact on existing social relationships
Social media impact on existing social relationshipsSocial media impact on existing social relationships
Social media impact on existing social relationshipsElizabeth Gestier
 
Social networking
Social networkingSocial networking
Social networkingJohan Koren
 
Data Accessibility and Me: Introducing SIOC, FOAF and the Linked Data Web
Data Accessibility and Me: Introducing SIOC, FOAF and the Linked Data WebData Accessibility and Me: Introducing SIOC, FOAF and the Linked Data Web
Data Accessibility and Me: Introducing SIOC, FOAF and the Linked Data WebJohn Breslin
 
Challenging our Notions of Learning: Understanding How Web 2.0 Technology Wor...
Challenging our Notions of Learning: Understanding How Web 2.0 Technology Wor...Challenging our Notions of Learning: Understanding How Web 2.0 Technology Wor...
Challenging our Notions of Learning: Understanding How Web 2.0 Technology Wor...Paul Brown
 
Production Assignment
Production AssignmentProduction Assignment
Production Assignmentcrumbsy
 

Ähnlich wie Social Network Security Best Practices (20)

Social Networks
Social NetworksSocial Networks
Social Networks
 
The Future of Social Networks: The Need for Semantics
The Future of Social Networks: The Need for SemanticsThe Future of Social Networks: The Need for Semantics
The Future of Social Networks: The Need for Semantics
 
อบรม1
อบรม1อบรม1
อบรม1
 
The Social Semantic Web: An Introduction
The Social Semantic Web: An IntroductionThe Social Semantic Web: An Introduction
The Social Semantic Web: An Introduction
 
DM110 - Week 4 - Social Networks
DM110 - Week 4 - Social NetworksDM110 - Week 4 - Social Networks
DM110 - Week 4 - Social Networks
 
Social Semantic Web (Social Activity and Facebook)
Social Semantic Web (Social Activity and Facebook)Social Semantic Web (Social Activity and Facebook)
Social Semantic Web (Social Activity and Facebook)
 
Chapter 5 Groups & Networks
Chapter 5  Groups & NetworksChapter 5  Groups & Networks
Chapter 5 Groups & Networks
 
Chapter 5 Groups & Networks
Chapter 5  Groups & NetworksChapter 5  Groups & Networks
Chapter 5 Groups & Networks
 
Chapter 5 Groups & Networks
Chapter 5  Groups & NetworksChapter 5  Groups & Networks
Chapter 5 Groups & Networks
 
Interactive Innovation Through Social Software And Web 2.0
Interactive Innovation Through Social Software And Web 2.0Interactive Innovation Through Social Software And Web 2.0
Interactive Innovation Through Social Software And Web 2.0
 
Social Networking And Social Media May 5 2009 Final V1
Social Networking And Social Media May 5 2009  Final V1Social Networking And Social Media May 5 2009  Final V1
Social Networking And Social Media May 5 2009 Final V1
 
Social media for social learning
Social media for social learningSocial media for social learning
Social media for social learning
 
Social Networking and Collaboration Tools for Enterprise 2.0
Social Networking and Collaboration Tools for Enterprise 2.0Social Networking and Collaboration Tools for Enterprise 2.0
Social Networking and Collaboration Tools for Enterprise 2.0
 
Social Media
Social MediaSocial Media
Social Media
 
Julie Clegg
Julie CleggJulie Clegg
Julie Clegg
 
Social media impact on existing social relationships
Social media impact on existing social relationshipsSocial media impact on existing social relationships
Social media impact on existing social relationships
 
Social networking
Social networkingSocial networking
Social networking
 
Data Accessibility and Me: Introducing SIOC, FOAF and the Linked Data Web
Data Accessibility and Me: Introducing SIOC, FOAF and the Linked Data WebData Accessibility and Me: Introducing SIOC, FOAF and the Linked Data Web
Data Accessibility and Me: Introducing SIOC, FOAF and the Linked Data Web
 
Challenging our Notions of Learning: Understanding How Web 2.0 Technology Wor...
Challenging our Notions of Learning: Understanding How Web 2.0 Technology Wor...Challenging our Notions of Learning: Understanding How Web 2.0 Technology Wor...
Challenging our Notions of Learning: Understanding How Web 2.0 Technology Wor...
 
Production Assignment
Production AssignmentProduction Assignment
Production Assignment
 

Kürzlich hochgeladen

Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 

Kürzlich hochgeladen (20)

Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 

Social Network Security Best Practices

  • 1. Presented By El Rumi @IDSECCONF 2011
  • 2. Social Network & Facebook Social Network Social Network is a social structure made up of individuals (or organizations) called "nodes", which are tied (connected) by one or more specific types of interdependency, such as friendship, kinship, common interest, financial exchange, dislike, sexual relationships, or relationships of beliefs, knowledge or prestige. (source: http://en.wikipedia.org/wiki/Social_network)
  • 3. Social Network & Facebook Facebook  A “social networking” site  Framework for information  Complex control of who can see what  Users have a “profile” with a picture* and other personal details as they wish, including “limited profile”  Based on “Networks”  Facebook creates a newsfeed based on what your “friends” are doing (source: http://users.ox.ac.uk/~tony/facebook.ppt)
  • 4. Facebook Account Security (source: https://www.facebook.com/help/?faq=212183815469410)
  • 7. Proof of Concept! (Identification)
  • 8. Proof of Concept! (Penetration)
  • 9. Proof of Concept! (Penetration)
  • 10. Proof of Concept! (Penetration)
  • 11. Proof of Concept! (Owned)
  • 12. Can We Prevent This? Change Security Question? (source: https://www.facebook.com/help/?faq=163063243756483)
  • 13. So?  Hide Your Sensitive Data From Public.  Hide Your Email From Public.  Make Security Question :  With Different Thing Answer But Easy To Remember.  With Right Answer But Encrypted (md5, sha1, rot13, etc)
  • 15. “If any skiddy community gets too big, we shut them down. If any lamer causes too much trouble, we shut them down. If any group keeps fucking stuff up, we stop them.” -Elz (Kecoak Elektronik)- (source: http://kecoak.org/log/2010/12/25/owned-and-exposed-pwned- some-skiddy/)