SlideShare ist ein Scribd-Unternehmen logo
1 von 19
SECURITY DAY
FCIS’12
SOCIAL
NETWORKS SECURITY
TRACK II | GROUP 15
David Farid, Gamal El-Din Magdy, Hanan Yousry, John Samir and Kholoud Abd El-Salam




 FCIS SECURITY DAY 2012                    SOCIAL MEDIA SECURITY                     27-MAY-12
Agenda
SOME FACTS

SECURITY
ASPECTS
CHARACTERISTICS

SOCIAL NETWORKS
SUCCESS FACTORS
SWOT ANALYSIS
SECURITY BEHAVIOURS (TRENDS)

FCIS SECURITY DAY 2012   SOCIAL MEDIA SECURITY   27-MAY-12
#Fact 01
    SOCIAL NETWORKS USAGE




                                                                 LinkedIn
                                                                Twitter
✔                                                              Google+
                                                             MySpace
    References: BARRACUDALABS 2011
    FCIS SECURITY DAY 2012           SOCIAL MEDIA SECURITY                  27-MAY-12
#Fact 02
    IDENTITY VS PHYSICAL HARM




✔
✔

    References: BARRACUDALABS 2011
    FCIS SECURITY DAY 2012           SOCIAL MEDIA SECURITY   27-MAY-12
#Fact 03
    INFLUNCING FACTORS WHEN CHOOSING
    SOCIAL NETWORKS




                                       =
                                       almost




✔
✔
✔
    References: BARRACUDALABS 2011
    FCIS SECURITY DAY 2012           SOCIAL MEDIA SECURITY   27-MAY-12
Security Aspects




The Way
   CONNECTIONS ARE MADE TO THE MAIN INTERFACE.



FCIS SECURITY DAY 2012   SOCIAL MEDIA SECURITY   27-MAY-12
Security Aspects




The Way
 COMMUNICATION IS MANAGED INSIDE AND OUTSIDE
      THE COLLABORATIVE APPLICATION.


FCIS SECURITY DAY 2012   SOCIAL MEDIA SECURITY   27-MAY-12
Security Aspects




The Way
      ADDITIONAL PROCESSES CAN BE ADDED TO THE
     SYSTEM ON A SAFE AND EASY FASHION WITHOUT
     UPSET THE LEVEL OF RELIABILITY AND EFFICIENCY.

FCIS SECURITY DAY 2012    SOCIAL MEDIA SECURITY       27-MAY-12
Security Characteristics




                         UTHENTICITY



FCIS SECURITY DAY 2012    SOCIAL MEDIA SECURITY   27-MAY-12
Security Characteristics
SO, SOME OF COLLABORATIVE SYSTEMS
CONSIDER THAT BY HAVING PROCEDURES WITH




WHICH IS ABSOLUTELY      FALSE;


FCIS SECURITY DAY 2012                    SOCIAL MEDIA SECURITY   27-MAY-12
Knowledge Is a Vital fluid

#Rule IN SOCIAL NETWORKS
   IT MUST UNDERTAKE ALL THE PROCEDURES THAT ARE NECESSARY FOR
   CREATING A SAFETY AND HELPFUL ENVIRONMENT WITHOUT LOWERING

                            Usa

                              bility
                         Accessi




FCIS SECURITY DAY 2012             SOCIAL MEDIA SECURITY         27-MAY-12
Knowledge Is a Vital fluid
#WYSIWYG
SOCIAL NETWORK
---------------------------
             PROVIDING:
                          ✔ SAFETY ENVIRONMENT
                          ✔ HELPFUL ENVIRONMENT
                         ✔ Usability
                         ✔ Accessibility
                         ✔
            LEADS TO:




FCIS SECURITY DAY 2012                 SOCIAL MEDIA SECURITY   27-MAY-12
SWOT ANALAYSIS

               Strengths                                       Weaknesses


                                   S              W
               Authenticity                                    Bad qualified personnel
               Encryption                                      Improper network
               Confidentiality                                  infrastructure




             Opportunities                                      Threats



                                   O               T
             World Wide Web
                                                                Viruses
             Millions of users
                                                                Hackers
             Wide range of means
                                                                Negative publicity
             of publicity




FCIS SECURITY DAY 2012                 SOCIAL MEDIA SECURITY                             27-MAY-12
Security Behaviors (Trends)




                         BEHAVIORS OR TRENDS SOCIAL
                         NETWORKS TEND TO USE TO
                         SECURE THEIR USERS..



FCIS SECURITY DAY 2012      SOCIAL MEDIA SECURITY   27-MAY-12
Back End Security Behaviors
Case Study - Early of 2011
                                      Showed that

                                 - USERS AUTHENTICITY
                                   AND THE
                                   AUTHENTICATION
                                   PROCESS.

                                 - INFORMATION
                                   CONFIDENTIALITY.


FCIS SECURITY DAY 2012   SOCIAL MEDIA SECURITY        27-MAY-12
Back End Security Behaviors
                                   Case Study - Early of 2011


                                                - USERS AUTHENTICITY
These processes are implemented
through means of OAuth which is                   AND THE
an open protocol to allow secure                  AUTHENTICATION
API authorization.
                                                  PROCESS.
The process of authentication is
securely managed by using secure                - INFORMATION
a connection through HTTPS                        CONFIDENTIALITY.
protocol.



FCIS SECURITY DAY 2012                  SOCIAL MEDIA SECURITY        27-MAY-12
Front End Security Behaviors


                                 - SECURE BROWSING.
                                 - EMAIL / MOBILE
                                   LOGIN NOTIFICATIONS
                                   & APPROVALS.
                                 - RECOGNIZIED
                                   DEVICES.



FCIS SECURITY DAY 2012   SOCIAL MEDIA SECURITY      27-MAY-12
Front End Security Behaviors




FCIS SECURITY DAY 2012   SOCIAL MEDIA SECURITY   27-MAY-12
That`s all ..


    Questions ?
      THANK YOU !!

                                                                     TRACK II | GROUP 15
             David Farid, Gamal El-Din Magdy, Hanan Yousry, John Samir and Kholoud Abd El-Salam



FCIS SECURITY DAY 2012                       SOCIAL MEDIA SECURITY                      27-MAY-12

Weitere ähnliche Inhalte

Was ist angesagt?

Cybersecurity-Real World Approach FINAL 2-24-16
Cybersecurity-Real World Approach FINAL 2-24-16Cybersecurity-Real World Approach FINAL 2-24-16
Cybersecurity-Real World Approach FINAL 2-24-16
James Rutt
 
Advanced Physical Access for Dummies HID Global Edition
Advanced Physical Access for Dummies HID Global EditionAdvanced Physical Access for Dummies HID Global Edition
Advanced Physical Access for Dummies HID Global Edition
Michael Klein
 
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune SystemCybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
IBM Security
 

Was ist angesagt? (18)

The Importance of Consolidating Your Infrastructure Security – by United Secu...
The Importance of Consolidating Your Infrastructure Security – by United Secu...The Importance of Consolidating Your Infrastructure Security – by United Secu...
The Importance of Consolidating Your Infrastructure Security – by United Secu...
 
Cyber security awareness booklet for citizens from mahashtra cyber 10 jan2020
Cyber security awareness booklet for citizens from mahashtra cyber  10 jan2020Cyber security awareness booklet for citizens from mahashtra cyber  10 jan2020
Cyber security awareness booklet for citizens from mahashtra cyber 10 jan2020
 
IDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber SecurityIDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber Security
 
Key Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexKey Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence Index
 
SBIC Enterprise Information Security Strategic Technologies
SBIC Enterprise Information Security Strategic TechnologiesSBIC Enterprise Information Security Strategic Technologies
SBIC Enterprise Information Security Strategic Technologies
 
Information Security For Small Business
Information Security For Small BusinessInformation Security For Small Business
Information Security For Small Business
 
Cybersecurity in the Era of IoT
Cybersecurity in the Era of IoTCybersecurity in the Era of IoT
Cybersecurity in the Era of IoT
 
Information Security for Small Business
Information Security for Small BusinessInformation Security for Small Business
Information Security for Small Business
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Cybersecurity-Real World Approach FINAL 2-24-16
Cybersecurity-Real World Approach FINAL 2-24-16Cybersecurity-Real World Approach FINAL 2-24-16
Cybersecurity-Real World Approach FINAL 2-24-16
 
December ISSA Meeting Executive Security Presentation
December ISSA Meeting   Executive Security PresentationDecember ISSA Meeting   Executive Security Presentation
December ISSA Meeting Executive Security Presentation
 
Actiance enabling social_networks
Actiance enabling  social_networksActiance enabling  social_networks
Actiance enabling social_networks
 
Advanced Physical Access for Dummies HID Global Edition
Advanced Physical Access for Dummies HID Global EditionAdvanced Physical Access for Dummies HID Global Edition
Advanced Physical Access for Dummies HID Global Edition
 
Cyber War, Cyber Peace, Stones and Glass Houses
Cyber War, Cyber Peace, Stones and Glass HousesCyber War, Cyber Peace, Stones and Glass Houses
Cyber War, Cyber Peace, Stones and Glass Houses
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
 
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune SystemCybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
 
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
Dr Dev Kambhampati | Strategic Principles for Securing the Internet of Things...
 
Sarwono sutikno wisuda stsn - 10 nov 2015 v2
Sarwono sutikno   wisuda stsn - 10 nov 2015 v2Sarwono sutikno   wisuda stsn - 10 nov 2015 v2
Sarwono sutikno wisuda stsn - 10 nov 2015 v2
 

Ähnlich wie Social Networking Security Resaerch

Mr. Bulent Teksoz - Security trends and innovations
Mr. Bulent Teksoz  - Security trends and innovationsMr. Bulent Teksoz  - Security trends and innovations
Mr. Bulent Teksoz - Security trends and innovations
nooralmousa
 

Ähnlich wie Social Networking Security Resaerch (20)

Social Media Security Risk Slide Share Version
Social Media Security Risk Slide Share VersionSocial Media Security Risk Slide Share Version
Social Media Security Risk Slide Share Version
 
ZION: Security and Internet of Things
ZION: Security and Internet of ThingsZION: Security and Internet of Things
ZION: Security and Internet of Things
 
Online identity management al-ahram seminar
Online identity management   al-ahram seminarOnline identity management   al-ahram seminar
Online identity management al-ahram seminar
 
Outlook emerging security_technology_trends
Outlook emerging security_technology_trendsOutlook emerging security_technology_trends
Outlook emerging security_technology_trends
 
Data Breaches and the Social Web
Data Breaches and the Social WebData Breaches and the Social Web
Data Breaches and the Social Web
 
Data Protection for Higher Education
Data Protection for Higher EducationData Protection for Higher Education
Data Protection for Higher Education
 
Social Media in Egypt IOETI Conference 2011
Social Media in Egypt   IOETI Conference 2011Social Media in Egypt   IOETI Conference 2011
Social Media in Egypt IOETI Conference 2011
 
Cases
CasesCases
Cases
 
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
Rothke rsa 2012   what happens in vegas goes on youtube using social networks...Rothke rsa 2012   what happens in vegas goes on youtube using social networks...
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
 
MOBES project
MOBES projectMOBES project
MOBES project
 
Ernst & Youngin Liiketoiminnan lait -seminaari 14.2.2013 Helsingissä, Antti H...
Ernst & Youngin Liiketoiminnan lait -seminaari 14.2.2013 Helsingissä, Antti H...Ernst & Youngin Liiketoiminnan lait -seminaari 14.2.2013 Helsingissä, Antti H...
Ernst & Youngin Liiketoiminnan lait -seminaari 14.2.2013 Helsingissä, Antti H...
 
SolarWinds Federal Webinar: Government Cyber Security Survey: What you told us
SolarWinds Federal Webinar: Government Cyber Security Survey: What you told us SolarWinds Federal Webinar: Government Cyber Security Survey: What you told us
SolarWinds Federal Webinar: Government Cyber Security Survey: What you told us
 
Cloud Security by CK
Cloud Security by CKCloud Security by CK
Cloud Security by CK
 
cyber security.pdf
cyber security.pdfcyber security.pdf
cyber security.pdf
 
Cyber security
Cyber security Cyber security
Cyber security
 
Rombit LSEC IoTSecurity IoTSBOM CyberSec Europe 2022
Rombit LSEC IoTSecurity IoTSBOM CyberSec Europe 2022Rombit LSEC IoTSecurity IoTSBOM CyberSec Europe 2022
Rombit LSEC IoTSecurity IoTSBOM CyberSec Europe 2022
 
Security of Things World USA 2016 - Post Event Report
Security of Things World USA 2016 - Post Event ReportSecurity of Things World USA 2016 - Post Event Report
Security of Things World USA 2016 - Post Event Report
 
Mr. Bulent Teksoz - Security trends and innovations
Mr. Bulent Teksoz  - Security trends and innovationsMr. Bulent Teksoz  - Security trends and innovations
Mr. Bulent Teksoz - Security trends and innovations
 
20100224 Presentation at RGIT Mumbai - Information Security Awareness
20100224 Presentation at RGIT Mumbai - Information Security Awareness20100224 Presentation at RGIT Mumbai - Information Security Awareness
20100224 Presentation at RGIT Mumbai - Information Security Awareness
 
Information security
Information securityInformation security
Information security
 

Mehr von Gamal El-Din Magdy (6)

Introducing BTheBeat
Introducing BTheBeat Introducing BTheBeat
Introducing BTheBeat
 
You != a CV
You != a CVYou != a CV
You != a CV
 
Why do you interview the SCCI participants
Why do you interview the SCCI participantsWhy do you interview the SCCI participants
Why do you interview the SCCI participants
 
SCCI`11 CDs Quality Assurance
SCCI`11 CDs Quality Assurance SCCI`11 CDs Quality Assurance
SCCI`11 CDs Quality Assurance
 
Visual Media Was2Become
Visual Media Was2BecomeVisual Media Was2Become
Visual Media Was2Become
 
Moderators Training
Moderators TrainingModerators Training
Moderators Training
 

Kürzlich hochgeladen

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 

Kürzlich hochgeladen (20)

Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 

Social Networking Security Resaerch

  • 1. SECURITY DAY FCIS’12 SOCIAL NETWORKS SECURITY TRACK II | GROUP 15 David Farid, Gamal El-Din Magdy, Hanan Yousry, John Samir and Kholoud Abd El-Salam FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY 27-MAY-12
  • 2. Agenda SOME FACTS SECURITY ASPECTS CHARACTERISTICS SOCIAL NETWORKS SUCCESS FACTORS SWOT ANALYSIS SECURITY BEHAVIOURS (TRENDS) FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY 27-MAY-12
  • 3. #Fact 01 SOCIAL NETWORKS USAGE LinkedIn Twitter ✔ Google+ MySpace References: BARRACUDALABS 2011 FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY 27-MAY-12
  • 4. #Fact 02 IDENTITY VS PHYSICAL HARM ✔ ✔ References: BARRACUDALABS 2011 FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY 27-MAY-12
  • 5. #Fact 03 INFLUNCING FACTORS WHEN CHOOSING SOCIAL NETWORKS = almost ✔ ✔ ✔ References: BARRACUDALABS 2011 FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY 27-MAY-12
  • 6. Security Aspects The Way CONNECTIONS ARE MADE TO THE MAIN INTERFACE. FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY 27-MAY-12
  • 7. Security Aspects The Way COMMUNICATION IS MANAGED INSIDE AND OUTSIDE THE COLLABORATIVE APPLICATION. FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY 27-MAY-12
  • 8. Security Aspects The Way ADDITIONAL PROCESSES CAN BE ADDED TO THE SYSTEM ON A SAFE AND EASY FASHION WITHOUT UPSET THE LEVEL OF RELIABILITY AND EFFICIENCY. FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY 27-MAY-12
  • 9. Security Characteristics UTHENTICITY FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY 27-MAY-12
  • 10. Security Characteristics SO, SOME OF COLLABORATIVE SYSTEMS CONSIDER THAT BY HAVING PROCEDURES WITH WHICH IS ABSOLUTELY FALSE; FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY 27-MAY-12
  • 11. Knowledge Is a Vital fluid #Rule IN SOCIAL NETWORKS IT MUST UNDERTAKE ALL THE PROCEDURES THAT ARE NECESSARY FOR CREATING A SAFETY AND HELPFUL ENVIRONMENT WITHOUT LOWERING Usa bility Accessi FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY 27-MAY-12
  • 12. Knowledge Is a Vital fluid #WYSIWYG SOCIAL NETWORK --------------------------- PROVIDING: ✔ SAFETY ENVIRONMENT ✔ HELPFUL ENVIRONMENT ✔ Usability ✔ Accessibility ✔ LEADS TO: FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY 27-MAY-12
  • 13. SWOT ANALAYSIS Strengths Weaknesses S W Authenticity Bad qualified personnel Encryption Improper network Confidentiality infrastructure Opportunities Threats O T World Wide Web Viruses Millions of users Hackers Wide range of means Negative publicity of publicity FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY 27-MAY-12
  • 14. Security Behaviors (Trends) BEHAVIORS OR TRENDS SOCIAL NETWORKS TEND TO USE TO SECURE THEIR USERS.. FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY 27-MAY-12
  • 15. Back End Security Behaviors Case Study - Early of 2011 Showed that - USERS AUTHENTICITY AND THE AUTHENTICATION PROCESS. - INFORMATION CONFIDENTIALITY. FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY 27-MAY-12
  • 16. Back End Security Behaviors Case Study - Early of 2011 - USERS AUTHENTICITY These processes are implemented through means of OAuth which is AND THE an open protocol to allow secure AUTHENTICATION API authorization. PROCESS. The process of authentication is securely managed by using secure - INFORMATION a connection through HTTPS CONFIDENTIALITY. protocol. FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY 27-MAY-12
  • 17. Front End Security Behaviors - SECURE BROWSING. - EMAIL / MOBILE LOGIN NOTIFICATIONS & APPROVALS. - RECOGNIZIED DEVICES. FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY 27-MAY-12
  • 18. Front End Security Behaviors FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY 27-MAY-12
  • 19. That`s all .. Questions ? THANK YOU !! TRACK II | GROUP 15 David Farid, Gamal El-Din Magdy, Hanan Yousry, John Samir and Kholoud Abd El-Salam FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY 27-MAY-12

Hinweis der Redaktion

  1. Availabilitys