SlideShare ist ein Scribd-Unternehmen logo
1 von 28
Social Networking Security
Issues
-Mangesh Gunjal
Social Networking Site…???
Threats Posing Risk to Social Networks
Digital Database Collection
Secondary Data Collection
Face Recognition
Content Based Image Retrieval
Image Data Linkability
Complete Account Deletion
Profile Squatting and Reputation Slander through ID
Theft
Continued…
Stalking
Bullying
Corporate Espionage
Spam
Cross Side Scripting
Spear Phishing
Infiltration of Networks
Digital Database Collection
Digital dossier of Personal Data for immoral
purposes
Regular Snapshots of entire network
Private Attributes can be accessed directly via
search
Miss out on Employment Opportunities
Information for negative use
E.g. Miss New Jersey Case
Secondary Data Collection
Personal Information to the Network Operator
E.g. time and length of connections
IP Address, other users’ profile visited
Messages sent and received
Powerful Data warehouse
Lack of Transparency about Data Collection
Privacy Policies tend to be vague
Transfer of Information to third party through resale
Example of Privacy Statement
“[SNS Provider] also logs non-personally identifiable
information including IP address, profile information,
aggregate
user data, and browser type, from users and visitors
to the site.
This data is used to manage the website, track
usage and
improve the website services. This non-personally-
identifiable
information may be shared with third-parties to
Face Recognition & CBIR
Face Recognition
User Provided Digital Images
They indentify the profile holder
Linking of Images Instances across services and websites
Content Based Image Recognition
Able to match features from Large Databases of Images
No Privacy control on the accountability on CBIR
Possibility of deducing User Location
May lead to Stalking, Blackmailing, Unwanted Marketing,
etc.
Image Data Linkability
Tag Images with metadata
Name of the person in the photo
Link to their profile
Their e-mail address
No control over images posted by others
Difficulty in Complete Account Deletion
Easy to remove Primary Pages
Secondary Info remains
Ambiguity over Information deletion upon account
closure
Facebook Privacy policy Statement:
“Removed information may persist in backup copies
for a reasonable period of time but will not be
generally available to members of Facebook.”
Manual Deletion is the only solution
Spam
Unsolicited messages
Free Traffic for the Spammers
Use of Specialized Spamming software – FriendBot
Provides links to Pornographic or other product sites
Links to phishing websites
Flood with Comments and Posts
Stealing Member’s Passwords to advertise on others
profiles
Traffic Overload
Loss Of Trust
Reduce the value of SNS if no. of fake profiles
Increases
Cross Side Scripting
Can post HTML code within profiles
SNS’s are vulnerable to XSS attacks
SAMY virus
Denial of Service
Spear Phishing
Highly personalized Phishing Attack
The worm JS/Quickspace.A was designed to
spread up through MySpace pages.
Effective Form of Phishing Attack
Identity Theft
Reputation Damage
Infiltration of Networks
Weak First line of Defense
FriendBot and FriendBlasterPro- commercial software
No implementations of CAPTCHA’s
SOPHOS- an Antivirus company Case Study
Polluting SNSs’ with irrelevant misleading Profiles
Allows to view Private Information
Conducts spamming and marketing campaigns
Profile Squatting & Reputation Slander
Fake Profiles
Profiles of Dead Celebrities
Galileo on MySpace (as well as over 3000 Friends)
Weak Authentication of Registration
Most unlikely the person
Easy to target the abuse at the people (e.g. Class
Teacher)
Damage Reputation
Phishing
Marketing under false pretences
Stalking
Involves threatening behaviour
Seeks repeated contacts through any means
SNSs’ are an easy means for stalking
SNSs’ emphasize on location data
Loss of Privacy
Physical Harm and psychological Damage
Bullying
Repeated and Purposeful acts of harm that are carried
out using technology.
The ease of remaining anonymous
The one-stop-shop effect
The generation gap
Forms Of CyberBullying:
Flaming
Harassment
Denigration
Impersonation
Outing
Trickery
Exclusion
Corporate Espionage
Its an Underrated Risk to Corporate Infrastructure
Access Sensitive Enterprise Data; mostly by using
Employees themselves
Privacy Settings are neglected
Threshold for gaining information is very low
Lists of employees and connections between them
Stakeholders Information
Publication of information about its infrastructure, network
directories.
Loss of Corporate Intellectual Property
Blackmailing
Access Physical assets
Which Social Network do you think poses the
biggest Risk to Security…???
Courtesy: SOPHOS Security Threat Report
2010
Social Networks Spam, Phishing and Malware
Report for year 2009
Courtesy: SOPHOS Security Threat Report
2010
Malwares, Number One Concern for the Firms
with Social Nerworks.
Courtesy: SOPHOS Security Threat Report
2010
Permission to Access Basic Information
Recommendations and Suggestions
Encourage Awareness raising and Educational
Campaigns
Review and Reinterpret Regulatory Framework
Increase Transparency of Data handling Practices
Discourage Banning of SNSs’ in Schools
Promote Stronger Authentication and Access control
Implement Countermeasures against Corporate
Espionage
Maximize Possibilities for Reporting and Detecting
Abuse
Set Appropriate Defaults
Require the Consent of the Data Subject to include
Profile Tags or e-mail Address Tags in Images
Social Networking Security Issues- Legal Aspects
Section 66A: Punishment for sending offensive messages
through service, etc.
Imprisonment may extend to Three years and with fine
Section 66B: Punishment for dishonestly receiving stolen
computer resource or communication device
Imprisonment may extend to Three years and with fine up to
Rs.1Lakh or Both
Section 66C: Punishment for Identity Theft
Imprisonment of either description term up to 3 years and fine up
to Rs.1Lakh
Section 66D: Punishment for cheating by personation by using
computer resource
Imprisonment may extend to Three years and with fine up to
Rs.1Lakh or with both
Section 66E: Punishment for violation of Privacy
Imprisonment may extend to Three years and with fine up to
Rs.1Lakh or with both
Continued…
Section 66F: Punishment for Cyber Terrorism
Imprisonment which may extend to imprisonment for life
Section 67: Punishment for publishing or transmitting Obscene
material in electronic form
Imprisonment of either description up to three years and fine of up
to Rs. 5Lakh.
Section 67A: Punishment for publishing or transmitting of
material containing sexually explicit act, etc., in electronic
form.
Imprisonment of either description up to five years and fine of up
to Rs. 10Lakh.
Section 67B: Punishment for publishing or transmitting of
material depicting children in sexually explicit act, etc., in
electronic form.
Imprisonment of either description up to three years and fine of up
to Rs. 5Lakh.
Conclusion
If used correctly enhances Data Privacy providing
Interactive User Generated Content to anyone, if not
it provides a dangerously powerful tool in the hands
of Spammers, unscrupulous marketers and other
who may take criminal advantages of Users.
References
SOPHOS Security Report 2010
European Network and Information Security Agency
Report
Questions…???

Weitere ähnliche Inhalte

Was ist angesagt?

Data Privacy
Data PrivacyData Privacy
Data PrivacyHome
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationJamie Proctor-Brassard
 
Phishing Attack : A big Threat
Phishing Attack : A big ThreatPhishing Attack : A big Threat
Phishing Attack : A big Threatsourav newatia
 
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanHow to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanControlScan, Inc.
 
Online Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safelyOnline Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safelyTom Eston
 
Phishing: Swiming with the sharks
Phishing: Swiming with the sharksPhishing: Swiming with the sharks
Phishing: Swiming with the sharksNalneesh Gaur
 
OWASP Mobile Security: Top 10 Risks for 2017
OWASP Mobile Security: Top 10 Risks for 2017OWASP Mobile Security: Top 10 Risks for 2017
OWASP Mobile Security: Top 10 Risks for 2017TecsyntSolutions
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingWilliam Mann
 
Phishing techniques
Phishing techniquesPhishing techniques
Phishing techniquesSushil Kumar
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case studyShubh Thakkar
 
Customer information security awareness training
Customer information security awareness trainingCustomer information security awareness training
Customer information security awareness trainingAbdalrhmanTHassan
 
Network security
Network securityNetwork security
Network securitytoamma
 

Was ist angesagt? (20)

Data Privacy
Data PrivacyData Privacy
Data Privacy
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness Presentation
 
Cyber Security Terms
Cyber Security TermsCyber Security Terms
Cyber Security Terms
 
Phishing Attack : A big Threat
Phishing Attack : A big ThreatPhishing Attack : A big Threat
Phishing Attack : A big Threat
 
Social Networking Security
Social Networking SecuritySocial Networking Security
Social Networking Security
 
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanHow to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
 
Online Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safelyOnline Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safely
 
Phishing: Swiming with the sharks
Phishing: Swiming with the sharksPhishing: Swiming with the sharks
Phishing: Swiming with the sharks
 
WhatsApp security
WhatsApp securityWhatsApp security
WhatsApp security
 
OWASP Mobile Security: Top 10 Risks for 2017
OWASP Mobile Security: Top 10 Risks for 2017OWASP Mobile Security: Top 10 Risks for 2017
OWASP Mobile Security: Top 10 Risks for 2017
 
Owasp Top 10 A1: Injection
Owasp Top 10 A1: InjectionOwasp Top 10 A1: Injection
Owasp Top 10 A1: Injection
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Phishing techniques
Phishing techniquesPhishing techniques
Phishing techniques
 
Network security
Network securityNetwork security
Network security
 
Application Security
Application SecurityApplication Security
Application Security
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case study
 
Cyber attacks
Cyber attacks Cyber attacks
Cyber attacks
 
Customer information security awareness training
Customer information security awareness trainingCustomer information security awareness training
Customer information security awareness training
 
ip spoofing
ip spoofingip spoofing
ip spoofing
 
Network security
Network securityNetwork security
Network security
 

Andere mochten auch

Privacy issues in social networking
Privacy issues in social networkingPrivacy issues in social networking
Privacy issues in social networkingBryan Tran
 
Social network privacy & security
Social network privacy & securitySocial network privacy & security
Social network privacy & securitynadikari123
 
Virtualization presentation
Virtualization presentationVirtualization presentation
Virtualization presentationMangesh Gunjal
 
Government Web Application Security: Issues and Challenges - A Case of India
Government Web Application Security: Issues and Challenges - A Case of IndiaGovernment Web Application Security: Issues and Challenges - A Case of India
Government Web Application Security: Issues and Challenges - A Case of IndiaEditor IJCATR
 
The top 10 security issues in web applications
The top 10 security issues in web applicationsThe top 10 security issues in web applications
The top 10 security issues in web applicationsDevnology
 
Privacy in Social Network Sites
Privacy in Social Network SitesPrivacy in Social Network Sites
Privacy in Social Network Sitesdariphagen
 
Atividade de Redação
Atividade de RedaçãoAtividade de Redação
Atividade de RedaçãoMaytê Mélo
 
Ethical Issues in Social Media
Ethical Issues in Social MediaEthical Issues in Social Media
Ethical Issues in Social Mediaattractalagan
 
Querigma parte por parte
Querigma parte por parteQuerigma parte por parte
Querigma parte por parteCassio Felipe
 
Ethics and Social Media
Ethics and Social MediaEthics and Social Media
Ethics and Social MediaPhysiopedia
 
Building relationships through conversations
Building relationships through conversationsBuilding relationships through conversations
Building relationships through conversationsLearning Forward
 
[PyConTW 2013] doctest
[PyConTW 2013] doctest[PyConTW 2013] doctest
[PyConTW 2013] doctestJenny Liang
 
Наш подводный мир
Наш  подводный  мирНаш  подводный  мир
Наш подводный мирAkuJIa
 
Cfo act of 1990 driving the transformation of federal financial management
Cfo act of 1990 driving the transformation of federal financial managementCfo act of 1990 driving the transformation of federal financial management
Cfo act of 1990 driving the transformation of federal financial managementxiguaatsumi
 

Andere mochten auch (20)

Privacy issues in social networking
Privacy issues in social networkingPrivacy issues in social networking
Privacy issues in social networking
 
Social network privacy & security
Social network privacy & securitySocial network privacy & security
Social network privacy & security
 
Virtualization presentation
Virtualization presentationVirtualization presentation
Virtualization presentation
 
Government Web Application Security: Issues and Challenges - A Case of India
Government Web Application Security: Issues and Challenges - A Case of IndiaGovernment Web Application Security: Issues and Challenges - A Case of India
Government Web Application Security: Issues and Challenges - A Case of India
 
The top 10 security issues in web applications
The top 10 security issues in web applicationsThe top 10 security issues in web applications
The top 10 security issues in web applications
 
Privacy in Social Network Sites
Privacy in Social Network SitesPrivacy in Social Network Sites
Privacy in Social Network Sites
 
Atividade de Redação
Atividade de RedaçãoAtividade de Redação
Atividade de Redação
 
Social media and ethics
Social media and ethicsSocial media and ethics
Social media and ethics
 
Ethical Issues in Social Media
Ethical Issues in Social MediaEthical Issues in Social Media
Ethical Issues in Social Media
 
Termoquímica
TermoquímicaTermoquímica
Termoquímica
 
Querigma parte por parte
Querigma parte por parteQuerigma parte por parte
Querigma parte por parte
 
Ethics and Social Media
Ethics and Social MediaEthics and Social Media
Ethics and Social Media
 
Proyecto taller primeros auxilios i
Proyecto taller primeros auxilios iProyecto taller primeros auxilios i
Proyecto taller primeros auxilios i
 
Building relationships through conversations
Building relationships through conversationsBuilding relationships through conversations
Building relationships through conversations
 
Barr cc slides
Barr cc slidesBarr cc slides
Barr cc slides
 
[PyConTW 2013] doctest
[PyConTW 2013] doctest[PyConTW 2013] doctest
[PyConTW 2013] doctest
 
Наш подводный мир
Наш  подводный  мирНаш  подводный  мир
Наш подводный мир
 
O señor mago
O señor magoO señor mago
O señor mago
 
Cfo act of 1990 driving the transformation of federal financial management
Cfo act of 1990 driving the transformation of federal financial managementCfo act of 1990 driving the transformation of federal financial management
Cfo act of 1990 driving the transformation of federal financial management
 
Circuit Breakers Brochure by CGSL
Circuit Breakers Brochure  by CGSLCircuit Breakers Brochure  by CGSL
Circuit Breakers Brochure by CGSL
 

Ähnlich wie Social Networking Security Issues

phishingppt-160209144204.pdf
phishingppt-160209144204.pdfphishingppt-160209144204.pdf
phishingppt-160209144204.pdfvinayakjadhav94
 
phishing-technology-730-J1A0e1Q.pptx
phishing-technology-730-J1A0e1Q.pptxphishing-technology-730-J1A0e1Q.pptx
phishing-technology-730-J1A0e1Q.pptxMaheshDhope1
 
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...IJCSIS Research Publications
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingmentAswani34
 
The Evolution of Phising Attacks
The Evolution of Phising AttacksThe Evolution of Phising Attacks
The Evolution of Phising AttacksBee_Ware
 
Attacking the Privacy of Social Network users (HITB 2011)
Attacking the Privacy of Social Network users (HITB 2011)Attacking the Privacy of Social Network users (HITB 2011)
Attacking the Privacy of Social Network users (HITB 2011)Marco Balduzzi
 
19012021039_Assignment-FCL.dcx
19012021039_Assignment-FCL.dcx19012021039_Assignment-FCL.dcx
19012021039_Assignment-FCL.dcxPateljignesh40
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber securityjyoti_lakhani
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environmentelijahj01012
 
Cybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteCybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteRapidSSLOnline.com
 
E0334035040
E0334035040E0334035040
E0334035040theijes
 
Data privacy over internet
Data privacy over internetData privacy over internet
Data privacy over internetdevashishicai
 
Improving Phishing URL Detection Using Fuzzy Association Mining
Improving Phishing URL Detection Using Fuzzy Association MiningImproving Phishing URL Detection Using Fuzzy Association Mining
Improving Phishing URL Detection Using Fuzzy Association Miningtheijes
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxDominicCaling
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information SecurityMichele Thomas
 

Ähnlich wie Social Networking Security Issues (20)

Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
phishingppt-160209144204.pdf
phishingppt-160209144204.pdfphishingppt-160209144204.pdf
phishingppt-160209144204.pdf
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
phishing-technology-730-J1A0e1Q.pptx
phishing-technology-730-J1A0e1Q.pptxphishing-technology-730-J1A0e1Q.pptx
phishing-technology-730-J1A0e1Q.pptx
 
PPT on Phishing
PPT on PhishingPPT on Phishing
PPT on Phishing
 
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingment
 
The Evolution of Phising Attacks
The Evolution of Phising AttacksThe Evolution of Phising Attacks
The Evolution of Phising Attacks
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media Security
 
Attacking the Privacy of Social Network users (HITB 2011)
Attacking the Privacy of Social Network users (HITB 2011)Attacking the Privacy of Social Network users (HITB 2011)
Attacking the Privacy of Social Network users (HITB 2011)
 
19012021039_Assignment-FCL.dcx
19012021039_Assignment-FCL.dcx19012021039_Assignment-FCL.dcx
19012021039_Assignment-FCL.dcx
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environment
 
Cybercrime - An essential guide from Thawte
Cybercrime - An essential guide from ThawteCybercrime - An essential guide from Thawte
Cybercrime - An essential guide from Thawte
 
E0334035040
E0334035040E0334035040
E0334035040
 
Introduction.pptx
Introduction.pptxIntroduction.pptx
Introduction.pptx
 
Data privacy over internet
Data privacy over internetData privacy over internet
Data privacy over internet
 
Improving Phishing URL Detection Using Fuzzy Association Mining
Improving Phishing URL Detection Using Fuzzy Association MiningImproving Phishing URL Detection Using Fuzzy Association Mining
Improving Phishing URL Detection Using Fuzzy Association Mining
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptx
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information Security
 

Kürzlich hochgeladen

Night 7k Call Girls Noida New Ashok Nagar Escorts Call Me: 8448380779
Night 7k Call Girls Noida New Ashok Nagar Escorts Call Me: 8448380779Night 7k Call Girls Noida New Ashok Nagar Escorts Call Me: 8448380779
Night 7k Call Girls Noida New Ashok Nagar Escorts Call Me: 8448380779Delhi Call girls
 
CASH PAYMENT ON GIRL HAND TO HAND HOUSEWIFE
CASH PAYMENT ON GIRL HAND TO HAND HOUSEWIFECASH PAYMENT ON GIRL HAND TO HAND HOUSEWIFE
CASH PAYMENT ON GIRL HAND TO HAND HOUSEWIFECall girl Jaipur
 
Top Call Girls In Charbagh ( Lucknow ) 🔝 8923113531 🔝 Cash Payment
Top Call Girls In Charbagh ( Lucknow  ) 🔝 8923113531 🔝  Cash PaymentTop Call Girls In Charbagh ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment
Top Call Girls In Charbagh ( Lucknow ) 🔝 8923113531 🔝 Cash Paymentanilsa9823
 
Social media marketing/Seo expert and digital marketing
Social media marketing/Seo expert and digital marketingSocial media marketing/Seo expert and digital marketing
Social media marketing/Seo expert and digital marketingSheikhSaifAli1
 
Production diary Film the city powerpoint
Production diary Film the city powerpointProduction diary Film the city powerpoint
Production diary Film the city powerpointAshtonCains
 
Hire↠Young Call Girls in Hari Nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esco...
Hire↠Young Call Girls in Hari Nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esco...Hire↠Young Call Girls in Hari Nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esco...
Hire↠Young Call Girls in Hari Nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esco...Delhi Call girls
 
Film show evaluation powerpoint for site
Film show evaluation powerpoint for siteFilm show evaluation powerpoint for site
Film show evaluation powerpoint for siteAshtonCains
 
Elite Class ➥8448380779▻ Call Girls In New Friends Colony Delhi NCR
Elite Class ➥8448380779▻ Call Girls In New Friends Colony Delhi NCRElite Class ➥8448380779▻ Call Girls In New Friends Colony Delhi NCR
Elite Class ➥8448380779▻ Call Girls In New Friends Colony Delhi NCRDelhi Call girls
 
Stunning ➥8448380779▻ Call Girls In Paharganj Delhi NCR
Stunning ➥8448380779▻ Call Girls In Paharganj Delhi NCRStunning ➥8448380779▻ Call Girls In Paharganj Delhi NCR
Stunning ➥8448380779▻ Call Girls In Paharganj Delhi NCRDelhi Call girls
 
9990611130 Find & Book Russian Call Girls In Crossings Republik
9990611130 Find & Book Russian Call Girls In Crossings Republik9990611130 Find & Book Russian Call Girls In Crossings Republik
9990611130 Find & Book Russian Call Girls In Crossings RepublikGenuineGirls
 
Night 7k Call Girls Noida Sector 120 Call Me: 8448380779
Night 7k Call Girls Noida Sector 120 Call Me: 8448380779Night 7k Call Girls Noida Sector 120 Call Me: 8448380779
Night 7k Call Girls Noida Sector 120 Call Me: 8448380779Delhi Call girls
 
CALL ON ➥8923113531 🔝Call Girls Ashiyana Colony Lucknow best sexual service O...
CALL ON ➥8923113531 🔝Call Girls Ashiyana Colony Lucknow best sexual service O...CALL ON ➥8923113531 🔝Call Girls Ashiyana Colony Lucknow best sexual service O...
CALL ON ➥8923113531 🔝Call Girls Ashiyana Colony Lucknow best sexual service O...anilsa9823
 
Improve Your Brand in Waco with a Professional Social Media Marketing Company
Improve Your Brand in Waco with a Professional Social Media Marketing CompanyImprove Your Brand in Waco with a Professional Social Media Marketing Company
Improve Your Brand in Waco with a Professional Social Media Marketing CompanyWSI INTERNET PARTNER
 
Ready to get noticed? Partner with Sociocosmos
Ready to get noticed? Partner with SociocosmosReady to get noticed? Partner with Sociocosmos
Ready to get noticed? Partner with SociocosmosSocioCosmos
 
Craft Your Legacy: Invest in YouTube Presence from Sociocosmos"
Craft Your Legacy: Invest in YouTube Presence from Sociocosmos"Craft Your Legacy: Invest in YouTube Presence from Sociocosmos"
Craft Your Legacy: Invest in YouTube Presence from Sociocosmos"SocioCosmos
 
Film show pre-production powerpoint for site
Film show pre-production powerpoint for siteFilm show pre-production powerpoint for site
Film show pre-production powerpoint for siteAshtonCains
 
Your LinkedIn Makeover: Sociocosmos Presence Package
Your LinkedIn Makeover: Sociocosmos Presence PackageYour LinkedIn Makeover: Sociocosmos Presence Package
Your LinkedIn Makeover: Sociocosmos Presence PackageSocioCosmos
 
Vellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Vellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceVellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Vellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceDamini Dixit
 

Kürzlich hochgeladen (20)

Night 7k Call Girls Noida New Ashok Nagar Escorts Call Me: 8448380779
Night 7k Call Girls Noida New Ashok Nagar Escorts Call Me: 8448380779Night 7k Call Girls Noida New Ashok Nagar Escorts Call Me: 8448380779
Night 7k Call Girls Noida New Ashok Nagar Escorts Call Me: 8448380779
 
CASH PAYMENT ON GIRL HAND TO HAND HOUSEWIFE
CASH PAYMENT ON GIRL HAND TO HAND HOUSEWIFECASH PAYMENT ON GIRL HAND TO HAND HOUSEWIFE
CASH PAYMENT ON GIRL HAND TO HAND HOUSEWIFE
 
Top Call Girls In Charbagh ( Lucknow ) 🔝 8923113531 🔝 Cash Payment
Top Call Girls In Charbagh ( Lucknow  ) 🔝 8923113531 🔝  Cash PaymentTop Call Girls In Charbagh ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment
Top Call Girls In Charbagh ( Lucknow ) 🔝 8923113531 🔝 Cash Payment
 
Social media marketing/Seo expert and digital marketing
Social media marketing/Seo expert and digital marketingSocial media marketing/Seo expert and digital marketing
Social media marketing/Seo expert and digital marketing
 
Production diary Film the city powerpoint
Production diary Film the city powerpointProduction diary Film the city powerpoint
Production diary Film the city powerpoint
 
Hire↠Young Call Girls in Hari Nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esco...
Hire↠Young Call Girls in Hari Nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esco...Hire↠Young Call Girls in Hari Nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esco...
Hire↠Young Call Girls in Hari Nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esco...
 
Film show evaluation powerpoint for site
Film show evaluation powerpoint for siteFilm show evaluation powerpoint for site
Film show evaluation powerpoint for site
 
Elite Class ➥8448380779▻ Call Girls In New Friends Colony Delhi NCR
Elite Class ➥8448380779▻ Call Girls In New Friends Colony Delhi NCRElite Class ➥8448380779▻ Call Girls In New Friends Colony Delhi NCR
Elite Class ➥8448380779▻ Call Girls In New Friends Colony Delhi NCR
 
Stunning ➥8448380779▻ Call Girls In Paharganj Delhi NCR
Stunning ➥8448380779▻ Call Girls In Paharganj Delhi NCRStunning ➥8448380779▻ Call Girls In Paharganj Delhi NCR
Stunning ➥8448380779▻ Call Girls In Paharganj Delhi NCR
 
9990611130 Find & Book Russian Call Girls In Crossings Republik
9990611130 Find & Book Russian Call Girls In Crossings Republik9990611130 Find & Book Russian Call Girls In Crossings Republik
9990611130 Find & Book Russian Call Girls In Crossings Republik
 
🔝9953056974 🔝Call Girls In Mehrauli Escort Service Delhi NCR
🔝9953056974 🔝Call Girls In Mehrauli  Escort Service Delhi NCR🔝9953056974 🔝Call Girls In Mehrauli  Escort Service Delhi NCR
🔝9953056974 🔝Call Girls In Mehrauli Escort Service Delhi NCR
 
Night 7k Call Girls Noida Sector 120 Call Me: 8448380779
Night 7k Call Girls Noida Sector 120 Call Me: 8448380779Night 7k Call Girls Noida Sector 120 Call Me: 8448380779
Night 7k Call Girls Noida Sector 120 Call Me: 8448380779
 
CALL ON ➥8923113531 🔝Call Girls Ashiyana Colony Lucknow best sexual service O...
CALL ON ➥8923113531 🔝Call Girls Ashiyana Colony Lucknow best sexual service O...CALL ON ➥8923113531 🔝Call Girls Ashiyana Colony Lucknow best sexual service O...
CALL ON ➥8923113531 🔝Call Girls Ashiyana Colony Lucknow best sexual service O...
 
Improve Your Brand in Waco with a Professional Social Media Marketing Company
Improve Your Brand in Waco with a Professional Social Media Marketing CompanyImprove Your Brand in Waco with a Professional Social Media Marketing Company
Improve Your Brand in Waco with a Professional Social Media Marketing Company
 
Ready to get noticed? Partner with Sociocosmos
Ready to get noticed? Partner with SociocosmosReady to get noticed? Partner with Sociocosmos
Ready to get noticed? Partner with Sociocosmos
 
9953056974 Young Call Girls In Kirti Nagar Indian Quality Escort service
9953056974 Young Call Girls In  Kirti Nagar Indian Quality Escort service9953056974 Young Call Girls In  Kirti Nagar Indian Quality Escort service
9953056974 Young Call Girls In Kirti Nagar Indian Quality Escort service
 
Craft Your Legacy: Invest in YouTube Presence from Sociocosmos"
Craft Your Legacy: Invest in YouTube Presence from Sociocosmos"Craft Your Legacy: Invest in YouTube Presence from Sociocosmos"
Craft Your Legacy: Invest in YouTube Presence from Sociocosmos"
 
Film show pre-production powerpoint for site
Film show pre-production powerpoint for siteFilm show pre-production powerpoint for site
Film show pre-production powerpoint for site
 
Your LinkedIn Makeover: Sociocosmos Presence Package
Your LinkedIn Makeover: Sociocosmos Presence PackageYour LinkedIn Makeover: Sociocosmos Presence Package
Your LinkedIn Makeover: Sociocosmos Presence Package
 
Vellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Vellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceVellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Vellore Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
 

Social Networking Security Issues

  • 3. Threats Posing Risk to Social Networks Digital Database Collection Secondary Data Collection Face Recognition Content Based Image Retrieval Image Data Linkability Complete Account Deletion Profile Squatting and Reputation Slander through ID Theft
  • 4. Continued… Stalking Bullying Corporate Espionage Spam Cross Side Scripting Spear Phishing Infiltration of Networks
  • 5. Digital Database Collection Digital dossier of Personal Data for immoral purposes Regular Snapshots of entire network Private Attributes can be accessed directly via search Miss out on Employment Opportunities Information for negative use E.g. Miss New Jersey Case
  • 6. Secondary Data Collection Personal Information to the Network Operator E.g. time and length of connections IP Address, other users’ profile visited Messages sent and received Powerful Data warehouse Lack of Transparency about Data Collection Privacy Policies tend to be vague Transfer of Information to third party through resale
  • 7. Example of Privacy Statement “[SNS Provider] also logs non-personally identifiable information including IP address, profile information, aggregate user data, and browser type, from users and visitors to the site. This data is used to manage the website, track usage and improve the website services. This non-personally- identifiable information may be shared with third-parties to
  • 8. Face Recognition & CBIR Face Recognition User Provided Digital Images They indentify the profile holder Linking of Images Instances across services and websites Content Based Image Recognition Able to match features from Large Databases of Images No Privacy control on the accountability on CBIR Possibility of deducing User Location May lead to Stalking, Blackmailing, Unwanted Marketing, etc.
  • 9. Image Data Linkability Tag Images with metadata Name of the person in the photo Link to their profile Their e-mail address No control over images posted by others
  • 10. Difficulty in Complete Account Deletion Easy to remove Primary Pages Secondary Info remains Ambiguity over Information deletion upon account closure Facebook Privacy policy Statement: “Removed information may persist in backup copies for a reasonable period of time but will not be generally available to members of Facebook.” Manual Deletion is the only solution
  • 11. Spam Unsolicited messages Free Traffic for the Spammers Use of Specialized Spamming software – FriendBot Provides links to Pornographic or other product sites Links to phishing websites Flood with Comments and Posts Stealing Member’s Passwords to advertise on others profiles Traffic Overload Loss Of Trust Reduce the value of SNS if no. of fake profiles Increases
  • 12. Cross Side Scripting Can post HTML code within profiles SNS’s are vulnerable to XSS attacks SAMY virus Denial of Service
  • 13. Spear Phishing Highly personalized Phishing Attack The worm JS/Quickspace.A was designed to spread up through MySpace pages. Effective Form of Phishing Attack Identity Theft Reputation Damage
  • 14. Infiltration of Networks Weak First line of Defense FriendBot and FriendBlasterPro- commercial software No implementations of CAPTCHA’s SOPHOS- an Antivirus company Case Study Polluting SNSs’ with irrelevant misleading Profiles Allows to view Private Information Conducts spamming and marketing campaigns
  • 15. Profile Squatting & Reputation Slander Fake Profiles Profiles of Dead Celebrities Galileo on MySpace (as well as over 3000 Friends) Weak Authentication of Registration Most unlikely the person Easy to target the abuse at the people (e.g. Class Teacher) Damage Reputation Phishing Marketing under false pretences
  • 16. Stalking Involves threatening behaviour Seeks repeated contacts through any means SNSs’ are an easy means for stalking SNSs’ emphasize on location data Loss of Privacy Physical Harm and psychological Damage
  • 17. Bullying Repeated and Purposeful acts of harm that are carried out using technology. The ease of remaining anonymous The one-stop-shop effect The generation gap Forms Of CyberBullying: Flaming Harassment Denigration Impersonation Outing Trickery Exclusion
  • 18. Corporate Espionage Its an Underrated Risk to Corporate Infrastructure Access Sensitive Enterprise Data; mostly by using Employees themselves Privacy Settings are neglected Threshold for gaining information is very low Lists of employees and connections between them Stakeholders Information Publication of information about its infrastructure, network directories. Loss of Corporate Intellectual Property Blackmailing Access Physical assets
  • 19. Which Social Network do you think poses the biggest Risk to Security…??? Courtesy: SOPHOS Security Threat Report 2010
  • 20. Social Networks Spam, Phishing and Malware Report for year 2009 Courtesy: SOPHOS Security Threat Report 2010
  • 21. Malwares, Number One Concern for the Firms with Social Nerworks. Courtesy: SOPHOS Security Threat Report 2010
  • 22. Permission to Access Basic Information
  • 23. Recommendations and Suggestions Encourage Awareness raising and Educational Campaigns Review and Reinterpret Regulatory Framework Increase Transparency of Data handling Practices Discourage Banning of SNSs’ in Schools Promote Stronger Authentication and Access control Implement Countermeasures against Corporate Espionage Maximize Possibilities for Reporting and Detecting Abuse Set Appropriate Defaults Require the Consent of the Data Subject to include Profile Tags or e-mail Address Tags in Images
  • 24. Social Networking Security Issues- Legal Aspects Section 66A: Punishment for sending offensive messages through service, etc. Imprisonment may extend to Three years and with fine Section 66B: Punishment for dishonestly receiving stolen computer resource or communication device Imprisonment may extend to Three years and with fine up to Rs.1Lakh or Both Section 66C: Punishment for Identity Theft Imprisonment of either description term up to 3 years and fine up to Rs.1Lakh Section 66D: Punishment for cheating by personation by using computer resource Imprisonment may extend to Three years and with fine up to Rs.1Lakh or with both Section 66E: Punishment for violation of Privacy Imprisonment may extend to Three years and with fine up to Rs.1Lakh or with both
  • 25. Continued… Section 66F: Punishment for Cyber Terrorism Imprisonment which may extend to imprisonment for life Section 67: Punishment for publishing or transmitting Obscene material in electronic form Imprisonment of either description up to three years and fine of up to Rs. 5Lakh. Section 67A: Punishment for publishing or transmitting of material containing sexually explicit act, etc., in electronic form. Imprisonment of either description up to five years and fine of up to Rs. 10Lakh. Section 67B: Punishment for publishing or transmitting of material depicting children in sexually explicit act, etc., in electronic form. Imprisonment of either description up to three years and fine of up to Rs. 5Lakh.
  • 26. Conclusion If used correctly enhances Data Privacy providing Interactive User Generated Content to anyone, if not it provides a dangerously powerful tool in the hands of Spammers, unscrupulous marketers and other who may take criminal advantages of Users.
  • 27. References SOPHOS Security Report 2010 European Network and Information Security Agency Report