Your SlideShare is downloading. ×
Knowing Me Knowing You
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Knowing Me Knowing You

3,573
views

Published on

Presentation on how Brian Honan stole the identity of an Irish journalist using only information found on the Internet.

Presentation on how Brian Honan stole the identity of an Irish journalist using only information found on the Internet.

Published in: Technology

0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
3,573
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
36
Comments
0
Likes
1
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Knowing Me, Knowing You (the Dangers of Social Networks)
  • 2. Introduction
    • My Name is Marie Boran
    • 29 years of age
        • Born 27th July 1980
    • Single
  • 3. I Like
    • Travel
        • Paris
        • New York
    • Music
        • Especially Kraftwerk
    • Knitting
    • Photography
    • Science Fiction
    • Paranormal
  • 4. My Blusher
  • 5. Home
  • 6. Home
  • 7. My Parents
  • 8. My Dad Worked Here
    • Financial Director for Oglesby & Butler
      • Resigned 31st March 2008
  • 9. Work
    • Technology Journalist
        • SiliconRepublic.com
        • The Irish Independent
        • GadgetRepublic.com
    • Previously
        • Court Editor Merril Legal Solutions
        • PC Live Magazine
        • Dublin Anna Livia FM
  • 10. Education
    • St Leo’s College Carlow
      • University College Dublin
      • BSc Computer Science
      • Griffith College Dublin
      • BA Journalism
      • Dublin Institute of Technology
        • Digital Media Technologies
  • 11. In 2008
    • I was voted Technology Journalist of the Year
  • 12. In 2008
    • Someone Stole My Identity
  • 13. How Did I Steal Marie’s ID?
  • 14. LinkedIN
  • 15. MySpace
  • 16. Amazon Wish List
  • 17. Date Of Birth
  • 18. PhotoSynth
  • 19. PhotoSynth
  • 20. General Register Office
  • 21. With That Information I Got
  • 22. I Could Then Get
  • 23. Which In Turn Allows me to
  • 24. But ..
  • 25. Maybe Not
  • 26. Automating the Attack
  • 27. Automating the Attack – 123People
  • 28. Automating the Attack – 123People
  • 29. Automating the Attack – Friendscall.me
  • 30. Automating the Attack – Knowem.com
  • 31. Automating the Attack – Pipl.com
  • 32. Automating the Attack - Maltego
  • 33. Automating the Attack - Maltego
  • 34. Automating the Attack - Maltego
  • 35. Automating the Attack - Maltego
  • 36. Automating the Attack – Maltego
  • 37.
    • Personal Data Can Reside on Servers not in EU
            • Covered by Data Protection Act?
        • Sites May Not Have Stringent Privacy Policies
    • Data is Permanent
          • What Goes on the Internet Stays on the Internet
    Lessons Learnt (1)
  • 38.
    • Beware of Social Networks
        • Friends Can Leak Your Information
        • Data Matching Provides Overall Picture
        • You May Not Own Your Private Data
        • Review Privacy Statements
        • Terms of Use
    Lessons Learnt (2)
  • 39.
    • Virtual World Can Impact Real World
            • Bullying
            • Burglary
            • Stalking
            • Physical Attacks
    Other Lessons Learnt
  • 40.
    • FBI Warns of Asian-Specific Telephone Extortion Scam
        • Network World 10th June ’09
    • Criminals Gleaned Personal Details from Internet
    • Threatened Victims
    • Demand Money
    Real World Example
  • 41.
    • Tweets Lead to Burglary ?
    Real World Example
  • 42. Real World Examples
  • 43.
    • What Goes on the Net stays on the Net
    • Friends Can Compromise You
    • There Are No Secret Questions
    • Virtual World Impacts Real World
    • No Umbilical Chord = No ID
    Remember
  • 44.
    • Review How You Identify
      • Remote Users
        • Staff
        • Customers
    • Ensure Your Secret Questions Are Secret
    • Revise Acceptable Usage Policies For Social Networking Sites
    • Security Awareness is Key
    Applying This to Your Environment
  • 45. Questions ?