SlideShare a Scribd company logo
1 of 15
Presented By El Rumi
@IDSECCONF 2011
Social Network & Facebook
Social Network




        Social Network is a social structure made up of individuals (or
 organizations) called "nodes", which are tied (connected) by one or more
 specific types of interdependency, such as friendship, kinship, common
 interest, financial exchange, dislike, sexual relationships, or relationships of
 beliefs, knowledge or prestige.
 (source: http://en.wikipedia.org/wiki/Social_network)
Social Network & Facebook
Facebook




   A “social networking” site
   Framework for information
   Complex control of who can see what
   Users have a “profile” with a picture* and other personal details as they
    wish, including “limited profile”
   Based on “Networks”
   Facebook creates a newsfeed based on what your “friends” are doing


  (source: http://users.ox.ac.uk/~tony/facebook.ppt)
Facebook Account Security




  (source: https://www.facebook.com/help/?faq=212183815469410)
True Story....
Let’s Start The Game
Proof of Concept! (Identification)
Proof of Concept! (Penetration)
Proof of Concept! (Penetration)
Proof of Concept! (Penetration)
Proof of Concept! (Owned)
Can We Prevent This?
Change Security Question?




     (source: https://www.facebook.com/help/?faq=163063243756483)
So?
 Hide Your Sensitive Data From Public.
 Hide Your Email From Public.
 Make Security Question :
   With Different Thing Answer But Easy To Remember.
   With Right Answer But Encrypted (md5, sha1, rot13, etc)
Video Demo
“If any skiddy community gets too big, we shut them down.
If any lamer causes too much trouble, we shut them down. If
any group keeps fucking stuff up, we stop them.”
-Elz (Kecoak Elektronik)-

(source: http://kecoak.org/log/2010/12/25/owned-and-exposed-pwned-
some-skiddy/)

More Related Content

What's hot

Social network privacy & security
Social network privacy & securitySocial network privacy & security
Social network privacy & securitynadikari123
 
FILM 260 Flipbook- Virtually Impossible? Privacy Within Social Media
FILM 260 Flipbook- Virtually Impossible? Privacy Within Social MediaFILM 260 Flipbook- Virtually Impossible? Privacy Within Social Media
FILM 260 Flipbook- Virtually Impossible? Privacy Within Social MediaNicoleDrutz
 
Northern District Department Head Meeting
Northern District Department Head MeetingNorthern District Department Head Meeting
Northern District Department Head MeetingGreg JOhll
 
07 12 19 Technologies And Polarities
07 12 19 Technologies And Polarities07 12 19 Technologies And Polarities
07 12 19 Technologies And PolaritiesJohn David Smith
 
Web 2thtrtgrst
Web 2thtrtgrstWeb 2thtrtgrst
Web 2thtrtgrstOnly1Sam
 
2013: Comp113 lecture 1 part two
2013: Comp113 lecture 1 part two2013: Comp113 lecture 1 part two
2013: Comp113 lecture 1 part twoCOMP 113
 
20090228 Cyber Safety
20090228 Cyber Safety20090228 Cyber Safety
20090228 Cyber Safetymkinzie
 
Web2.0 An Introduction
Web2.0 An IntroductionWeb2.0 An Introduction
Web2.0 An Introductionc_l_b
 
Presentation social media
Presentation social mediaPresentation social media
Presentation social mediaEduardo Ferro
 
New Media Technology- Cyber Society and the Interaction Channel
New Media Technology- Cyber Society and the Interaction ChannelNew Media Technology- Cyber Society and the Interaction Channel
New Media Technology- Cyber Society and the Interaction ChannelFaindra Jabbar
 
Media, Technology and Society - The new trends of social interaction
Media, Technology and Society - The new trends of social interactionMedia, Technology and Society - The new trends of social interaction
Media, Technology and Society - The new trends of social interactionFaindra Jabbar
 
Cloud Computing, Social Networking and Social Media
Cloud Computing, Social Networking and Social MediaCloud Computing, Social Networking and Social Media
Cloud Computing, Social Networking and Social MediaMolly Immendorf
 
Social Media Beyond Facebook and Twitter
Social Media Beyond Facebook and TwitterSocial Media Beyond Facebook and Twitter
Social Media Beyond Facebook and TwitterAALBC.com, LLC
 

What's hot (20)

Social network privacy & security
Social network privacy & securitySocial network privacy & security
Social network privacy & security
 
FILM 260 Flipbook- Virtually Impossible? Privacy Within Social Media
FILM 260 Flipbook- Virtually Impossible? Privacy Within Social MediaFILM 260 Flipbook- Virtually Impossible? Privacy Within Social Media
FILM 260 Flipbook- Virtually Impossible? Privacy Within Social Media
 
Northern District Department Head Meeting
Northern District Department Head MeetingNorthern District Department Head Meeting
Northern District Department Head Meeting
 
YANCOI
YANCOIYANCOI
YANCOI
 
07 12 19 Technologies And Polarities
07 12 19 Technologies And Polarities07 12 19 Technologies And Polarities
07 12 19 Technologies And Polarities
 
Web 2thtrtgrst
Web 2thtrtgrstWeb 2thtrtgrst
Web 2thtrtgrst
 
2013: Comp113 lecture 1 part two
2013: Comp113 lecture 1 part two2013: Comp113 lecture 1 part two
2013: Comp113 lecture 1 part two
 
Internet
InternetInternet
Internet
 
Technology empowerment ict today
Technology empowerment ict todayTechnology empowerment ict today
Technology empowerment ict today
 
Class 3 ppt
Class 3 pptClass 3 ppt
Class 3 ppt
 
Web
WebWeb
Web
 
20090228 Cyber Safety
20090228 Cyber Safety20090228 Cyber Safety
20090228 Cyber Safety
 
Web2.0 An Introduction
Web2.0 An IntroductionWeb2.0 An Introduction
Web2.0 An Introduction
 
Presentation social media
Presentation social mediaPresentation social media
Presentation social media
 
New Media Technology- Cyber Society and the Interaction Channel
New Media Technology- Cyber Society and the Interaction ChannelNew Media Technology- Cyber Society and the Interaction Channel
New Media Technology- Cyber Society and the Interaction Channel
 
Media, Technology and Society - The new trends of social interaction
Media, Technology and Society - The new trends of social interactionMedia, Technology and Society - The new trends of social interaction
Media, Technology and Society - The new trends of social interaction
 
2.0
2.02.0
2.0
 
Cloud Computing, Social Networking and Social Media
Cloud Computing, Social Networking and Social MediaCloud Computing, Social Networking and Social Media
Cloud Computing, Social Networking and Social Media
 
What is Social Media?
What is Social Media?What is Social Media?
What is Social Media?
 
Social Media Beyond Facebook and Twitter
Social Media Beyond Facebook and TwitterSocial Media Beyond Facebook and Twitter
Social Media Beyond Facebook and Twitter
 

Viewers also liked

Password hacking
Password hackingPassword hacking
Password hackingAbhay pal
 
Welcome to the world of hacking
Welcome to the world of hackingWelcome to the world of hacking
Welcome to the world of hackingTjylen Veselyj
 
Hacking with experts 3 (facebook hacking) by anurag dwivedi.
Hacking with experts 3 (facebook hacking) by anurag dwivedi.Hacking with experts 3 (facebook hacking) by anurag dwivedi.
Hacking with experts 3 (facebook hacking) by anurag dwivedi.Esteban Bedoya
 
Phone security code unlock message
Phone security code unlock messagePhone security code unlock message
Phone security code unlock messageMansoor Rafeeq
 
Samsung Mobile Phone Codes
Samsung Mobile Phone CodesSamsung Mobile Phone Codes
Samsung Mobile Phone CodesLenny Henningham
 
Butterfly group( facebook)
Butterfly group( facebook)Butterfly group( facebook)
Butterfly group( facebook)bushra1413
 
MEI Unlock - Use Any Network on your Smartphone without Restriction
MEI Unlock - Use Any Network on your Smartphone without RestrictionMEI Unlock - Use Any Network on your Smartphone without Restriction
MEI Unlock - Use Any Network on your Smartphone without RestrictionAlexia Ruby
 
Password Recovery Tools
Password Recovery ToolsPassword Recovery Tools
Password Recovery ToolsAndrey Belenko
 
All nokia master codes
All nokia master codesAll nokia master codes
All nokia master codesMuhammad Sadiq
 
HOW TO CHECK YOUR GIRLFRIENDS FACEBOOK MESSAGES
HOW TO CHECK YOUR GIRLFRIENDS FACEBOOK MESSAGESHOW TO CHECK YOUR GIRLFRIENDS FACEBOOK MESSAGES
HOW TO CHECK YOUR GIRLFRIENDS FACEBOOK MESSAGESBrown_Laura
 
Facebook Not Just a Social Network!
Facebook Not Just a Social Network!Facebook Not Just a Social Network!
Facebook Not Just a Social Network!Budi Khoirudin
 
Guide to hack Facebook Password
Guide to hack Facebook PasswordGuide to hack Facebook Password
Guide to hack Facebook Passwordauspiciousscene42
 
How to spy on facebook messenger
How to spy on facebook messengerHow to spy on facebook messenger
How to spy on facebook messengerkristin2603
 
Facebook Messages Demystified
Facebook Messages DemystifiedFacebook Messages Demystified
Facebook Messages DemystifiedNFN Labs
 

Viewers also liked (17)

Password hacking
Password hackingPassword hacking
Password hacking
 
Welcome to the world of hacking
Welcome to the world of hackingWelcome to the world of hacking
Welcome to the world of hacking
 
Secret Codes
Secret CodesSecret Codes
Secret Codes
 
Hacking with experts 3 (facebook hacking) by anurag dwivedi.
Hacking with experts 3 (facebook hacking) by anurag dwivedi.Hacking with experts 3 (facebook hacking) by anurag dwivedi.
Hacking with experts 3 (facebook hacking) by anurag dwivedi.
 
Phone security code unlock message
Phone security code unlock messagePhone security code unlock message
Phone security code unlock message
 
Samsung Mobile Phone Codes
Samsung Mobile Phone CodesSamsung Mobile Phone Codes
Samsung Mobile Phone Codes
 
Butterfly group( facebook)
Butterfly group( facebook)Butterfly group( facebook)
Butterfly group( facebook)
 
MEI Unlock - Use Any Network on your Smartphone without Restriction
MEI Unlock - Use Any Network on your Smartphone without RestrictionMEI Unlock - Use Any Network on your Smartphone without Restriction
MEI Unlock - Use Any Network on your Smartphone without Restriction
 
Password Recovery Tools
Password Recovery ToolsPassword Recovery Tools
Password Recovery Tools
 
All nokia master codes
All nokia master codesAll nokia master codes
All nokia master codes
 
Nokia secret codes.
Nokia secret codes.Nokia secret codes.
Nokia secret codes.
 
HOW TO CHECK YOUR GIRLFRIENDS FACEBOOK MESSAGES
HOW TO CHECK YOUR GIRLFRIENDS FACEBOOK MESSAGESHOW TO CHECK YOUR GIRLFRIENDS FACEBOOK MESSAGES
HOW TO CHECK YOUR GIRLFRIENDS FACEBOOK MESSAGES
 
Food Fight—MPI St. Louis
Food Fight—MPI St. LouisFood Fight—MPI St. Louis
Food Fight—MPI St. Louis
 
Facebook Not Just a Social Network!
Facebook Not Just a Social Network!Facebook Not Just a Social Network!
Facebook Not Just a Social Network!
 
Guide to hack Facebook Password
Guide to hack Facebook PasswordGuide to hack Facebook Password
Guide to hack Facebook Password
 
How to spy on facebook messenger
How to spy on facebook messengerHow to spy on facebook messenger
How to spy on facebook messenger
 
Facebook Messages Demystified
Facebook Messages DemystifiedFacebook Messages Demystified
Facebook Messages Demystified
 

Similar to Social Network Security Best Practices

The Future of Social Networks: The Need for Semantics
The Future of Social Networks: The Need for SemanticsThe Future of Social Networks: The Need for Semantics
The Future of Social Networks: The Need for SemanticsJohn Breslin
 
The Social Semantic Web: An Introduction
The Social Semantic Web: An IntroductionThe Social Semantic Web: An Introduction
The Social Semantic Web: An IntroductionJohn Breslin
 
DM110 - Week 4 - Social Networks
DM110 - Week 4 - Social NetworksDM110 - Week 4 - Social Networks
DM110 - Week 4 - Social NetworksJohn Breslin
 
Social Semantic Web (Social Activity and Facebook)
Social Semantic Web (Social Activity and Facebook)Social Semantic Web (Social Activity and Facebook)
Social Semantic Web (Social Activity and Facebook)Myungjin Lee
 
Chapter 5 Groups & Networks
Chapter 5  Groups & NetworksChapter 5  Groups & Networks
Chapter 5 Groups & NetworksRay Brannon
 
Chapter 5 Groups & Networks
Chapter 5  Groups & NetworksChapter 5  Groups & Networks
Chapter 5 Groups & NetworksRay Brannon
 
Chapter 5 Groups & Networks
Chapter 5  Groups & NetworksChapter 5  Groups & Networks
Chapter 5 Groups & NetworksRay Brannon
 
Interactive Innovation Through Social Software And Web 2.0
Interactive Innovation Through Social Software And Web 2.0Interactive Innovation Through Social Software And Web 2.0
Interactive Innovation Through Social Software And Web 2.0Thomas Ryberg
 
Social Networking And Social Media May 5 2009 Final V1
Social Networking And Social Media May 5 2009  Final V1Social Networking And Social Media May 5 2009  Final V1
Social Networking And Social Media May 5 2009 Final V1Molly Immendorf
 
Social media for social learning
Social media for social learningSocial media for social learning
Social media for social learningLisa Colton
 
Social Networking and Collaboration Tools for Enterprise 2.0
Social Networking and Collaboration Tools for Enterprise 2.0Social Networking and Collaboration Tools for Enterprise 2.0
Social Networking and Collaboration Tools for Enterprise 2.0John Breslin
 
Social media impact on existing social relationships
Social media impact on existing social relationshipsSocial media impact on existing social relationships
Social media impact on existing social relationshipsElizabeth Gestier
 
Social networking
Social networkingSocial networking
Social networkingJohan Koren
 
Data Accessibility and Me: Introducing SIOC, FOAF and the Linked Data Web
Data Accessibility and Me: Introducing SIOC, FOAF and the Linked Data WebData Accessibility and Me: Introducing SIOC, FOAF and the Linked Data Web
Data Accessibility and Me: Introducing SIOC, FOAF and the Linked Data WebJohn Breslin
 
Challenging our Notions of Learning: Understanding How Web 2.0 Technology Wor...
Challenging our Notions of Learning: Understanding How Web 2.0 Technology Wor...Challenging our Notions of Learning: Understanding How Web 2.0 Technology Wor...
Challenging our Notions of Learning: Understanding How Web 2.0 Technology Wor...Paul Brown
 
Production Assignment
Production AssignmentProduction Assignment
Production Assignmentcrumbsy
 

Similar to Social Network Security Best Practices (20)

Social Networks
Social NetworksSocial Networks
Social Networks
 
The Future of Social Networks: The Need for Semantics
The Future of Social Networks: The Need for SemanticsThe Future of Social Networks: The Need for Semantics
The Future of Social Networks: The Need for Semantics
 
อบรม1
อบรม1อบรม1
อบรม1
 
The Social Semantic Web: An Introduction
The Social Semantic Web: An IntroductionThe Social Semantic Web: An Introduction
The Social Semantic Web: An Introduction
 
DM110 - Week 4 - Social Networks
DM110 - Week 4 - Social NetworksDM110 - Week 4 - Social Networks
DM110 - Week 4 - Social Networks
 
Social Semantic Web (Social Activity and Facebook)
Social Semantic Web (Social Activity and Facebook)Social Semantic Web (Social Activity and Facebook)
Social Semantic Web (Social Activity and Facebook)
 
Chapter 5 Groups & Networks
Chapter 5  Groups & NetworksChapter 5  Groups & Networks
Chapter 5 Groups & Networks
 
Chapter 5 Groups & Networks
Chapter 5  Groups & NetworksChapter 5  Groups & Networks
Chapter 5 Groups & Networks
 
Chapter 5 Groups & Networks
Chapter 5  Groups & NetworksChapter 5  Groups & Networks
Chapter 5 Groups & Networks
 
Interactive Innovation Through Social Software And Web 2.0
Interactive Innovation Through Social Software And Web 2.0Interactive Innovation Through Social Software And Web 2.0
Interactive Innovation Through Social Software And Web 2.0
 
Social Networking And Social Media May 5 2009 Final V1
Social Networking And Social Media May 5 2009  Final V1Social Networking And Social Media May 5 2009  Final V1
Social Networking And Social Media May 5 2009 Final V1
 
Social media for social learning
Social media for social learningSocial media for social learning
Social media for social learning
 
Social Networking and Collaboration Tools for Enterprise 2.0
Social Networking and Collaboration Tools for Enterprise 2.0Social Networking and Collaboration Tools for Enterprise 2.0
Social Networking and Collaboration Tools for Enterprise 2.0
 
Social Media
Social MediaSocial Media
Social Media
 
Julie Clegg
Julie CleggJulie Clegg
Julie Clegg
 
Social media impact on existing social relationships
Social media impact on existing social relationshipsSocial media impact on existing social relationships
Social media impact on existing social relationships
 
Social networking
Social networkingSocial networking
Social networking
 
Data Accessibility and Me: Introducing SIOC, FOAF and the Linked Data Web
Data Accessibility and Me: Introducing SIOC, FOAF and the Linked Data WebData Accessibility and Me: Introducing SIOC, FOAF and the Linked Data Web
Data Accessibility and Me: Introducing SIOC, FOAF and the Linked Data Web
 
Challenging our Notions of Learning: Understanding How Web 2.0 Technology Wor...
Challenging our Notions of Learning: Understanding How Web 2.0 Technology Wor...Challenging our Notions of Learning: Understanding How Web 2.0 Technology Wor...
Challenging our Notions of Learning: Understanding How Web 2.0 Technology Wor...
 
Production Assignment
Production AssignmentProduction Assignment
Production Assignment
 

Recently uploaded

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 

Recently uploaded (20)

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

Social Network Security Best Practices

  • 1. Presented By El Rumi @IDSECCONF 2011
  • 2. Social Network & Facebook Social Network Social Network is a social structure made up of individuals (or organizations) called "nodes", which are tied (connected) by one or more specific types of interdependency, such as friendship, kinship, common interest, financial exchange, dislike, sexual relationships, or relationships of beliefs, knowledge or prestige. (source: http://en.wikipedia.org/wiki/Social_network)
  • 3. Social Network & Facebook Facebook  A “social networking” site  Framework for information  Complex control of who can see what  Users have a “profile” with a picture* and other personal details as they wish, including “limited profile”  Based on “Networks”  Facebook creates a newsfeed based on what your “friends” are doing (source: http://users.ox.ac.uk/~tony/facebook.ppt)
  • 4. Facebook Account Security (source: https://www.facebook.com/help/?faq=212183815469410)
  • 7. Proof of Concept! (Identification)
  • 8. Proof of Concept! (Penetration)
  • 9. Proof of Concept! (Penetration)
  • 10. Proof of Concept! (Penetration)
  • 11. Proof of Concept! (Owned)
  • 12. Can We Prevent This? Change Security Question? (source: https://www.facebook.com/help/?faq=163063243756483)
  • 13. So?  Hide Your Sensitive Data From Public.  Hide Your Email From Public.  Make Security Question :  With Different Thing Answer But Easy To Remember.  With Right Answer But Encrypted (md5, sha1, rot13, etc)
  • 15. “If any skiddy community gets too big, we shut them down. If any lamer causes too much trouble, we shut them down. If any group keeps fucking stuff up, we stop them.” -Elz (Kecoak Elektronik)- (source: http://kecoak.org/log/2010/12/25/owned-and-exposed-pwned- some-skiddy/)