Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
SECURITY DAYFCIS’12SOCIALNETWORKS SECURITYTRACK II | GROUP 15David Farid, Gamal El-Din Magdy, Hanan Yousry, John Samir and...
AgendaSOME FACTSSECURITYASPECTSCHARACTERISTICSSOCIAL NETWORKSSUCCESS FACTORSSWOT ANALYSISSECURITY BEHAVIOURS (TRENDS)FCIS ...
#Fact 01    SOCIAL NETWORKS USAGE                                                                 LinkedIn                ...
#Fact 02    IDENTITY VS PHYSICAL HARM✔✔    References: BARRACUDALABS 2011    FCIS SECURITY DAY 2012           SOCIAL MEDIA...
#Fact 03    INFLUNCING FACTORS WHEN CHOOSING    SOCIAL NETWORKS                                       =                   ...
Security AspectsThe Way   CONNECTIONS ARE MADE TO THE MAIN INTERFACE.FCIS SECURITY DAY 2012   SOCIAL MEDIA SECURITY   27-M...
Security AspectsThe Way COMMUNICATION IS MANAGED INSIDE AND OUTSIDE      THE COLLABORATIVE APPLICATION.FCIS SECURITY DAY 2...
Security AspectsThe Way      ADDITIONAL PROCESSES CAN BE ADDED TO THE     SYSTEM ON A SAFE AND EASY FASHION WITHOUT     UP...
Security Characteristics                         UTHENTICITYFCIS SECURITY DAY 2012    SOCIAL MEDIA SECURITY   27-MAY-12
Security CharacteristicsSO, SOME OF COLLABORATIVE SYSTEMSCONSIDER THAT BY HAVING PROCEDURES WITHWHICH IS ABSOLUTELY      F...
Knowledge Is a Vital fluid#Rule IN SOCIAL NETWORKS   IT MUST UNDERTAKE ALL THE PROCEDURES THAT ARE NECESSARY FOR   CREATIN...
Knowledge Is a Vital fluid#WYSIWYGSOCIAL NETWORK---------------------------             PROVIDING:                        ...
SWOT ANALAYSIS               Strengths                                       Weaknesses                                   ...
Security Behaviors (Trends)                         BEHAVIORS OR TRENDS SOCIAL                         NETWORKS TEND TO US...
Back End Security BehaviorsCase Study - Early of 2011                                      Showed that                    ...
Back End Security Behaviors                                   Case Study - Early of 2011                                  ...
Front End Security Behaviors                                 - SECURE BROWSING.                                 - EMAIL / ...
Front End Security BehaviorsFCIS SECURITY DAY 2012   SOCIAL MEDIA SECURITY   27-MAY-12
That`s all ..    Questions ?      THANK YOU !!                                                                     TRACK I...
Upcoming SlideShare
Loading in …5
×

Social Networking Security Resaerch

522 views

Published on

Faculty of Computers and Information Science ( FCIS ) Ain Shams University - Computer Science Department 2012 Security Day .. Inspired from Stefanos Karagos Presentaion - XPLAIN.CO and BARRACUDALABS

Published in: Education, Technology, Business
  • Be the first to comment

  • Be the first to like this

Social Networking Security Resaerch

  1. 1. SECURITY DAYFCIS’12SOCIALNETWORKS SECURITYTRACK II | GROUP 15David Farid, Gamal El-Din Magdy, Hanan Yousry, John Samir and Kholoud Abd El-Salam FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY 27-MAY-12
  2. 2. AgendaSOME FACTSSECURITYASPECTSCHARACTERISTICSSOCIAL NETWORKSSUCCESS FACTORSSWOT ANALYSISSECURITY BEHAVIOURS (TRENDS)FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY 27-MAY-12
  3. 3. #Fact 01 SOCIAL NETWORKS USAGE LinkedIn Twitter✔ Google+ MySpace References: BARRACUDALABS 2011 FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY 27-MAY-12
  4. 4. #Fact 02 IDENTITY VS PHYSICAL HARM✔✔ References: BARRACUDALABS 2011 FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY 27-MAY-12
  5. 5. #Fact 03 INFLUNCING FACTORS WHEN CHOOSING SOCIAL NETWORKS = almost✔✔✔ References: BARRACUDALABS 2011 FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY 27-MAY-12
  6. 6. Security AspectsThe Way CONNECTIONS ARE MADE TO THE MAIN INTERFACE.FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY 27-MAY-12
  7. 7. Security AspectsThe Way COMMUNICATION IS MANAGED INSIDE AND OUTSIDE THE COLLABORATIVE APPLICATION.FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY 27-MAY-12
  8. 8. Security AspectsThe Way ADDITIONAL PROCESSES CAN BE ADDED TO THE SYSTEM ON A SAFE AND EASY FASHION WITHOUT UPSET THE LEVEL OF RELIABILITY AND EFFICIENCY.FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY 27-MAY-12
  9. 9. Security Characteristics UTHENTICITYFCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY 27-MAY-12
  10. 10. Security CharacteristicsSO, SOME OF COLLABORATIVE SYSTEMSCONSIDER THAT BY HAVING PROCEDURES WITHWHICH IS ABSOLUTELY FALSE;FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY 27-MAY-12
  11. 11. Knowledge Is a Vital fluid#Rule IN SOCIAL NETWORKS IT MUST UNDERTAKE ALL THE PROCEDURES THAT ARE NECESSARY FOR CREATING A SAFETY AND HELPFUL ENVIRONMENT WITHOUT LOWERING Usa bility AccessiFCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY 27-MAY-12
  12. 12. Knowledge Is a Vital fluid#WYSIWYGSOCIAL NETWORK--------------------------- PROVIDING: ✔ SAFETY ENVIRONMENT ✔ HELPFUL ENVIRONMENT ✔ Usability ✔ Accessibility ✔ LEADS TO:FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY 27-MAY-12
  13. 13. SWOT ANALAYSIS Strengths Weaknesses S W Authenticity Bad qualified personnel Encryption Improper network Confidentiality infrastructure Opportunities Threats O T World Wide Web Viruses Millions of users Hackers Wide range of means Negative publicity of publicityFCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY 27-MAY-12
  14. 14. Security Behaviors (Trends) BEHAVIORS OR TRENDS SOCIAL NETWORKS TEND TO USE TO SECURE THEIR USERS..FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY 27-MAY-12
  15. 15. Back End Security BehaviorsCase Study - Early of 2011 Showed that - USERS AUTHENTICITY AND THE AUTHENTICATION PROCESS. - INFORMATION CONFIDENTIALITY.FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY 27-MAY-12
  16. 16. Back End Security Behaviors Case Study - Early of 2011 - USERS AUTHENTICITYThese processes are implementedthrough means of OAuth which is AND THEan open protocol to allow secure AUTHENTICATIONAPI authorization. PROCESS.The process of authentication issecurely managed by using secure - INFORMATIONa connection through HTTPS CONFIDENTIALITY.protocol.FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY 27-MAY-12
  17. 17. Front End Security Behaviors - SECURE BROWSING. - EMAIL / MOBILE LOGIN NOTIFICATIONS & APPROVALS. - RECOGNIZIED DEVICES.FCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY 27-MAY-12
  18. 18. Front End Security BehaviorsFCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY 27-MAY-12
  19. 19. That`s all .. Questions ? THANK YOU !! TRACK II | GROUP 15 David Farid, Gamal El-Din Magdy, Hanan Yousry, John Samir and Kholoud Abd El-SalamFCIS SECURITY DAY 2012 SOCIAL MEDIA SECURITY 27-MAY-12

×