SlideShare a Scribd company logo
Slapped in the Facebook: The wonders (and security threats) of social networking Presentation for the National Information Security Group (NAISG), May 2009 monthly meeting
About the presenter… ,[object Object],[object Object],[object Object],[object Object],[object Object]
With a cameo from… ,[object Object],[object Object],[object Object]
First, a look at the world we’re living in… ,[object Object],[object Object]
Usefulness of the medium… ,[object Object],[object Object],[object Object],[object Object]
How it’s changing the face of tech media ,[object Object],[object Object],[object Object],[object Object],[object Object]
What’s out there… ,[object Object]
My use of LinkedIn ,[object Object],[object Object],[object Object],[object Object]
What’s out there… ,[object Object],[object Object]
What’s out there… ,[object Object],[object Object]
What’s out there… ,[object Object]
Like every good thing… ,[object Object]
Exhibit A: ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Exhibit B: ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
2-23-08 ,[object Object]
1-6-09 ,[object Object],[object Object],[object Object]
“ Fail 2.0: Further Musings on Attacking Social Networks," by  Nathan Hamiel  and  Shawn Moyer   ,[object Object]
“ Fail 2.0: Further Musings on Attacking Social Networks," by  Nathan Hamiel  and  Shawn Moyer ,[object Object],[object Object],[object Object],[object Object]
“ Fail 2.0: Further Musings on Attacking Social Networks," by  Nathan Hamiel  and  Shawn Moyer ,[object Object]
What to do? ,[object Object],[object Object]
This is like everything that came before… ,[object Object],[object Object],[object Object],[object Object]
And now, a few words from  jack_daniel  ,[object Object]
Thanks! ,[object Object],[object Object],[object Object]

More Related Content

What's hot

SOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITYSOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITY
MarketingatBahrain
 
How to Like Social Media Network Security
How to Like Social Media Network SecurityHow to Like Social Media Network Security
How to Like Social Media Network Security
Brian Honan
 
Social media and Security: How to Ensure Safe Social Networking
Social media and Security: How to Ensure Safe Social NetworkingSocial media and Security: How to Ensure Safe Social Networking
Social media and Security: How to Ensure Safe Social Networking
Ishfaq Majid
 
Social media and security essentials.pptx
Social media and security essentials.pptxSocial media and security essentials.pptx
Social media and security essentials.pptx
Pink Elephant
 
Social media privacy and safety
Social media privacy and safetySocial media privacy and safety
Social media privacy and safety
Sarah K Miller
 
Social Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social MediaSocial Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social Media
Tyler Shields
 
Social networking
Social networkingSocial networking
Social networking
dwivedibrothers
 
Privacy and Security in Online Social Media : Privacy and Social Media
Privacy and Security in Online Social Media : Privacy and Social MediaPrivacy and Security in Online Social Media : Privacy and Social Media
Privacy and Security in Online Social Media : Privacy and Social Media
IIIT Hyderabad
 
Privacy and Social Networks
Privacy and Social NetworksPrivacy and Social Networks
Privacy and Social Networks
blogzilla
 
20090228 Cyber Safety
20090228 Cyber Safety20090228 Cyber Safety
20090228 Cyber Safety
mkinzie
 
Social networks: Advantages and disadvantages
Social networks: Advantages and disadvantagesSocial networks: Advantages and disadvantages
Social networks: Advantages and disadvantages
ntechproject
 
Cybersafeelementary
CybersafeelementaryCybersafeelementary
Cybersafeelementary
Rick Ohren
 
When web 2.0 sneezes, everyone gets sick
When web 2.0 sneezes, everyone gets sickWhen web 2.0 sneezes, everyone gets sick
When web 2.0 sneezes, everyone gets sick
Stefan Tanase
 
Social Media Safety Tips
Social Media Safety TipsSocial Media Safety Tips
Social Media Safety Tips
Department of Defense
 
Faculty presentation 21 st december 2015
Faculty presentation 21 st december 2015Faculty presentation 21 st december 2015
Faculty presentation 21 st december 2015
Kamoru Abiodun Balogun(Bsc,MIT,CCNA,OCA,PhD inview UPM)
 
A research of software vulnerabilities
A research of software vulnerabilitiesA research of software vulnerabilities
A research of software vulnerabilities
Alireza Aghamohammadi
 
Cyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraCyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena Mishra
Devsena Mishra
 
Misuse of social media
Misuse of social mediaMisuse of social media
Misuse of social media
AM Oh
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media Security
Del Belcher
 
549 458-465
549 458-465549 458-465
549 458-465
idescitation
 

What's hot (20)

SOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITYSOCIAL NETWORK SECURITY
SOCIAL NETWORK SECURITY
 
How to Like Social Media Network Security
How to Like Social Media Network SecurityHow to Like Social Media Network Security
How to Like Social Media Network Security
 
Social media and Security: How to Ensure Safe Social Networking
Social media and Security: How to Ensure Safe Social NetworkingSocial media and Security: How to Ensure Safe Social Networking
Social media and Security: How to Ensure Safe Social Networking
 
Social media and security essentials.pptx
Social media and security essentials.pptxSocial media and security essentials.pptx
Social media and security essentials.pptx
 
Social media privacy and safety
Social media privacy and safetySocial media privacy and safety
Social media privacy and safety
 
Social Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social MediaSocial Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social Media
 
Social networking
Social networkingSocial networking
Social networking
 
Privacy and Security in Online Social Media : Privacy and Social Media
Privacy and Security in Online Social Media : Privacy and Social MediaPrivacy and Security in Online Social Media : Privacy and Social Media
Privacy and Security in Online Social Media : Privacy and Social Media
 
Privacy and Social Networks
Privacy and Social NetworksPrivacy and Social Networks
Privacy and Social Networks
 
20090228 Cyber Safety
20090228 Cyber Safety20090228 Cyber Safety
20090228 Cyber Safety
 
Social networks: Advantages and disadvantages
Social networks: Advantages and disadvantagesSocial networks: Advantages and disadvantages
Social networks: Advantages and disadvantages
 
Cybersafeelementary
CybersafeelementaryCybersafeelementary
Cybersafeelementary
 
When web 2.0 sneezes, everyone gets sick
When web 2.0 sneezes, everyone gets sickWhen web 2.0 sneezes, everyone gets sick
When web 2.0 sneezes, everyone gets sick
 
Social Media Safety Tips
Social Media Safety TipsSocial Media Safety Tips
Social Media Safety Tips
 
Faculty presentation 21 st december 2015
Faculty presentation 21 st december 2015Faculty presentation 21 st december 2015
Faculty presentation 21 st december 2015
 
A research of software vulnerabilities
A research of software vulnerabilitiesA research of software vulnerabilities
A research of software vulnerabilities
 
Cyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraCyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena Mishra
 
Misuse of social media
Misuse of social mediaMisuse of social media
Misuse of social media
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media Security
 
549 458-465
549 458-465549 458-465
549 458-465
 

Viewers also liked

Social media to nie tylko Facebook
Social media to nie tylko FacebookSocial media to nie tylko Facebook
Social media to nie tylko Facebook
Marcin Nieweglowski
 
Dlaczego wyniki badan laboratoryjnych nie sa porownywalne
Dlaczego wyniki badan laboratoryjnych nie sa porownywalneDlaczego wyniki badan laboratoryjnych nie sa porownywalne
Dlaczego wyniki badan laboratoryjnych nie sa porownywalneSymetria
 
Foo Thoughts
Foo ThoughtsFoo Thoughts
Foo Thoughts
sam lessin
 
Prywatność a internet
Prywatność a internet Prywatność a internet
Prywatność a internet
Symetria
 
KGB, Active Measures, Disinformation and Subversion
KGB, Active Measures, Disinformation and SubversionKGB, Active Measures, Disinformation and Subversion
KGB, Active Measures, Disinformation and Subversion
Peter Hammond
 
The Use of Social Media during the 2014 Crisis In Ukraine
The Use of Social Media during the 2014 Crisis In UkraineThe Use of Social Media during the 2014 Crisis In Ukraine
The Use of Social Media during the 2014 Crisis In Ukraine
Toronto Metropolitan University
 
Government and Social Media Military Facebook Use Study
Government and Social Media Military Facebook Use StudyGovernment and Social Media Military Facebook Use Study
Government and Social Media Military Facebook Use Study
Nativa
 
Social Media and Government 2.0
Social Media and Government 2.0Social Media and Government 2.0
Social Media and Government 2.0
Alexander Howard
 
An analysis of japanese local government facebook profiles muneo kaigo
An analysis of japanese local government facebook profiles muneo kaigoAn analysis of japanese local government facebook profiles muneo kaigo
An analysis of japanese local government facebook profiles muneo kaigo
Danube University Krems, Centre for E-Governance
 
Social media to nie tylko Facebook. Fakty i mity o social media ROI.
Social media to nie tylko Facebook. Fakty i mity o social media ROI.Social media to nie tylko Facebook. Fakty i mity o social media ROI.
Social media to nie tylko Facebook. Fakty i mity o social media ROI.
Piotrek Pal
 
DISINFORMATION ON SOCIAL MEDIA DURING GEZI PARK PROTESTS�
DISINFORMATION ON SOCIAL MEDIA DURING GEZI PARK PROTESTS�DISINFORMATION ON SOCIAL MEDIA DURING GEZI PARK PROTESTS�
DISINFORMATION ON SOCIAL MEDIA DURING GEZI PARK PROTESTS�
turkeyprotests
 
Facebook - mobilny serwis społecznościowy
Facebook - mobilny serwis społecznościowyFacebook - mobilny serwis społecznościowy
Facebook - mobilny serwis społecznościowy
Łukasz Dębski
 
RUSSIAN PROPAGANDA, Denis Bohush, Vilnius 2016
RUSSIAN PROPAGANDA, Denis Bohush, Vilnius 2016RUSSIAN PROPAGANDA, Denis Bohush, Vilnius 2016
RUSSIAN PROPAGANDA, Denis Bohush, Vilnius 2016
Denis Bohush
 
Facebook privacy and security
Facebook privacy and securityFacebook privacy and security
Facebook privacy and security
Gonetech Solutions
 
PPT Presentation on Facebook.com
PPT Presentation on Facebook.comPPT Presentation on Facebook.com
PPT Presentation on Facebook.com
Krishan Majumder
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
Suryansh Srivastava
 
Advantages and Disadvantages of Facebook
Advantages and Disadvantages of FacebookAdvantages and Disadvantages of Facebook
Advantages and Disadvantages of Facebook
chintanchheda
 
Social Network Analysis
Social Network AnalysisSocial Network Analysis
Social Network Analysis
Giorgos Cheliotis
 
Facebook Presentation
Facebook PresentationFacebook Presentation
Facebook Presentation
ahazley
 
Ceid presentation - kyiv feb 2017 - ru propaganda in hungary
Ceid   presentation - kyiv feb 2017 - ru propaganda in hungaryCeid   presentation - kyiv feb 2017 - ru propaganda in hungary
Ceid presentation - kyiv feb 2017 - ru propaganda in hungary
UkraineCrisisMediaCenter
 

Viewers also liked (20)

Social media to nie tylko Facebook
Social media to nie tylko FacebookSocial media to nie tylko Facebook
Social media to nie tylko Facebook
 
Dlaczego wyniki badan laboratoryjnych nie sa porownywalne
Dlaczego wyniki badan laboratoryjnych nie sa porownywalneDlaczego wyniki badan laboratoryjnych nie sa porownywalne
Dlaczego wyniki badan laboratoryjnych nie sa porownywalne
 
Foo Thoughts
Foo ThoughtsFoo Thoughts
Foo Thoughts
 
Prywatność a internet
Prywatność a internet Prywatność a internet
Prywatność a internet
 
KGB, Active Measures, Disinformation and Subversion
KGB, Active Measures, Disinformation and SubversionKGB, Active Measures, Disinformation and Subversion
KGB, Active Measures, Disinformation and Subversion
 
The Use of Social Media during the 2014 Crisis In Ukraine
The Use of Social Media during the 2014 Crisis In UkraineThe Use of Social Media during the 2014 Crisis In Ukraine
The Use of Social Media during the 2014 Crisis In Ukraine
 
Government and Social Media Military Facebook Use Study
Government and Social Media Military Facebook Use StudyGovernment and Social Media Military Facebook Use Study
Government and Social Media Military Facebook Use Study
 
Social Media and Government 2.0
Social Media and Government 2.0Social Media and Government 2.0
Social Media and Government 2.0
 
An analysis of japanese local government facebook profiles muneo kaigo
An analysis of japanese local government facebook profiles muneo kaigoAn analysis of japanese local government facebook profiles muneo kaigo
An analysis of japanese local government facebook profiles muneo kaigo
 
Social media to nie tylko Facebook. Fakty i mity o social media ROI.
Social media to nie tylko Facebook. Fakty i mity o social media ROI.Social media to nie tylko Facebook. Fakty i mity o social media ROI.
Social media to nie tylko Facebook. Fakty i mity o social media ROI.
 
DISINFORMATION ON SOCIAL MEDIA DURING GEZI PARK PROTESTS�
DISINFORMATION ON SOCIAL MEDIA DURING GEZI PARK PROTESTS�DISINFORMATION ON SOCIAL MEDIA DURING GEZI PARK PROTESTS�
DISINFORMATION ON SOCIAL MEDIA DURING GEZI PARK PROTESTS�
 
Facebook - mobilny serwis społecznościowy
Facebook - mobilny serwis społecznościowyFacebook - mobilny serwis społecznościowy
Facebook - mobilny serwis społecznościowy
 
RUSSIAN PROPAGANDA, Denis Bohush, Vilnius 2016
RUSSIAN PROPAGANDA, Denis Bohush, Vilnius 2016RUSSIAN PROPAGANDA, Denis Bohush, Vilnius 2016
RUSSIAN PROPAGANDA, Denis Bohush, Vilnius 2016
 
Facebook privacy and security
Facebook privacy and securityFacebook privacy and security
Facebook privacy and security
 
PPT Presentation on Facebook.com
PPT Presentation on Facebook.comPPT Presentation on Facebook.com
PPT Presentation on Facebook.com
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Advantages and Disadvantages of Facebook
Advantages and Disadvantages of FacebookAdvantages and Disadvantages of Facebook
Advantages and Disadvantages of Facebook
 
Social Network Analysis
Social Network AnalysisSocial Network Analysis
Social Network Analysis
 
Facebook Presentation
Facebook PresentationFacebook Presentation
Facebook Presentation
 
Ceid presentation - kyiv feb 2017 - ru propaganda in hungary
Ceid   presentation - kyiv feb 2017 - ru propaganda in hungaryCeid   presentation - kyiv feb 2017 - ru propaganda in hungary
Ceid presentation - kyiv feb 2017 - ru propaganda in hungary
 

Similar to Security Dangers of Social Networking

Social media privacy threats that you need to keep an eye on in 2021
Social media privacy threats that you need to keep an eye on in 2021Social media privacy threats that you need to keep an eye on in 2021
Social media privacy threats that you need to keep an eye on in 2021
Impulse Digital
 
Security in social network araceli&arlethe
Security in social network araceli&arletheSecurity in social network araceli&arlethe
Security in social network araceli&arlethe
tecnologico de tuxtepec
 
CIS490 Lab 1 Social Engineering AuditSocial engineering attacks.docx
CIS490 Lab 1 Social Engineering AuditSocial engineering attacks.docxCIS490 Lab 1 Social Engineering AuditSocial engineering attacks.docx
CIS490 Lab 1 Social Engineering AuditSocial engineering attacks.docx
monicafrancis71118
 
Exploring machine learning techniques for fake profile detection in online so...
Exploring machine learning techniques for fake profile detection in online so...Exploring machine learning techniques for fake profile detection in online so...
Exploring machine learning techniques for fake profile detection in online so...
IJECEIAES
 
EFFECTS OF SOCIAL MEDIA ON YOUTH
EFFECTS OF SOCIAL MEDIA ON YOUTHEFFECTS OF SOCIAL MEDIA ON YOUTH
EFFECTS OF SOCIAL MEDIA ON YOUTH
Yaman Singhania
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media Security
scstatelibrary
 
Social Media Safety Presentation
Social Media Safety PresentationSocial Media Safety Presentation
Social Media Safety Presentation
LJ Henshell
 
Blogging today
Blogging todayBlogging today
Blogging today
francizzzek
 
Social Media Awareness
Social Media AwarenessSocial Media Awareness
Social Media Awareness
Dr Raghu Khimani
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
suresh sood
 
Security Paper
Security PaperSecurity Paper
Security Paper
Shante' Perrin
 
Hacking 04 2011
Hacking 04 2011Hacking 04 2011
Hacking 04 2011
Felipe Prado
 
Spam identification fake profile
Spam identification fake profileSpam identification fake profile
L1b Trends in ICT - Online Safety and Security.pdf
L1b Trends in ICT - Online Safety and Security.pdfL1b Trends in ICT - Online Safety and Security.pdf
L1b Trends in ICT - Online Safety and Security.pdf
Jeth Cuenco
 
Advantages and Disadvantages Of Social Media
 Advantages and Disadvantages Of Social Media Advantages and Disadvantages Of Social Media
Advantages and Disadvantages Of Social Media
Dilna DV
 
Users guide
Users guideUsers guide
Users guide
Darren Thomas
 
Social Network: Good or Bad
Social Network: Good or BadSocial Network: Good or Bad
Social Network: Good or Bad
manesh Makheja
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
Arindam Sarkar
 
Social Network Crime on Rise
Social Network Crime on RiseSocial Network Crime on Rise
Social Network Crime on Rise
Dominic Karunesudas
 
Social media and the future of social networking
Social media and the future of social networkingSocial media and the future of social networking
Social media and the future of social networking
RussetanSc
 

Similar to Security Dangers of Social Networking (20)

Social media privacy threats that you need to keep an eye on in 2021
Social media privacy threats that you need to keep an eye on in 2021Social media privacy threats that you need to keep an eye on in 2021
Social media privacy threats that you need to keep an eye on in 2021
 
Security in social network araceli&arlethe
Security in social network araceli&arletheSecurity in social network araceli&arlethe
Security in social network araceli&arlethe
 
CIS490 Lab 1 Social Engineering AuditSocial engineering attacks.docx
CIS490 Lab 1 Social Engineering AuditSocial engineering attacks.docxCIS490 Lab 1 Social Engineering AuditSocial engineering attacks.docx
CIS490 Lab 1 Social Engineering AuditSocial engineering attacks.docx
 
Exploring machine learning techniques for fake profile detection in online so...
Exploring machine learning techniques for fake profile detection in online so...Exploring machine learning techniques for fake profile detection in online so...
Exploring machine learning techniques for fake profile detection in online so...
 
EFFECTS OF SOCIAL MEDIA ON YOUTH
EFFECTS OF SOCIAL MEDIA ON YOUTHEFFECTS OF SOCIAL MEDIA ON YOUTH
EFFECTS OF SOCIAL MEDIA ON YOUTH
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media Security
 
Social Media Safety Presentation
Social Media Safety PresentationSocial Media Safety Presentation
Social Media Safety Presentation
 
Blogging today
Blogging todayBlogging today
Blogging today
 
Social Media Awareness
Social Media AwarenessSocial Media Awareness
Social Media Awareness
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Security Paper
Security PaperSecurity Paper
Security Paper
 
Hacking 04 2011
Hacking 04 2011Hacking 04 2011
Hacking 04 2011
 
Spam identification fake profile
Spam identification fake profileSpam identification fake profile
Spam identification fake profile
 
L1b Trends in ICT - Online Safety and Security.pdf
L1b Trends in ICT - Online Safety and Security.pdfL1b Trends in ICT - Online Safety and Security.pdf
L1b Trends in ICT - Online Safety and Security.pdf
 
Advantages and Disadvantages Of Social Media
 Advantages and Disadvantages Of Social Media Advantages and Disadvantages Of Social Media
Advantages and Disadvantages Of Social Media
 
Users guide
Users guideUsers guide
Users guide
 
Social Network: Good or Bad
Social Network: Good or BadSocial Network: Good or Bad
Social Network: Good or Bad
 
Cybercrime: A Seminar Report
Cybercrime: A Seminar ReportCybercrime: A Seminar Report
Cybercrime: A Seminar Report
 
Social Network Crime on Rise
Social Network Crime on RiseSocial Network Crime on Rise
Social Network Crime on Rise
 
Social media and the future of social networking
Social media and the future of social networkingSocial media and the future of social networking
Social media and the future of social networking
 

Security Dangers of Social Networking

  • 1. Slapped in the Facebook: The wonders (and security threats) of social networking Presentation for the National Information Security Group (NAISG), May 2009 monthly meeting
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.