SlideShare a Scribd company logo
1 of 13
Download to read offline
Social Networking
Need for an Information Security Policy

                                          Bernardo Ramos 08/02/2010




February 8th 2010
Index


            ●
                    Social Networking: A new standard for interpersonal
                    communication:
                    ●
                        Personal
                    ●
                        Professional
            ●
                    It is here to stay
            ●
                    Social Networking and Security
                    ●
                        Old threats on a new support
                    ●
                        New specific threats




February 8th 2010                  Social Networks - Information Security   2
Social Networking: A new standard for
interpersonal communication
●
    Social Networking is not just Facebook and Twitter:
    It is a composite set of:
          – Blogging (Wordpress / Blogger)

          – Microblogging (Twitter)

          – Tumble-logging, Link-logging (http://fr.wikipedia.org/wiki/Tumblelog)
             (Tumblr, Delicious)
          – Open Social Networks (Facebook, Myspace, Tuenty, Renren)

          – Professional Social Networks (LinkedIn, Viadeo)

          – Private/dedicated Social Networks (Ning)

          – Photo and Video sharing (Flickr, Youtube)

          – Slide Sharing (Slideshare)

          – Document Sharing (Google docs)

          – Music lists sharing (Spotify, Blip.fm)

    Complemented and integrated with
          – E-mail

          – Chat
February 8th 2010              Social Networks - Information Security               3
Social Networking: A new standard for
interpersonal communication



                    Personal use



                    Professional use



                    Very linked to mobile communication



February 8th 2010   Social Networks - Information Security   4
Social Networking is here to stay

                    Think of many other previous innovations:
         1960
                     ●
                       Telephone
         1970        ●
                       Computer Terminal
         1980        ●
                       Personal Computer
                     ●
                       Mail
         1990        ●
                       Forums and Groupwares
                     ●
                       Internet
         2000        ●
                       Collaborative web and IM
                    ●
                        Social Networking
         2010


February 8th 2010           Social Networks - Information Security   5
Social Networking and Security
   ●
        Social Networking provides support for
        already existing threats:
         ●
              Phishing

         ●
              Social Engineering

         ●
              Spam

         ●
              Data Leakage

         ●
              Malware infections


February 8th 2010            Social Networks - Information Security   6
Social Networking and Security
 ●
     Social Network present new threats or extended
     support for existing ones (Data loss, Identity
     theft, Password theft, etc.):
      ●
          Shortened URL (Twitter)

      ●
          Complementary Applications (Facebook)

      ●
          Unawareness of who is reading you, + sharing a lot of personal
          information:

            –   Travelling details
            –   What you are working on
            –   Identity information
            –   Etc.



February 8th 2010                 Social Networks - Information Security   7
Social Networking and Security


 ●
     Beside the associated Information Security
     threats, Social Networking represents a risk
     since its intensive use could:

       ●
           Overwhelm telecommunications resources

       ●
           Reduce employee productivity




February 8th 2010       Social Networks - Information Security   8
Security Policy for Social Networking
   ●
        The social networking boom shows no sign of stopping.
   ●
        For young arriving employees it makes part of their everyday-life
   ●
        Social networking sites are now a vital part of many marketing and
        sales strategies.
   ●
        Many companies are planning the use of social networking for
        internal use
  Therefore:
   ●
        they cannot be blocked
   ●
        but they cannot be allowed to
         ●
            drain company resources or
         ●
            be used as vectors for data loss or malware penetration




February 8th 2010             Social Networks - Information Security         9
Security Policy for Social Networking
    A specific Social Networking Security Policy is needed to
    provide:
              granular access control,
              secure encryption
              data monitoring
              comprehensive malware protection
    And the most important
              User Awareness



February 8th 2010         Social Networks - Information Security   10
Security Policy for Social Networking
   ●
        Starting from existing policies:
         ●
              User charter for the use of Information and Telecommunication resources
         ●
              Basic Security recommendations
         ●
              Internet Access best practices
         ●
              Etc.
   ●
        Additional awareness communication specific to Social
        Networking:
         ●
              How to adjust your settings to protect your identity
         ●
              Use of additional applications integrated in Social Networks
         ●
              Share only what really belongs to you
         ●
              Use chat only with verified known people
         ●
              Do not run for the biggest number of connections
         ●
              Do not mix personal and professional
         ●
              Be very restrictive and careful when sharing your company activities
         ●
              Do not use the same password everywhere (good password tips)
         ●
              Do not click quickly neither everywhere
         ●
              Think you can endanger the others




February 8th 2010                     Social Networks - Information Security            11
Security Policy for Social Networking
   ●
        New restrictions and controls specific for
        Social Networking:
         ●
              ¿Accessing hours restrictions? (Difficult and only for productivity
              reasons)
         ●
              Individual high volume traffic alert
         ●
              Classification of Sensitive Information
         ●
              Encryption of High sensitive data
         ●
              Granular monitoring of Internet traffic
         ●
              Identification of specific dangerous sites or tools and restrict its use
         ●
              Regulation of the use of the company name and information
         ●
              Specific restrictions depending on each Social Media and tool (per
              user, per hours, etc.) Using last generation Firewalls
         ●
              Etc.




February 8th 2010                  Social Networks - Information Security                12
Security Policy for Social Networking
   ●
        Can we forbid Social Networking?
        Should we do that?
        It is not a good idea because most of risks will still be there
          since:

         ●
              People will anyway use it at work with their personal mobile
              devices

         ●
              People will still use it at home




February 8th 2010              Social Networks - Information Security        13

More Related Content

Viewers also liked

Using Git and BitBucket
Using Git and BitBucketUsing Git and BitBucket
Using Git and BitBucketMedhat Dawoud
 
The Layman's Guide to Microsoft Azure
The Layman's Guide to Microsoft AzureThe Layman's Guide to Microsoft Azure
The Layman's Guide to Microsoft AzureAptera Inc
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Imperva
 
Cyber security
Cyber securityCyber security
Cyber securitySiblu28
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 

Viewers also liked (9)

Git for beginners
Git for beginnersGit for beginners
Git for beginners
 
Using Git and BitBucket
Using Git and BitBucketUsing Git and BitBucket
Using Git and BitBucket
 
The Layman's Guide to Microsoft Azure
The Layman's Guide to Microsoft AzureThe Layman's Guide to Microsoft Azure
The Layman's Guide to Microsoft Azure
 
Bitbucket
BitbucketBitbucket
Bitbucket
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016
 
Azure Cloud PPT
Azure Cloud PPTAzure Cloud PPT
Azure Cloud PPT
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 

Similar to Social Networking Information Security

Infocom Security
Infocom SecurityInfocom Security
Infocom Securitymmavis
 
Social media and Security: How to Ensure Safe Social Networking
Social media and Security: How to Ensure Safe Social NetworkingSocial media and Security: How to Ensure Safe Social Networking
Social media and Security: How to Ensure Safe Social NetworkingIshfaq Majid
 
Online Privacy
Online PrivacyOnline Privacy
Online PrivacyIWMW
 
Online Focus Groups Privacy and Security Considerations
Online Focus Groups Privacy and Security ConsiderationsOnline Focus Groups Privacy and Security Considerations
Online Focus Groups Privacy and Security ConsiderationsAlfonso Sintjago
 
Basic Digital Security
Basic Digital SecurityBasic Digital Security
Basic Digital SecurityUjjwal Acharya
 
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...IRJET Journal
 
Social networking privacy issues & exposure
Social networking privacy issues & exposureSocial networking privacy issues & exposure
Social networking privacy issues & exposureLDdsng
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxRheamaeLiwan
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxJakeTorio1
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxEhraicaSaquing
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxDineLiwan
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxLiberty Aquino
 
Internet Science
Internet ScienceInternet Science
Internet Sciencei_scienceEU
 
The shift from social network security to the social iot security
The shift from social network security to the social iot securityThe shift from social network security to the social iot security
The shift from social network security to the social iot securityAboul Ella Hassanien
 
The shift from social network security to the social iot security
The shift from social network security to the social iot securityThe shift from social network security to the social iot security
The shift from social network security to the social iot securityAboul Ella Hassanien
 

Similar to Social Networking Information Security (20)

Infocom Security
Infocom SecurityInfocom Security
Infocom Security
 
Social media and Security: How to Ensure Safe Social Networking
Social media and Security: How to Ensure Safe Social NetworkingSocial media and Security: How to Ensure Safe Social Networking
Social media and Security: How to Ensure Safe Social Networking
 
Online Privacy
Online PrivacyOnline Privacy
Online Privacy
 
Online Focus Groups Privacy and Security Considerations
Online Focus Groups Privacy and Security ConsiderationsOnline Focus Groups Privacy and Security Considerations
Online Focus Groups Privacy and Security Considerations
 
Basic Digital Security
Basic Digital SecurityBasic Digital Security
Basic Digital Security
 
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
 
Abso lutely!
Abso lutely!Abso lutely!
Abso lutely!
 
Social networking privacy issues & exposure
Social networking privacy issues & exposureSocial networking privacy issues & exposure
Social networking privacy issues & exposure
 
Trendy Technology and Social Media for EGAT Executive
Trendy Technology and Social Media for EGAT ExecutiveTrendy Technology and Social Media for EGAT Executive
Trendy Technology and Social Media for EGAT Executive
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docx
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER ETECH
REVIEWER ETECHREVIEWER ETECH
REVIEWER ETECH
 
REVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docxREVIEWER-FOR-ETECH (1).docx
REVIEWER-FOR-ETECH (1).docx
 
Empowerment Technology
Empowerment Technology Empowerment Technology
Empowerment Technology
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
REVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docxREVIEWER-FOR-ETECH.docx
REVIEWER-FOR-ETECH.docx
 
Internet Science
Internet ScienceInternet Science
Internet Science
 
The shift from social network security to the social iot security
The shift from social network security to the social iot securityThe shift from social network security to the social iot security
The shift from social network security to the social iot security
 
The shift from social network security to the social iot security
The shift from social network security to the social iot securityThe shift from social network security to the social iot security
The shift from social network security to the social iot security
 

Recently uploaded

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 

Recently uploaded (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 

Social Networking Information Security

  • 1. Social Networking Need for an Information Security Policy Bernardo Ramos 08/02/2010 February 8th 2010
  • 2. Index ● Social Networking: A new standard for interpersonal communication: ● Personal ● Professional ● It is here to stay ● Social Networking and Security ● Old threats on a new support ● New specific threats February 8th 2010 Social Networks - Information Security 2
  • 3. Social Networking: A new standard for interpersonal communication ● Social Networking is not just Facebook and Twitter: It is a composite set of: – Blogging (Wordpress / Blogger) – Microblogging (Twitter) – Tumble-logging, Link-logging (http://fr.wikipedia.org/wiki/Tumblelog) (Tumblr, Delicious) – Open Social Networks (Facebook, Myspace, Tuenty, Renren) – Professional Social Networks (LinkedIn, Viadeo) – Private/dedicated Social Networks (Ning) – Photo and Video sharing (Flickr, Youtube) – Slide Sharing (Slideshare) – Document Sharing (Google docs) – Music lists sharing (Spotify, Blip.fm) Complemented and integrated with – E-mail – Chat February 8th 2010 Social Networks - Information Security 3
  • 4. Social Networking: A new standard for interpersonal communication Personal use Professional use Very linked to mobile communication February 8th 2010 Social Networks - Information Security 4
  • 5. Social Networking is here to stay Think of many other previous innovations: 1960 ● Telephone 1970 ● Computer Terminal 1980 ● Personal Computer ● Mail 1990 ● Forums and Groupwares ● Internet 2000 ● Collaborative web and IM ● Social Networking 2010 February 8th 2010 Social Networks - Information Security 5
  • 6. Social Networking and Security ● Social Networking provides support for already existing threats: ● Phishing ● Social Engineering ● Spam ● Data Leakage ● Malware infections February 8th 2010 Social Networks - Information Security 6
  • 7. Social Networking and Security ● Social Network present new threats or extended support for existing ones (Data loss, Identity theft, Password theft, etc.): ● Shortened URL (Twitter) ● Complementary Applications (Facebook) ● Unawareness of who is reading you, + sharing a lot of personal information: – Travelling details – What you are working on – Identity information – Etc. February 8th 2010 Social Networks - Information Security 7
  • 8. Social Networking and Security ● Beside the associated Information Security threats, Social Networking represents a risk since its intensive use could: ● Overwhelm telecommunications resources ● Reduce employee productivity February 8th 2010 Social Networks - Information Security 8
  • 9. Security Policy for Social Networking ● The social networking boom shows no sign of stopping. ● For young arriving employees it makes part of their everyday-life ● Social networking sites are now a vital part of many marketing and sales strategies. ● Many companies are planning the use of social networking for internal use Therefore: ● they cannot be blocked ● but they cannot be allowed to ● drain company resources or ● be used as vectors for data loss or malware penetration February 8th 2010 Social Networks - Information Security 9
  • 10. Security Policy for Social Networking A specific Social Networking Security Policy is needed to provide:  granular access control,  secure encryption  data monitoring  comprehensive malware protection And the most important  User Awareness February 8th 2010 Social Networks - Information Security 10
  • 11. Security Policy for Social Networking ● Starting from existing policies: ● User charter for the use of Information and Telecommunication resources ● Basic Security recommendations ● Internet Access best practices ● Etc. ● Additional awareness communication specific to Social Networking: ● How to adjust your settings to protect your identity ● Use of additional applications integrated in Social Networks ● Share only what really belongs to you ● Use chat only with verified known people ● Do not run for the biggest number of connections ● Do not mix personal and professional ● Be very restrictive and careful when sharing your company activities ● Do not use the same password everywhere (good password tips) ● Do not click quickly neither everywhere ● Think you can endanger the others February 8th 2010 Social Networks - Information Security 11
  • 12. Security Policy for Social Networking ● New restrictions and controls specific for Social Networking: ● ¿Accessing hours restrictions? (Difficult and only for productivity reasons) ● Individual high volume traffic alert ● Classification of Sensitive Information ● Encryption of High sensitive data ● Granular monitoring of Internet traffic ● Identification of specific dangerous sites or tools and restrict its use ● Regulation of the use of the company name and information ● Specific restrictions depending on each Social Media and tool (per user, per hours, etc.) Using last generation Firewalls ● Etc. February 8th 2010 Social Networks - Information Security 12
  • 13. Security Policy for Social Networking ● Can we forbid Social Networking? Should we do that? It is not a good idea because most of risks will still be there since: ● People will anyway use it at work with their personal mobile devices ● People will still use it at home February 8th 2010 Social Networks - Information Security 13