Date post: | 01-Nov-2014 |
Category: |
Technology |
Upload: | carlos-laorden |
View: | 293 times |
Download: | 0 times |
A Threat Model Approach to Threats and Vulnerabilities in
On-line Social Networks
¿Can i join Facebook?
Mommy
Daddy
Sure you can, love
Why you want to do this to me?
Welcome to the jungle
Threat modellingmethodology
Threats Attacks
Vulnerabilities
Countermeasures
Assets
Risks
Circleof
Risk
compromised by
materialise by
exploit
expose to
mitigated by
protect
Assetsand threats
Private Information
Secondary Data Collection
Digital Dossier Building
Must be protected from
ReidentificationSensitive Attribute Inference
Excessive Exposition of Private Data
Lack of Control over Data Published by
others
Financial Assets
Might suffer from
Frauds and ScamsWorkers Productivity Losses
Intelectual Property
Is threaten by
Publication of Protected
Information
Transfer of Intellectual Rights to
the Platform
Corporate Secrets
Can be obtained through
Social EngineeringCarelessly Publishing
of Confidential Information
Physical Security
Threatened by
Over-sharing of Information
Content Based Image Retrieval
Harassment Between AdultsCyber-bullyingCyber-grooming
Computing and Network Resources
Might be diminished by
New Malware Generations
Multimedia Bandwidth
Dependance
Reputación
Corporate and Personal
Reputation
Damaged by
Automated campaigns to erode
reputationCollusionExtortionRepudiationHerd Effect
Digital Identity
Fake ProfilesOSN’s negligenceIdentity Thefts
Might be affected by
Is it so easy to compromise the security in On-line Social
Networks?
Every system has
its flaws
Vulnerabilities associated with
the Plataform
Difficulty to remove information
Weak authentication method
Non validation of users data during
registration
Vulnerabilities associated
with the Users
Unknowingly disclosure of
navigation data
Information disclosed by the user status
Vulnerabilities associated
with the Photographs
Tagging by others
Implicit information in multimedia
content
In conclusion
On-line Social networks are not so bad
YOU DON’TGET TO500 MILLION
FRIENDSWITHOUT MAKING
A FEWENEMIES
References1. Social networking:
http://whyleadnow.files.wordpress.com/2013/07/social_networking.jpg2. Baby using computer:
http://1.bp.blogspot.com/-9DfCepn7WqQ/Ta8lIKKL7UI/AAAAAAAABkU/-Rjjob7TIu8/s1600/kid-using-computer2.jpg
3. Jungle: http://static.fjcdn.com/large/pictures/25/1a/251ade_3429681.jpg
4. Stocks: http://www.masterforex-v.org/system/news/resized/Trjejdjeram_fon_4064364665.jpg
5. Gun: http://ehstoday.com/site-files/ehstoday.com/files/uploads/2012/06/June2012_WorkplaceViolence.jpg
6. George W Bush bad reputation example: http://www.mbetv.com/wp-content/uploads/2010/11/George-W-Bush.jpg
7. Robbery: http://www.1mim.com/wp-content/gallery/black-and-white/1-robbery.jpg
8. Social networks: http://lapalabraylaescucha.files.wordpress.com/2012/02/istock_000006428830xlarge.jpg
9. Facebook enemies: https://lh5.googleusercontent.com/_Khh3MfoDJoQ/TVUsmrBZJyI/AAAAAAAAA9c/3PdbkYswsQ0/facebook.jpg