+ All Categories
Home > Technology > Creating Secure Social Applications

Creating Secure Social Applications

Date post: 07-Nov-2014
Category:
Upload: tyler-browning
View: 233 times
Download: 3 times
Share this document with a friend
Description:
Social media is a new marketing currency for brands. That much is certain. Brands can engage directly with consumers in real-time allowing for the collection of unprecedented amount of data on the customer. This data is increasingly powerful to brands, their agencies, their customers and unfortunately, the unscrupulous among us. Hopefully, someone is thinking about security.
Popular Tags:
13
Crea%ng Secure Apps for Social Media Tyler Browning Director – Agency Development at BlueModus – A Technology Agency
Transcript
Page 1: Creating Secure Social Applications

Crea%ng  Secure  Apps  for  Social  Media  

Tyler  Browning    Director  –  Agency  Development  at  BlueModus  –  A  Technology  Agency  

Page 2: Creating Secure Social Applications

What does Internet security mean?

Page 3: Creating Secure Social Applications

Data  Security  –  Man,  this  is  it’s  own  topic.  

Understanding  poten%al  data  exposure  

Firewalls  

Privacy  

Password  Security  

Risk  Assessment  

Code  Review  

Thinking  like  a  hacker  

Security for social media is…

Page 4: Creating Secure Social Applications

Say yes to social apps. Say yes to security and incorporate the following into your development.

Applica%on  Requirements   Test  Cases   Risk  

Assessment  

Code  Review  Security  &  

development  placed  together  

Firewall!!!  

Page 5: Creating Secure Social Applications

Oh, data, your crazy. Securing  a  Database   Securing  your  

server.  

Protect  the  data.    

Protect  the  system.  

Perimeter  firewall.  

Internal  firewall.  

Securing  User’s  Data   What  data  do  

you  have  on  the  user?  

How  is  data  being  managed?  

Who  has  access  to  the  user  ID  and  other  user  data?  

Password  Security  

Educate  the  user  on  password  security.  

Understand  how  secure  the  user  is  with  their  data.  

Page 6: Creating Secure Social Applications

Thinking like a hacker.

Understand  the  data.  

How  sensi%ve  is  the  data?  

What  can  a  criminal  do  with  

the  data?  

Where  are  the  vulnerabili%es  in  the  applica%on?  

SQL  injec%on?  

Rainbow  Table?  

Educa%ng  the  user.  

Making  the  case  for  complex  +  

unique  passwords.  

Pos%ng  sensi%ve  data.  

Page 7: Creating Secure Social Applications

Why NOT to eff with the privacy policy.

Andy  Hatch  "Without  a  privacy  policy  to  review,  consumers  may  not  have  the  ability  to  understand  and  control  the  use  of  their  personal  data  by  the  Apps,”  –  MediaPost  News  

Nearly  three-­‐quarters  of  the  most  popular  mobile  apps  lack  even  a  basic  privacy  policy,  according  to  a  new  survey  by  the  Future  of  Privacy  Forum.  

Page 8: Creating Secure Social Applications

Case studies.

Page 9: Creating Secure Social Applications

hZp://bit.ly/iUU0TS    

"It  would  appear  that  security  experts  are  not  expertly  secured,"  Anonymous  wrote.  

Page 10: Creating Secure Social Applications

Lessons from the HB Gary Case Study

•  If you are not managing the security, know the firm or person and understand their security practices.

•  Security assumptions are very dangerous. •  Diverse passwords! •  Know your vulnerabilities and understand

what will happen if your system is breached. •  Plan for a system breach.

Page 11: Creating Secure Social Applications

"...this is a scary privacy issue. I can find the name of pretty much every person on Facebook...Once I have the name and URL of a user, I can view, by default, their picture, friends, information about them, and some other details…..

hZp://bit.ly/m8pKvI     hZp://bit.ly/kDnMIC    

Page 12: Creating Secure Social Applications

Lessons from the Facebook Case Study

•  Understand the security practice around social platforms like Facebook.

•  Privacy Policy! •  What data is open, closed and how could un-

authorized folks access a users information. •  User ID’s are important to secure on some

level. •  Security around available API’s.

Page 13: Creating Secure Social Applications

Thank  you  for  the  opportunity.  

Tyler  Browning  @tylerbrowning  [email protected]  hZp://www.linkedin.com/in/tylerbrowning  


Recommended