Social Networking Best Practices
This presentation is the property of its rightful owner.
Sponsored Links
1 / 11

San Diego Industrial Counterintelligence Working Group PowerPoint PPT Presentation


  • 58 Views
  • Uploaded on
  • Presentation posted in: General

Social Networking Best Practices. San Diego, CA 20 June 2012. This document is intended solely for the use and information of the client to whom it is addressed. San Diego Industrial Counterintelligence Working Group. Table Of Contents. What is Social Networking?

Download Presentation

San Diego Industrial Counterintelligence Working Group

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


San diego industrial counterintelligence working group

Social Networking Best Practices

San Diego, CA

20 June 2012

This document is intended solely for the use and information of the client to whom it is addressed.

San Diego Industrial Counterintelligence Working Group


Table of contents

Table Of Contents

What is Social Networking?

Why Do We Engage in Social Network?

The Vulnerabilities of Social Networking

Social Networking Best Practices

San Diego Industrial Counterintelligence Working Group


Social networking

Social Networking

Social Networking Sites (SNS) allow people to network, interact and collaborate to share information, data and ideas without geographic boundaries

San Diego Industrial Counterintelligence Working Group


Why do we use social networking

Why Do We Use Social Networking?

  • Easy to keep in contact with family and friends

  • Meet new people

  • Networking

  • Centralized location to share information

  • Marketing efforts

  • Gather ideas and receive feedback

  • Promote products and services

San Diego Industrial Counterintelligence Working Group


The vulnerabilities of social networking

The Vulnerabilities of Social Networking

  • Unsecured communications

  • Not everyone is who they say they are

    • Adversaries such as thieves, stalkers, hackers and terrorist use social networking as well

  • A Virtual Dumpster of Information

    • Excellent tool to use for social engineering

    • Good source for data aggregation

  • Lack of attention to security settings

San Diego Industrial Counterintelligence Working Group


The vulnerabilities of social networking1

The Vulnerabilities of Social Networking

  • The user

  • Mobile Applications

    • Geotagging photos

    • Providing current geographical location

  • Sharing too much information

San Diego Industrial Counterintelligence Working Group


Social networking best practices

Social Networking Best Practices

  • Use caution when sharing feelings

    • Your feelings could increase your risk of being approached or targeted

  • Update your security settings

    • Only allow users you trust access to your information

    • Restrict what other users can do with your information

    • Naval OPSEC Support Team (NOST) updates Facebook

      Security settings on a quarterly basis

    • www.slideshare.net/NavalOPSEC/

  • Know who you are allowing access to your account

    • Billy, who you have not seen since high school, and rarely socialized may not be someone you allow into your social network

    • Don’t accept all access requests, verify each request

      • How do they know you?

      • Is this person a friend of a friend?

San Diego Industrial Counterintelligence Working Group


Social networking best practices1

Social Networking Best Practices

  • Do not use known information for your “Forgot Password” challenge questions

    • Use fake information as challenge answers

  • Do not post sensitive information that could relate to your job

    • Ex. Just finished a client meeting with PMW 130

    • A quick Google search of PMW130 reveals that you work in the cyber security field and may have access to sensitive network security plans

  • Be aware of what your friends are posting about you

  • Parents should closely monitor their children's use of social media

  • Verify all requests before accepting

San Diego Industrial Counterintelligence Working Group


Social networking best practices2

Social Networking Best Practices

  • Beware of applications and plugins from third party vendors

  • Do not disclose your, or anyone else’s, security clearance level

  • Do not provide location or travel information when traveling

  • Always assume that whatever you post on the internet will be there FOREVER

San Diego Industrial Counterintelligence Working Group


Social networking best practices3

Social Networking Best Practices

  • Don’t post Personally Identifiable Information

    • Address

    • Phone Numbers

  • Before posting information to the Internet think to yourself

    • Would this information be of use to an adversary?

    • Can any additional information be gleaned from my post?

    • Am I putting anyone in danger by posting this?

  • Review all User Agreements

    • Once you post something on a site it belongs to the site

    • Many social networks sell your information

San Diego Industrial Counterintelligence Working Group


Questions

Questions

San Diego Industrial Counterintelligence Working Group


  • Login