1 / 0

San Diego Industrial Counterintelligence Working Group

Social Networking Best Practices. San Diego, CA 20 June 2012. This document is intended solely for the use and information of the client to whom it is addressed. San Diego Industrial Counterintelligence Working Group. Table Of Contents. What is Social Networking?

adamma
Download Presentation

San Diego Industrial Counterintelligence Working Group

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Social Networking Best Practices San Diego, CA 20 June 2012 This document is intended solely for the use and information of the client to whom it is addressed. San Diego Industrial Counterintelligence Working Group
  2. Table Of Contents

    What is Social Networking? Why Do We Engage in Social Network? The Vulnerabilities of Social Networking Social Networking Best Practices San Diego Industrial Counterintelligence Working Group
  3. Social Networking Social Networking Sites (SNS) allow people to network, interact and collaborate to share information, data and ideas without geographic boundaries San Diego Industrial Counterintelligence Working Group
  4. Why Do We Use Social Networking? Easy to keep in contact with family and friends Meet new people Networking Centralized location to share information Marketing efforts Gather ideas and receive feedback Promote products and services San Diego Industrial Counterintelligence Working Group
  5. The Vulnerabilities of Social Networking Unsecured communications Not everyone is who they say they are Adversaries such as thieves, stalkers, hackers and terrorist use social networking as well A Virtual Dumpster of Information Excellent tool to use for social engineering Good source for data aggregation Lack of attention to security settings San Diego Industrial Counterintelligence Working Group
  6. The Vulnerabilities of Social Networking The user Mobile Applications Geotagging photos Providing current geographical location Sharing too much information San Diego Industrial Counterintelligence Working Group
  7. Social Networking Best Practices Use caution when sharing feelings Your feelings could increase your risk of being approached or targeted Update your security settings Only allow users you trust access to your information Restrict what other users can do with your information Naval OPSEC Support Team (NOST) updates Facebook Security settings on a quarterly basis www.slideshare.net/NavalOPSEC/ Know who you are allowing access to your account Billy, who you have not seen since high school, and rarely socialized may not be someone you allow into your social network Don’t accept all access requests, verify each request How do they know you? Is this person a friend of a friend? San Diego Industrial Counterintelligence Working Group
  8. Social Networking Best Practices Do not use known information for your “Forgot Password” challenge questions Use fake information as challenge answers Do not post sensitive information that could relate to your job Ex. Just finished a client meeting with PMW 130 A quick Google search of PMW130 reveals that you work in the cyber security field and may have access to sensitive network security plans Be aware of what your friends are posting about you Parents should closely monitor their children's use of social media Verify all requests before accepting San Diego Industrial Counterintelligence Working Group
  9. Social Networking Best Practices Beware of applications and plugins from third party vendors Do not disclose your, or anyone else’s, security clearance level Do not provide location or travel information when traveling Always assume that whatever you post on the internet will be there FOREVER San Diego Industrial Counterintelligence Working Group
  10. Social Networking Best Practices Don’t post Personally Identifiable Information Address Phone Numbers Before posting information to the Internet think to yourself Would this information be of use to an adversary? Can any additional information be gleaned from my post? Am I putting anyone in danger by posting this? Review all User Agreements Once you post something on a site it belongs to the site Many social networks sell your information San Diego Industrial Counterintelligence Working Group
  11. Questions San Diego Industrial Counterintelligence Working Group
More Related