Beruflich Dokumente
Kultur Dokumente
Social Networks
Introduction
Social networks are part of the users daily Internet browsing habits. Any
Internet user makes use of at least one social network. Most of the users
are active participants in social networks. For many users (especially the
youngest ones), social networks are the main reason to get connected
to the Internet.
However, using social networks leaves the users exposed to a set of cyber
threats that may jeopardize the users information, their integrity and even
their money.
Due to the increasing trend of cyber criminals using social networks as
a way to implement their attacks, it has become vital for the user to
be protected and to have a secure environment in which to use social
networks.
What are the main attacks? What are the main security measures? Based
on the answers to these two questions, this report will provide the users
with some guidelines for them to be better protected when using social
networks.
Redes Sociales
MySpace
Malware
platform technology which made it possible to infect Windows, Linux and Mac OS systems as well.
When the victim accesses the malicious page, it identifies which operative system the user is executing
and it downloads the file corresponding to this platform.
Phishing
Phishing
Data Theft
In their every day use of social networks, users upload different personal data to the web that can be
used by the attackers.
Data theft in social networks is directly associated with identity theft, one of the cyber crimes that
has developed the most in the last few years.
The two most important vectors for data theft are:
Social Engineering: Direct contact with the victim users, getting information
from them through communication, friendship or any kind of contact the social
network makes possible.
Public data: Social networks wrong configuration may allow personal data to be
accessible regardless of the users will or convenience. Malicious people may access
this information.
Children
Children use social networks from a very early age, even beyond what the social networks
themselves consider to be convenient (Facebook, for instance, was designed for people older than 18
years old).
There are different threats, which are specifically focused on young people using these services:
Cyber bullying, grooming and sexting are some of the risks children are exposed to when browsing
social networks.
The adults role is fundamental in order to protect children. Children should not use social networks
without the support, dialogue and education of their parents, or any other adult role model, even
their teachers.
Protection Methods
Considering these threats, using social networks may seem dangerous. However, if the following recommendations are
followed, it is possible to use social networks and have suitable protection levels to enjoy them in a correct and safe way.
The most important measures to be taken are security technology use, correct configuration of the users profiles in social
networks and HTTPS protocol use for browsing the web. However, continuous education of the users and careful use when
browsing the web will always make it possible to minimize the risks to which the users are exposed.
Since malicious codes are the most important mass threat, antivirus
software use with proactive detection skills, with updated databases, is a
fundamental aspect to avoid malware spreading through social networks.
Anti-spam and firewall tools also allow to optimize the system security to
avoid these risks.
It is also essential not to use an administrator user when browsing
these networks, and to provide each user with a different profile in the
computers, so as to minimize the impact in case an incident occurs.
Finally, as regards children, parental control tools allow adults not only to
block non-desirable websites, but also to limit the time or the number of
hours during which the child may use social networks.
11
By default, social network configurations are not always optimum for the
users safety. Therefore, it is advisable to devote some time when creating
the user and to periodically check the possible data leaks, in case of a wrong
system configuration.
12
In Facebook
Choose the option Account Settings from the Account menu in the up
side right corner. Then, go to the Account Security tab and the possibility
to choose secure navigation will be displayed.
In Twitter
the net.
Go to account settings and click on the Always use HTTPS box, as the
following image shows:
13
Only click on those links published by already known contacts. Even though this is not a security
guarantee, this recommendation, related to the ones that follow, is of considerable importance.
Avoid following unknown contacts to reduce the possibility of receiving malicious messages.
If a message is suspected to be illegitimate, it is advisable to search for parts of it, or even its link, with
the Twitter search engine and to analyze not only how often it occurs, but also what the members of the
community say about it, who immediately warn other users in the web once they discover one of these
malicious messages.
Install a plug, such as LongURL Mobile Expander, in for the browser for the plugin to solve short URL
addresses and display the original URLs with no need of clicking on them.
1
2
3
4
5
6
7
8
9
10
15
Conclusion
Beyond any possible doubt, social networks are a useful tool for
internauts. However, as this guide shows, there are several threats that
may expose the user while browsing them. That is why it is advisable not
to underestimate cyber criminals. By using technological tools and proper
configurations in the right way, and behaving wisely while browsing the
Internet, it will be possible to use social networks in a secure way.
| www.eset.com |