SlideShare a Scribd company logo
1 of 34
Download to read offline
Securing Your
Facebook Identity
Nicholas A. Davis, CISA, CISSP
UW-Madison
Division of Information Technology
10/9/2013 UNIVERSITY OF WISCONSIN 1
!!Advisory!!
The content of today’s presentation is designed
to help people protect themselves on Facebook.
This is NOT a session on Facebook hacking. If
hacking Facebook is your motivation for
attending today’s session, please leave now
10/9/2013 UNIVERSITY OF WISCONSIN 2
Overview
Basic rules of Facebook security
Unique situation on UW-Madison campus
(academic research poses a unique Facebook
chalenge)
Why unauthenticated identity means “be careful”
The dangers of Facebook photos
Application settings and security preferences
Facebook passwords
Time and place concerns
Roaming security
Account cleanup and maintenance
Tips and tricks
Q&A session
10/9/2013 UNIVERSITY OF WISCONSIN 3
Basic Rules of Security
1. Think before you post
2. Customize your privacy settings
3. Don’t accept friend requests from people
you do not know
4. Keep sensitive information private
5. Remember, being on Facebook means that
you are living like a rock star! (kind of)
10/9/2013 UNIVERSITY OF WISCONSIN 4
Research Lab Example
10/9/2013 UNIVERSITY OF WISCONSIN 5
Meet Flat Cow
We will be using Flat Cow, known to his
friends as FC, in a few slides
10/9/2013 UNIVERSITY OF WISCONSIN 6
Wait, Cows Can’t Be On FB!
Unauthenticated Identity
10/9/2013 UNIVERSITY OF WISCONSIN 7
Organize Friends In Lists
10/9/2013 UNIVERSITY OF WISCONSIN 8
Photos Tell Stories
(Not Always Safe Ones)
10/9/2013 UNIVERSITY OF WISCONSIN 9
Photos Tell Stories
(Not Always Flattering Ones)
10/9/2013 UNIVERSITY OF WISCONSIN 10
Keep In Mind
Don’t get yourself into a situation in
which such pictures can be taken
You have little to no control over who
takes your picture in public
Think about the stories your photos tell
about you
Exercise control over pictures of you
tagged by others
10/9/2013 UNIVERSITY OF WISCONSIN 11
Automatic Updates
Take Control!
10/9/2013 UNIVERSITY OF WISCONSIN 12
Don’t Advertise Yourself
10/9/2013 UNIVERSITY OF WISCONSIN 13
You Can’t Control Your Friends
But You Can Control Their
Applications
10/9/2013 UNIVERSITY OF WISCONSIN 14
Don’t Let Your App Excitement
Obscure Your Judgement
10/9/2013 UNIVERSITY OF WISCONSIN 15
Keep The Stalkers At Bay
Change Search Visibility
10/9/2013 UNIVERSITY OF WISCONSIN 16
Get Your Facebook Profile
Out of Google
10/9/2013 UNIVERSITY OF WISCONSIN 17
Tips To Keep You Safe On
Facebook
Change your Facebook password often
10/9/2013 UNIVERSITY OF WISCONSIN 18
Facebook Is a Prime Target For
Password Hackers
Never use the same password for
Facebook as you use for your bank
access
10/9/2013 UNIVERSITY OF WISCONSIN 19
Examine Photos Before You Post
Avoid posting photos with identifying
information, such as addresses, license
plates, etc.
10/9/2013 UNIVERSITY OF WISCONSIN 20
Don’t Advertise Your Absence
Post vacation pictures AFTER you get
home
10/9/2013 UNIVERSITY OF WISCONSIN 21
Browse Facebook Securely When
at Starbucks (HTTPS)
10/9/2013 UNIVERSITY OF WISCONSIN 22
Remove Facebook Apps Which
You Do Not Use
10/9/2013 UNIVERSITY OF WISCONSIN 23
Use Privacy Settings To Block
People
10/9/2013 UNIVERSITY OF WISCONSIN 24
Check the Facebook URL Often
10/9/2013 UNIVERSITY OF WISCONSIN 25
Know The Difference Between
Deactivating and Deleting Your
Facebook Account
Deactivating your account leaves all posts
and pictures intact
Deletion is supposed to remove everything
Don’t login after you request deletion
10/9/2013 UNIVERSITY OF WISCONSIN 26
The Facebook
Doppelganger Spy
“But Flat Cow is already my friend”
10/9/2013 UNIVERSITY OF WISCONSIN 27
Three Strikes and You’re Out!
Don’t Be a Friend Pig
10/9/2013 UNIVERSITY OF WISCONSIN 28
How Liking Things Could
Take Advantage of You
10/9/2013 UNIVERSITY OF WISCONSIN 29
Facebook Security
Best Practices
http://www.sophos.com/en-us/security-
news-trends/best-practices/facebook.aspx
10/9/2013 UNIVERSITY OF WISCONSIN 30
Carnival Cruise Scam
Just One Example
Message purporting to be from "Carnival Cruise" claims that
Facebook users can win an all-expenses-paid vacation package
by liking and sharing a promotional image and clicking a link
to apply for the free tickets.
http://www.hoax-slayer.com/facebook-related.html
10/9/2013 UNIVERSITY OF WISCONSIN 31
Enable Login Notifications
Login notifications are an extra security
feature. When you turn on login
notifications, we'll send you an alert each
time someone logs into your account from a
new place.
10/9/2013 UNIVERSITY OF WISCONSIN 32
A Note About UW NetID
Your NetID is like your toothbrush, only you
should use it
UW-Madison will NEVER ask for your NetID
and/or password via email
Report any such requests to abuse@wisc.edu
10/9/2013 UNIVERSITY OF WISCONSIN 33
Q&A Session
Nicholas Davis
ndavis1@wisc.edu
facebook.com/nicholas.a.davis
10/9/2013 UNIVERSITY OF WISCONSIN 34

More Related Content

What's hot

Michael Barita's Professional Persona Project
Michael Barita's Professional Persona Project Michael Barita's Professional Persona Project
Michael Barita's Professional Persona Project Michael Barita
 
we need to talk about... designing better library experiences
we need to talk about... designing better library experienceswe need to talk about... designing better library experiences
we need to talk about... designing better library experiencesZaana Jaclyn
 
Keeping It All Together
Keeping It All TogetherKeeping It All Together
Keeping It All TogetherKim Cofino
 
Ana Neves
Ana NevesAna Neves
Ana Nevese20biz
 
TOP25 największych polskich profili na Instagramie - marzec 2015
TOP25 największych polskich profili na Instagramie - marzec 2015TOP25 największych polskich profili na Instagramie - marzec 2015
TOP25 największych polskich profili na Instagramie - marzec 2015NapoleonCat.com
 
Social media: Advances in education technology for midwifery
Social media: Advances in education technology for midwifery Social media: Advances in education technology for midwifery
Social media: Advances in education technology for midwifery Sarah Stewart
 
The networked nurse: Using virtual communication systems for practice develop...
The networked nurse: Using virtual communication systems for practice develop...The networked nurse: Using virtual communication systems for practice develop...
The networked nurse: Using virtual communication systems for practice develop...Sarah Stewart
 
Teenage Depression
Teenage DepressionTeenage Depression
Teenage Depressiondanisebenick
 
#SXSWedu Panel: Technology for Enhancing Social Emotional Learning
#SXSWedu Panel: Technology for Enhancing Social Emotional Learning#SXSWedu Panel: Technology for Enhancing Social Emotional Learning
#SXSWedu Panel: Technology for Enhancing Social Emotional LearningJackie Gerstein, Ed.D
 
DevOps - Ten tips for developers
DevOps - Ten tips for developersDevOps - Ten tips for developers
DevOps - Ten tips for developersevanbottcher
 
teaching outside the "box" workshop prep
teaching outside the "box" workshop prepteaching outside the "box" workshop prep
teaching outside the "box" workshop prepAlexandra M. Pickett
 
Using social media for collaboration and engagement in associations and organ...
Using social media for collaboration and engagement in associations and organ...Using social media for collaboration and engagement in associations and organ...
Using social media for collaboration and engagement in associations and organ...Sarah Stewart
 
Stressless Paperless
Stressless PaperlessStressless Paperless
Stressless Paperlessconcretekax
 
PCS - Acceptable Use Presentation
PCS - Acceptable Use PresentationPCS - Acceptable Use Presentation
PCS - Acceptable Use PresentationLucas Gillispie
 

What's hot (18)

dunia mistik
dunia mistikdunia mistik
dunia mistik
 
Michael Barita's Professional Persona Project
Michael Barita's Professional Persona Project Michael Barita's Professional Persona Project
Michael Barita's Professional Persona Project
 
Gaggle
GaggleGaggle
Gaggle
 
we need to talk about... designing better library experiences
we need to talk about... designing better library experienceswe need to talk about... designing better library experiences
we need to talk about... designing better library experiences
 
Keeping It All Together
Keeping It All TogetherKeeping It All Together
Keeping It All Together
 
Ana Neves
Ana NevesAna Neves
Ana Neves
 
TOP25 największych polskich profili na Instagramie - marzec 2015
TOP25 największych polskich profili na Instagramie - marzec 2015TOP25 największych polskich profili na Instagramie - marzec 2015
TOP25 największych polskich profili na Instagramie - marzec 2015
 
Social media: Advances in education technology for midwifery
Social media: Advances in education technology for midwifery Social media: Advances in education technology for midwifery
Social media: Advances in education technology for midwifery
 
The networked nurse: Using virtual communication systems for practice develop...
The networked nurse: Using virtual communication systems for practice develop...The networked nurse: Using virtual communication systems for practice develop...
The networked nurse: Using virtual communication systems for practice develop...
 
Teenage Depression
Teenage DepressionTeenage Depression
Teenage Depression
 
#SXSWedu Panel: Technology for Enhancing Social Emotional Learning
#SXSWedu Panel: Technology for Enhancing Social Emotional Learning#SXSWedu Panel: Technology for Enhancing Social Emotional Learning
#SXSWedu Panel: Technology for Enhancing Social Emotional Learning
 
Blog Talk
Blog TalkBlog Talk
Blog Talk
 
May 28 2010
May 28 2010May 28 2010
May 28 2010
 
DevOps - Ten tips for developers
DevOps - Ten tips for developersDevOps - Ten tips for developers
DevOps - Ten tips for developers
 
teaching outside the "box" workshop prep
teaching outside the "box" workshop prepteaching outside the "box" workshop prep
teaching outside the "box" workshop prep
 
Using social media for collaboration and engagement in associations and organ...
Using social media for collaboration and engagement in associations and organ...Using social media for collaboration and engagement in associations and organ...
Using social media for collaboration and engagement in associations and organ...
 
Stressless Paperless
Stressless PaperlessStressless Paperless
Stressless Paperless
 
PCS - Acceptable Use Presentation
PCS - Acceptable Use PresentationPCS - Acceptable Use Presentation
PCS - Acceptable Use Presentation
 

Viewers also liked

Facebook and Security Settings Report
Facebook and Security Settings ReportFacebook and Security Settings Report
Facebook and Security Settings ReportAbhishek Gupta
 
facebook secrets by SHASHI
facebook secrets by SHASHIfacebook secrets by SHASHI
facebook secrets by SHASHIshashi patel
 
Facebook and security settings settings
Facebook and security settings settingsFacebook and security settings settings
Facebook and security settings settingsAbhishek Gupta
 
How to prevent Road Accidents, Road Safety tips, Road Safety Seminar, Road Sa...
How to prevent Road Accidents, Road Safety tips, Road Safety Seminar, Road Sa...How to prevent Road Accidents, Road Safety tips, Road Safety Seminar, Road Sa...
How to prevent Road Accidents, Road Safety tips, Road Safety Seminar, Road Sa...Road Safety
 
Road Safety PowerPoint Presentation
Road Safety PowerPoint PresentationRoad Safety PowerPoint Presentation
Road Safety PowerPoint PresentationRoad Safety
 
Motion sensing and detection
Motion sensing and detectionMotion sensing and detection
Motion sensing and detectionNirav Soni
 
Road Safety Presentation
Road Safety PresentationRoad Safety Presentation
Road Safety Presentationtohjingfenyv
 
motion sensing technology
motion sensing technologymotion sensing technology
motion sensing technologySantosh Kumar
 
Facebook Powerpoint
Facebook PowerpointFacebook Powerpoint
Facebook Powerpointmyra14
 

Viewers also liked (11)

Facebook and Security Settings Report
Facebook and Security Settings ReportFacebook and Security Settings Report
Facebook and Security Settings Report
 
facebook secrets by SHASHI
facebook secrets by SHASHIfacebook secrets by SHASHI
facebook secrets by SHASHI
 
Facebook security
Facebook securityFacebook security
Facebook security
 
Facebook and security settings settings
Facebook and security settings settingsFacebook and security settings settings
Facebook and security settings settings
 
How to prevent Road Accidents, Road Safety tips, Road Safety Seminar, Road Sa...
How to prevent Road Accidents, Road Safety tips, Road Safety Seminar, Road Sa...How to prevent Road Accidents, Road Safety tips, Road Safety Seminar, Road Sa...
How to prevent Road Accidents, Road Safety tips, Road Safety Seminar, Road Sa...
 
Road Safety PowerPoint Presentation
Road Safety PowerPoint PresentationRoad Safety PowerPoint Presentation
Road Safety PowerPoint Presentation
 
Motion sensing and detection
Motion sensing and detectionMotion sensing and detection
Motion sensing and detection
 
Road Safety Presentation
Road Safety PresentationRoad Safety Presentation
Road Safety Presentation
 
motion sensing technology
motion sensing technologymotion sensing technology
motion sensing technology
 
Facebook ppt
Facebook pptFacebook ppt
Facebook ppt
 
Facebook Powerpoint
Facebook PowerpointFacebook Powerpoint
Facebook Powerpoint
 

More from Nicholas Davis

Conducting a NIST Cybersecurity Framework (CSF) Assessment
Conducting a NIST Cybersecurity Framework (CSF) AssessmentConducting a NIST Cybersecurity Framework (CSF) Assessment
Conducting a NIST Cybersecurity Framework (CSF) AssessmentNicholas Davis
 
Top Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessTop Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessNicholas Davis
 
UW-Madison, Information Systems 371 - Decision Support Systems
UW-Madison, Information Systems 371 - Decision Support SystemsUW-Madison, Information Systems 371 - Decision Support Systems
UW-Madison, Information Systems 371 - Decision Support SystemsNicholas Davis
 
Software Development Methodologies
Software Development MethodologiesSoftware Development Methodologies
Software Development MethodologiesNicholas Davis
 
Information systems 365 - Cloud and BYOD Security
Information systems 365 - Cloud and BYOD SecurityInformation systems 365 - Cloud and BYOD Security
Information systems 365 - Cloud and BYOD SecurityNicholas Davis
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Nicholas Davis
 
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...Nicholas Davis
 
Information Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things OverviewInformation Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things OverviewNicholas Davis
 
Cyberwar Gets Personal
Cyberwar Gets PersonalCyberwar Gets Personal
Cyberwar Gets PersonalNicholas Davis
 
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...Nicholas Davis
 
Bringing the Entire Information Security Semester Together With a Team Project
Bringing the Entire Information Security Semester Together With a Team ProjectBringing the Entire Information Security Semester Together With a Team Project
Bringing the Entire Information Security Semester Together With a Team ProjectNicholas Davis
 
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...Nicholas Davis
 
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...Nicholas Davis
 
Information Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up SummaryInformation Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up SummaryNicholas Davis
 
Organizational Phishing Education
Organizational Phishing EducationOrganizational Phishing Education
Organizational Phishing EducationNicholas Davis
 
Security Operations -- An Overview
Security Operations -- An OverviewSecurity Operations -- An Overview
Security Operations -- An OverviewNicholas Davis
 
Network Design, Common Network Terminology and Security Implications
Network Design, Common Network Terminology and Security ImplicationsNetwork Design, Common Network Terminology and Security Implications
Network Design, Common Network Terminology and Security ImplicationsNicholas Davis
 
Survey Presentation About Application Security
Survey Presentation About Application SecuritySurvey Presentation About Application Security
Survey Presentation About Application SecurityNicholas Davis
 
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...Nicholas Davis
 

More from Nicholas Davis (20)

Conducting a NIST Cybersecurity Framework (CSF) Assessment
Conducting a NIST Cybersecurity Framework (CSF) AssessmentConducting a NIST Cybersecurity Framework (CSF) Assessment
Conducting a NIST Cybersecurity Framework (CSF) Assessment
 
Top Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessTop Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your Business
 
UW-Madison, Information Systems 371 - Decision Support Systems
UW-Madison, Information Systems 371 - Decision Support SystemsUW-Madison, Information Systems 371 - Decision Support Systems
UW-Madison, Information Systems 371 - Decision Support Systems
 
Lecture blockchain
Lecture blockchainLecture blockchain
Lecture blockchain
 
Software Development Methodologies
Software Development MethodologiesSoftware Development Methodologies
Software Development Methodologies
 
Information systems 365 - Cloud and BYOD Security
Information systems 365 - Cloud and BYOD SecurityInformation systems 365 - Cloud and BYOD Security
Information systems 365 - Cloud and BYOD Security
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids
 
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
 
Information Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things OverviewInformation Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things Overview
 
Cyberwar Gets Personal
Cyberwar Gets PersonalCyberwar Gets Personal
Cyberwar Gets Personal
 
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
 
Bringing the Entire Information Security Semester Together With a Team Project
Bringing the Entire Information Security Semester Together With a Team ProjectBringing the Entire Information Security Semester Together With a Team Project
Bringing the Entire Information Security Semester Together With a Team Project
 
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
 
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
 
Information Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up SummaryInformation Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up Summary
 
Organizational Phishing Education
Organizational Phishing EducationOrganizational Phishing Education
Organizational Phishing Education
 
Security Operations -- An Overview
Security Operations -- An OverviewSecurity Operations -- An Overview
Security Operations -- An Overview
 
Network Design, Common Network Terminology and Security Implications
Network Design, Common Network Terminology and Security ImplicationsNetwork Design, Common Network Terminology and Security Implications
Network Design, Common Network Terminology and Security Implications
 
Survey Presentation About Application Security
Survey Presentation About Application SecuritySurvey Presentation About Application Security
Survey Presentation About Application Security
 
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...
 

Recently uploaded

NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Will Schroeder
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024D Cloud Solutions
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...DianaGray10
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdfPedro Manuel
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationIES VE
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.YounusS2
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemAsko Soukka
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...Aggregage
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaborationbruanjhuli
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-pyJamie (Taka) Wang
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6DianaGray10
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Commit University
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDELiveplex
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 

Recently uploaded (20)

NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.
 
Bird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystemBird eye's view on Camunda open source ecosystem
Bird eye's view on Camunda open source ecosystem
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
 
20150722 - AGV
20150722 - AGV20150722 - AGV
20150722 - AGV
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-py
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6
 
20230104 - machine vision
20230104 - machine vision20230104 - machine vision
20230104 - machine vision
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 

Facebook Security

  • 1. Securing Your Facebook Identity Nicholas A. Davis, CISA, CISSP UW-Madison Division of Information Technology 10/9/2013 UNIVERSITY OF WISCONSIN 1
  • 2. !!Advisory!! The content of today’s presentation is designed to help people protect themselves on Facebook. This is NOT a session on Facebook hacking. If hacking Facebook is your motivation for attending today’s session, please leave now 10/9/2013 UNIVERSITY OF WISCONSIN 2
  • 3. Overview Basic rules of Facebook security Unique situation on UW-Madison campus (academic research poses a unique Facebook chalenge) Why unauthenticated identity means “be careful” The dangers of Facebook photos Application settings and security preferences Facebook passwords Time and place concerns Roaming security Account cleanup and maintenance Tips and tricks Q&A session 10/9/2013 UNIVERSITY OF WISCONSIN 3
  • 4. Basic Rules of Security 1. Think before you post 2. Customize your privacy settings 3. Don’t accept friend requests from people you do not know 4. Keep sensitive information private 5. Remember, being on Facebook means that you are living like a rock star! (kind of) 10/9/2013 UNIVERSITY OF WISCONSIN 4
  • 5. Research Lab Example 10/9/2013 UNIVERSITY OF WISCONSIN 5
  • 6. Meet Flat Cow We will be using Flat Cow, known to his friends as FC, in a few slides 10/9/2013 UNIVERSITY OF WISCONSIN 6
  • 7. Wait, Cows Can’t Be On FB! Unauthenticated Identity 10/9/2013 UNIVERSITY OF WISCONSIN 7
  • 8. Organize Friends In Lists 10/9/2013 UNIVERSITY OF WISCONSIN 8
  • 9. Photos Tell Stories (Not Always Safe Ones) 10/9/2013 UNIVERSITY OF WISCONSIN 9
  • 10. Photos Tell Stories (Not Always Flattering Ones) 10/9/2013 UNIVERSITY OF WISCONSIN 10
  • 11. Keep In Mind Don’t get yourself into a situation in which such pictures can be taken You have little to no control over who takes your picture in public Think about the stories your photos tell about you Exercise control over pictures of you tagged by others 10/9/2013 UNIVERSITY OF WISCONSIN 11
  • 12. Automatic Updates Take Control! 10/9/2013 UNIVERSITY OF WISCONSIN 12
  • 13. Don’t Advertise Yourself 10/9/2013 UNIVERSITY OF WISCONSIN 13
  • 14. You Can’t Control Your Friends But You Can Control Their Applications 10/9/2013 UNIVERSITY OF WISCONSIN 14
  • 15. Don’t Let Your App Excitement Obscure Your Judgement 10/9/2013 UNIVERSITY OF WISCONSIN 15
  • 16. Keep The Stalkers At Bay Change Search Visibility 10/9/2013 UNIVERSITY OF WISCONSIN 16
  • 17. Get Your Facebook Profile Out of Google 10/9/2013 UNIVERSITY OF WISCONSIN 17
  • 18. Tips To Keep You Safe On Facebook Change your Facebook password often 10/9/2013 UNIVERSITY OF WISCONSIN 18
  • 19. Facebook Is a Prime Target For Password Hackers Never use the same password for Facebook as you use for your bank access 10/9/2013 UNIVERSITY OF WISCONSIN 19
  • 20. Examine Photos Before You Post Avoid posting photos with identifying information, such as addresses, license plates, etc. 10/9/2013 UNIVERSITY OF WISCONSIN 20
  • 21. Don’t Advertise Your Absence Post vacation pictures AFTER you get home 10/9/2013 UNIVERSITY OF WISCONSIN 21
  • 22. Browse Facebook Securely When at Starbucks (HTTPS) 10/9/2013 UNIVERSITY OF WISCONSIN 22
  • 23. Remove Facebook Apps Which You Do Not Use 10/9/2013 UNIVERSITY OF WISCONSIN 23
  • 24. Use Privacy Settings To Block People 10/9/2013 UNIVERSITY OF WISCONSIN 24
  • 25. Check the Facebook URL Often 10/9/2013 UNIVERSITY OF WISCONSIN 25
  • 26. Know The Difference Between Deactivating and Deleting Your Facebook Account Deactivating your account leaves all posts and pictures intact Deletion is supposed to remove everything Don’t login after you request deletion 10/9/2013 UNIVERSITY OF WISCONSIN 26
  • 27. The Facebook Doppelganger Spy “But Flat Cow is already my friend” 10/9/2013 UNIVERSITY OF WISCONSIN 27
  • 28. Three Strikes and You’re Out! Don’t Be a Friend Pig 10/9/2013 UNIVERSITY OF WISCONSIN 28
  • 29. How Liking Things Could Take Advantage of You 10/9/2013 UNIVERSITY OF WISCONSIN 29
  • 31. Carnival Cruise Scam Just One Example Message purporting to be from "Carnival Cruise" claims that Facebook users can win an all-expenses-paid vacation package by liking and sharing a promotional image and clicking a link to apply for the free tickets. http://www.hoax-slayer.com/facebook-related.html 10/9/2013 UNIVERSITY OF WISCONSIN 31
  • 32. Enable Login Notifications Login notifications are an extra security feature. When you turn on login notifications, we'll send you an alert each time someone logs into your account from a new place. 10/9/2013 UNIVERSITY OF WISCONSIN 32
  • 33. A Note About UW NetID Your NetID is like your toothbrush, only you should use it UW-Madison will NEVER ask for your NetID and/or password via email Report any such requests to abuse@wisc.edu 10/9/2013 UNIVERSITY OF WISCONSIN 33