SlideShare a Scribd company logo
Crea%ng	
  Secure	
  Apps	
  for	
  
Social	
  Media	
  

Tyler	
  Browning	
  	
  
Director	
  –	
  Agency	
  Development	
  at	
  
BlueModus	
  –	
  A	
  Technology	
  Agency	
  
What does Internet security mean?
Security for social media is…

  Data	
  Security	
  –	
  Man,	
  this	
  is	
  it’s	
  own	
  topic.	
  


  Understanding	
  poten%al	
  data	
  exposure	
  


  Firewalls	
  


  Privacy	
  


  Password	
  Security	
  


  Risk	
  Assessment	
  


  Code	
  Review	
  


  Thinking	
  like	
  a	
  hacker	
  
Say yes to social apps. Say yes to security and
incorporate the following into your
development.


 Applica%on	
                                     Risk	
  
                         Test	
  Cases	
  
Requirements	
                                 Assessment	
  


                         Security	
  &	
  
 Code	
  Review	
      development	
           Firewall!!!	
  
                      placed	
  together	
  
Oh, data, your crazy.
Securing	
  a	
  Database	
  




                                                                  Securing	
  User’s	
  Data	
  




                                                                                                                                  Password	
  Security	
  
                                Securing	
  your	
                                                 What	
  data	
  do	
                                      Educate	
  the	
  user	
  
                                server.	
                                                          you	
  have	
  on	
  the	
                                on	
  password	
  
                                Protect	
  the	
  data.	
  	
                                      user?	
                                                   security.	
  
                                Protect	
  the	
                                                   How	
  is	
  data	
                                       Understand	
  how	
  
                                system.	
                                                          being	
  managed?	
                                       secure	
  the	
  user	
  
                                                                                                   Who	
  has	
  access	
                                    is	
  with	
  their	
  
                                Perimeter	
                                                                                                                  data.	
  
                                firewall.	
                                                         to	
  the	
  user	
  ID	
  
                                                                                                   and	
  other	
  user	
  
                                Internal	
  firewall.	
                                             data?	
  
Thinking like a hacker.

                               Where	
  are	
  the	
  
Understand	
  the	
                                      Educa%ng	
  the	
  
                              vulnerabili%es	
  in	
  
    data.	
                                                  user.	
  
                              the	
  applica%on?	
  
                                                         Making	
  the	
  case	
  
 How	
  sensi%ve	
  is	
                                  for	
  complex	
  +	
  
                                 SQL	
  injec%on?	
  
   the	
  data?	
                                               unique	
  
                                                           passwords.	
  


    What	
  can	
  a	
  
                                Rainbow	
  Table?	
      Pos%ng	
  sensi%ve	
  
 criminal	
  do	
  with	
  
                                                              data.	
  
    the	
  data?	
  
Why NOT to eff with the privacy policy.




"Without	
  a	
  privacy	
  policy	
  to	
  review,	
  consumers	
                                Andy	
  Hatch	
  

may	
  not	
  have	
  the	
  ability	
  to	
  understand	
  and	
  
control	
  the	
  use	
  of	
  their	
  personal	
  data	
  by	
  the	
  
Apps,”	
  –	
  MediaPost	
  News	
  
                                         Nearly	
  three-­‐quarters	
  of	
  the	
  most	
  popular	
  
                                         mobile	
  apps	
  lack	
  even	
  a	
  basic	
  privacy	
  policy,	
  
                                         according	
  to	
  a	
  new	
  survey	
  by	
  the	
  Future	
  of	
  
                                         Privacy	
  Forum.	
  
Case studies.
"It	
  would	
  appear	
  that	
  security	
  experts	
  
are	
  not	
  expertly	
  secured,"	
  
Anonymous	
  wrote.	
  




                                                            hZp://bit.ly/iUU0TS	
  	
  
Lessons from the HB Gary Case Study

•  If you are not managing the security, know the
   firm or person and understand their security
   practices.
•  Security assumptions are very dangerous.
•  Diverse passwords!
•  Know your vulnerabilities and understand
   what will happen if your system is breached.
•  Plan for a system breach.
"...this is a scary privacy issue. I can find the name of
     pretty much every person on Facebook...Once I have
     the name and URL of a user, I can view, by default,
     their picture, friends, information about them, and
     some other details…..



hZp://bit.ly/m8pKvI	
  	
           hZp://bit.ly/kDnMIC	
  	
  
Lessons from the Facebook Case Study

•  Understand the security practice around social
   platforms like Facebook.
•  Privacy Policy!
•  What data is open, closed and how could un-
   authorized folks access a users information.
•  User ID’s are important to secure on some
   level.
•  Security around available API’s.
Thank	
  you	
  for	
  the	
  
opportunity.	
  

Tyler	
  Browning	
  
@tylerbrowning	
  
tbrowning@bluemodus.com	
  
hZp://www.linkedin.com/in/tylerbrowning	
  

More Related Content

PPTX
Wayfs and Strays - Jonathan Richardson
PDF
Study, analysis and formulation of a new method for integrity protection of d...
PDF
Hindering data theft attack through fog computing
PDF
IRJET- Security Safe Guarding Location Data Proximity
PDF
Security and Protection of Enterprise Data in Cloud: Implementation of Deniab...
PDF
Anomaly Threat Detection System using User and Role-Based Profile Assessment
PPTX
PDF
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
Wayfs and Strays - Jonathan Richardson
Study, analysis and formulation of a new method for integrity protection of d...
Hindering data theft attack through fog computing
IRJET- Security Safe Guarding Location Data Proximity
Security and Protection of Enterprise Data in Cloud: Implementation of Deniab...
Anomaly Threat Detection System using User and Role-Based Profile Assessment
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloud

What's hot (20)

PDF
Secure Transfers of Personal Data
PDF
The Recent Trend: Vigorous unidentified validation access control system with...
PPTX
Secure communication in Networking
PDF
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
PDF
Ijarcet vol-2-issue-3-925-932
PDF
Secure Sharing of Personal Health Records in Cloud Computing using Encryption
PPTX
Secure communication
PDF
Two Aspect Endorsement Access Control for web Based Cloud Computing
PDF
Improving Security Measures of E-Learning Database
DOCX
4.authentication and key agreement based on anonymous identity for peer to-pe...
PDF
NEMZOW PATENT PORTFOLIO
PDF
«Определение понятия «облачные вычисления» (от National Institute of Standard...
PPTX
Benefits of Network - R.D.Sivakumar
PPTX
Forensic Analysis and Discovery System
PPTX
Privacy and Security Information
PDF
Two Aspect Validation Control Frameworks for Online Distributed Services
PDF
A survey on cloud security issues and techniques
PDF
Advanced Multi-Encryption Technique in Cloud Computing
PDF
IRJET- Protecting E-Health Record with Data Sharing in Public Cloud
PDF
A Data Hiding Techniques Based on Length of English Text using DES and Attack...
Secure Transfers of Personal Data
The Recent Trend: Vigorous unidentified validation access control system with...
Secure communication in Networking
A review on key aggregate cryptosystem for scalable data sharing in cloud sto...
Ijarcet vol-2-issue-3-925-932
Secure Sharing of Personal Health Records in Cloud Computing using Encryption
Secure communication
Two Aspect Endorsement Access Control for web Based Cloud Computing
Improving Security Measures of E-Learning Database
4.authentication and key agreement based on anonymous identity for peer to-pe...
NEMZOW PATENT PORTFOLIO
«Определение понятия «облачные вычисления» (от National Institute of Standard...
Benefits of Network - R.D.Sivakumar
Forensic Analysis and Discovery System
Privacy and Security Information
Two Aspect Validation Control Frameworks for Online Distributed Services
A survey on cloud security issues and techniques
Advanced Multi-Encryption Technique in Cloud Computing
IRJET- Protecting E-Health Record with Data Sharing in Public Cloud
A Data Hiding Techniques Based on Length of English Text using DES and Attack...
Ad

Similar to Creating Secure Social Applications (20)

PDF
Web Application Security with PHP
PDF
Hijacking a Pizza Delivery Robot (using SQL injection)
PPTX
State of the information security nation
PDF
The Life of Breached Data & The Dark Side of Security
PDF
Secure coding presentation Oct 3 2020
PPTX
INFORMATION AND CYBER SECURITY
PPTX
Design for Security
PPTX
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
PPTX
Intro to web 2.0 Security
PPTX
How to Hijack a Pizza Delivery Robot with Injection Flaws
PDF
How to Destroy a Database
PDF
A6704d01
PDF
Crash Course In Brain Surgery
PPTX
501 ch 7 protecting against advanced attacks
PPTX
Internet Security Threat Report (ISTR) Vol. 16
PPT
1 security goals
PDF
Owasp for dummies handouts
 
PDF
Atlanta ISSA 2010 Enterprise Data Protection Ulf Mattsson
PDF
Defensive programing 101
PPTX
Introducing Oracle Audit Vault and Database Firewall
Web Application Security with PHP
Hijacking a Pizza Delivery Robot (using SQL injection)
State of the information security nation
The Life of Breached Data & The Dark Side of Security
Secure coding presentation Oct 3 2020
INFORMATION AND CYBER SECURITY
Design for Security
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Intro to web 2.0 Security
How to Hijack a Pizza Delivery Robot with Injection Flaws
How to Destroy a Database
A6704d01
Crash Course In Brain Surgery
501 ch 7 protecting against advanced attacks
Internet Security Threat Report (ISTR) Vol. 16
1 security goals
Owasp for dummies handouts
 
Atlanta ISSA 2010 Enterprise Data Protection Ulf Mattsson
Defensive programing 101
Introducing Oracle Audit Vault and Database Firewall
Ad

Recently uploaded (20)

PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Machine learning based COVID-19 study performance prediction
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPT
Teaching material agriculture food technology
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
Spectroscopy.pptx food analysis technology
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Approach and Philosophy of On baking technology
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
cuic standard and advanced reporting.pdf
PPTX
Big Data Technologies - Introduction.pptx
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
The Rise and Fall of 3GPP – Time for a Sabbatical?
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
20250228 LYD VKU AI Blended-Learning.pptx
NewMind AI Weekly Chronicles - August'25 Week I
Spectral efficient network and resource selection model in 5G networks
Review of recent advances in non-invasive hemoglobin estimation
Machine learning based COVID-19 study performance prediction
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Teaching material agriculture food technology
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Spectroscopy.pptx food analysis technology
Network Security Unit 5.pdf for BCA BBA.
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
sap open course for s4hana steps from ECC to s4
Approach and Philosophy of On baking technology
MIND Revenue Release Quarter 2 2025 Press Release
cuic standard and advanced reporting.pdf
Big Data Technologies - Introduction.pptx

Creating Secure Social Applications

  • 1. Crea%ng  Secure  Apps  for   Social  Media   Tyler  Browning     Director  –  Agency  Development  at   BlueModus  –  A  Technology  Agency  
  • 2. What does Internet security mean?
  • 3. Security for social media is… Data  Security  –  Man,  this  is  it’s  own  topic.   Understanding  poten%al  data  exposure   Firewalls   Privacy   Password  Security   Risk  Assessment   Code  Review   Thinking  like  a  hacker  
  • 4. Say yes to social apps. Say yes to security and incorporate the following into your development. Applica%on   Risk   Test  Cases   Requirements   Assessment   Security  &   Code  Review   development   Firewall!!!   placed  together  
  • 5. Oh, data, your crazy. Securing  a  Database   Securing  User’s  Data   Password  Security   Securing  your   What  data  do   Educate  the  user   server.   you  have  on  the   on  password   Protect  the  data.     user?   security.   Protect  the   How  is  data   Understand  how   system.   being  managed?   secure  the  user   Who  has  access   is  with  their   Perimeter   data.   firewall.   to  the  user  ID   and  other  user   Internal  firewall.   data?  
  • 6. Thinking like a hacker. Where  are  the   Understand  the   Educa%ng  the   vulnerabili%es  in   data.   user.   the  applica%on?   Making  the  case   How  sensi%ve  is   for  complex  +   SQL  injec%on?   the  data?   unique   passwords.   What  can  a   Rainbow  Table?   Pos%ng  sensi%ve   criminal  do  with   data.   the  data?  
  • 7. Why NOT to eff with the privacy policy. "Without  a  privacy  policy  to  review,  consumers   Andy  Hatch   may  not  have  the  ability  to  understand  and   control  the  use  of  their  personal  data  by  the   Apps,”  –  MediaPost  News   Nearly  three-­‐quarters  of  the  most  popular   mobile  apps  lack  even  a  basic  privacy  policy,   according  to  a  new  survey  by  the  Future  of   Privacy  Forum.  
  • 9. "It  would  appear  that  security  experts   are  not  expertly  secured,"   Anonymous  wrote.   hZp://bit.ly/iUU0TS    
  • 10. Lessons from the HB Gary Case Study •  If you are not managing the security, know the firm or person and understand their security practices. •  Security assumptions are very dangerous. •  Diverse passwords! •  Know your vulnerabilities and understand what will happen if your system is breached. •  Plan for a system breach.
  • 11. "...this is a scary privacy issue. I can find the name of pretty much every person on Facebook...Once I have the name and URL of a user, I can view, by default, their picture, friends, information about them, and some other details….. hZp://bit.ly/m8pKvI     hZp://bit.ly/kDnMIC    
  • 12. Lessons from the Facebook Case Study •  Understand the security practice around social platforms like Facebook. •  Privacy Policy! •  What data is open, closed and how could un- authorized folks access a users information. •  User ID’s are important to secure on some level. •  Security around available API’s.
  • 13. Thank  you  for  the   opportunity.   Tyler  Browning   @tylerbrowning   tbrowning@bluemodus.com   hZp://www.linkedin.com/in/tylerbrowning