S 5.157 Secure use of social networks

Initiation responsibility: Head of IT, IT Security Officer, Supervisor

Implementation responsibility: User

Social network are platforms made available on the Web such as MySpace, LinkedIn, Facebook or Xing, which are conceptionally similar, but the contents of which differ. The content-related design is determined by the corresponding users themselves. For example, social networks are used to find old friends or work colleagues, to be found yourself, or even to establish professional contacts. Besides creating a profile representing the online identity, the platforms serve to network the users with each other. This linking up results from the social interactions between the users and is stored using special platform functions in the software database.

Social networks are used by the users to communicate and to exchange data between themselves. Depending on the orientation of the platform, pictures or other information can also be uploaded in addition to personal data, and different applications can be used.

In order to become part of a social network, the user has to register with the respective platform. In addition to user name and password, other personal information is often collected. What other personal or also official business information is disclosed depends on the respective user and the purpose of using such networks. The mass of information about yourself is used to be noticed in the networks and to be able to participate in these. However, each user must be made aware of the fact that all information on users can be used as a basis for social engineering attacks (see also S 3.5 Training on security safeguards)

Using the background information, attackers may try to obtain the trust of their victims dishonestly and to persuade them to perform other actions, for example, to open specific files. Any information which a user makes available on the Internet about their own person should thus be carefully considered. Information, and this also includes pictures, videos and quotations, can be easily uploaded on the Internet, but may also be spread quickly by other people.

Because of this, each user of a social network should inform themselves about the service provider, especially about the contractual basis which must be accepted when using these services. For example, it should be checked

Before registering with a social network, the users should check how the platform handles data protection. If the users are able to configure data protection options independently, they should be set as restrictively as possible. The possible shared data for other users should be handled restrictively, which means, for example, a "public profile" in which only the absolutely necessary information is uploaded.

Users of social networks should examine closely which contacts they accept and what information they disclose and pass on to other users. In all cases, only information which is required for the interaction on the respective platforms should be entered. Information about third parties should only be forwarded upon consultation with them.

Handling social networks in a government agency and/or company should be regulated clearly. In this respect, there are several variants:

A government agency or company should establish clear regulations describing

Users should not mix business and private use of social networks and be familiar with the rules applicable in their respective organisation.

Review questions: