The impact of social networking on the IT audit universe Presenter: Nelson Gibbs, CIA, CISA, CISM, CGEIT, CISSP Deloitte & Touche LLP www.isaca.org Today’s agenda • • • • • Definitions and terminology (3-17) Why and how companies are using social networking (18-33) Risks and challenges (34-52) What is next in the world of social networking (53-56) Q&A www.isaca.org 2 Definitions and terminology www.isaca.org 3 Social network — Some definitions • As defined in Wikipedia – A social network is a social structure made of nodes (which are generally individuals or organizations) that are tied by one or more specific types of interdependency, such as values, visions, ideas, financial exchange, friendship, kinship, dislike, conflict, or trade. The resulting structures are often very complex. • As defined in Webmaster – Social networking is a phenomena defined by linking people to each other in some way. Digg is a popular example of a social network (using social bookmarking). Users work together to rate news and are linked by rating choices or explicit identification of other members. Generally, social networks are used to allow or encourage various types of activity whether commercial, social, or some combination of the two. www.isaca.org 4 What makes a Social Network so powerful? • Metcalfe’s law – The value of a telecommunications network is proportional to the square of the number of connected users of the system (n2) • Related to the fact that the number of unique connections in a network of a number of nodes (n) can be expressed mathematically as the triangular number n(n–1)/2, which is proportional to n2 asymptotically http://en.wikipedia.org/wiki/Metcalfe’s_Law • Applying this to Social Networking — Consider LinkedIn — it took 16 months to reach the first one million users. The latest million users were added in just 11 days. www.isaca.org 5 What makes a Social Network so powerful? (cont.) • Web 2.0 – “Web 2.0” was first coined in 1999, and, by 2004, had become used to describe the next evolution of the Web. – It’s based on the notion that people who consume media, access the Internet, and use the Web shouldn’t passively absorb the flow of content from provider to viewer; rather, they should be active contributors, helping customize media and technology for their own purposes. – Social network sites, blogs, wikis, and other collaborative technologies are the result. Web 1.0 (Yesterday) Web 2.0 (Today) Power lies with: institutions, platforms, and technology Power lies with: users, communities, and experiences • • • • • • • • • • Structured Siloed One size fits all Passive audience Unilateral www.isaca.org 6 Flexible Collaborative Communities Engaged users Multilateral Social network — More terminology (cont.) Social network analysis www.isaca.org • Mapping and measuring of relationships and flows among people, groups, organizations, computers or other information, knowledge processing entities • The nodes in the network are the people and groups while the links show relationships or flows between the nodes • Provides both a visual and a mathematical analysis of human relationships 7 Social network — More terminology (cont.) Blogs www.isaca.org • Web sites where entries are made (such as in a journal or diary), displayed in a reverse chronological order; often provide commentary or news on a particular subject • Some function as personal online diaries or logbooks • Combine text, images, and links to other blogs and Web sites • Typically provide archives in calendar form, local search, syndication feeds, reader comment posting, trackback links from other blogs, blogroll links to other recommended blogs, and categories of entries tagged for retrieval by topic 8 Social network — More terminology (cont.) Microblogging www.isaca.org • Short, frequent posts with questions, information, or current status • Twitter (public) and Yammer (private) are two examples • Social software (including Facebook, LinkedIn, and MySpace) now prompts for “what’s on your mind?” or similar status or mood lines 9 Social network — More terminology (cont.) Wikis www.isaca.org • Web sites which allow users to easily add, remove, edit, and change most available content • Effective for collaborative writing and self-service Web site creation and maintenance 10 Social network — More terminology (cont.) • Wikipedia – perhaps the best known Wiki Wikis (cont.) – Launched on 15 January 2000 – First edit on 16 January, followed by 1,000 articles in the first month * – Now has 17 million articles in 270 languages, all written by volunteers * – Billionth edit took place on 16 April 2010 * – Used by 400 million people every month * – Claims to have 80,000 editors, although reports suggest that it has recently lost thousands; something Wikipedia disputes * – Aims to grow to one billion users by 2015 with a focus on women and people in the developing world * – Critics maintain that many entries are untrustworthy – But a disputed study has shown that for subjects such as science it comes as close as traditional encyclopedias * Statistics taken from http://www.bbc.co.uk/news/technology-12171977 www.isaca.org 11 Social network — More terminology (cont.) Social networking software www.isaca.org • A range of tools which facilitate social networking • Personal Web pages, including bios, photos, interests, audio and video, links to friends, messages from friends, and personal networks 12 Social network — More terminology (cont.) Social networking software (cont.) • Facebook – the biggest of them all – – – – Over 500 million registered users * 50% of our active users log on to Facebook in any given day * About 70% of Facebook users are outside the U.S. * More than 30 billion pieces of content (web links, news stories, blog posts, notes, photo albums, etc.) shared each month * – People spend over 700 billion minutes per month on Facebook * * Statistics taken from http://www.facebook.com/press/info.php?statistics (Sept 2010) • As of March 13, 2010 Facebook was America’s most popular site according to Experian Hitwise with 7.1% of traffic compared to Google’s 7.0% www.isaca.org 13 Social network — More terminology (cont.) Social bookmarking and tagging www.isaca.org • Sites which allow users to share links to sites with others • Tags are metadata which classify content into categories • Can be used to aid searches, create tag clouds, and link disparate sources 14 Social network — More terminology (cont.) Syndication and mashups www.isaca.org • Using feeds available from a Web site to provide an updated list of its content in the form of a subscription, an embedded portion of a Web site, or a collection of disparate content on a particular topic • RSS (Really Simple Syndication) or Atom syndication and .rss, .xml, or .rdf files used for the feeds • Mashups combine data and feeds from multiple sources to provide a single, integrated set of information “e.g., data plotted on a map” 15 Social network — More terminology (cont.) Videos and photos www.isaca.org • Online collections of videos and photos from users • Users can upload, tag, and rate content 16 Social Networking Companies Social Media Wikis Popular Examples Wikitravel, Wikipedia, wikiHow, WikiBooks, the TV IV Blogs livejournal, WordPress, Blogger, Technorati, xanga Social Networking myspace.com, LinkedIn, facebook, friendster, plaxo RSS newsgator, Bloglines, iGoogle, FeedBurner (Really Simple Syndication) Presence and Microblogging Social Bookmarking and Tagging Online Photo and Video Sharing www.isaca.org twitter, Pownce, jaiku, Hictu!, tumblr del.icio.us, digg, reddit, newsvine, StumbleUpon YouTube, flickr, shutterfly, last-fm, slideshare 17 Why and how companies are using social networking www.isaca.org 18 Statistics on companies using Social Networking *Data was collected between November 2009 and January 2010 among the Fortune Global 100 companies: U.S. = 29 companies, Europe = 48 companies, Asia-Pacific = 20 companies, Latin America = 3 companies. Source : http://www.burson-marsteller.com/Innovation_and_insights/blogs_and_podcasts/BM_Blog/Documents/Burson-Marsteller%202010%20Global%20Social%20Media%20Checkup%20white%20paper.pdf www.isaca.org 19 Statistics on companies using Social Networking (cont.) *Data was collected between November 2009 and January 2010 among the Fortune Global 100 companies: U.S. = 29 companies, Europe = 48 companies, Asia-Pacific = 20 companies, Latin America = 3 companies. Source : http://www.burson-marsteller.com/Innovation_and_insights/blogs_and_podcasts/BM_Blog/Documents/Burson-Marsteller%202010%20Global%20Social%20Media%20Checkup%20white%20paper.pdf www.isaca.org 20 Companies typically adopt Social Media for three major benefits www.isaca.org 1 Increase employee productivity and operational efficiencies 2 Foster creativity, innovation, and collaboration 3 Enhance customer and partner relationships 21 Increase employee productivity and operational efficiencies • Creates a lightweight institutional memory system for a company’s intellectual assets to be easily captured, stored, and accessed • Reduce the net volume of e-mail and allow users to “pull” information at their convenience, as opposed to spending time reading through mass e-mail chain • Create better quality deliverables, faster, by drawing on the collective talents, knowledge, and experiences of other employees around the world Operational efficiencies • A leading energy company realized approximately $250K in annual cost savings by conducting its employee conference virtually using Social Media Improved reporting • A global investment bank tightened reporting cycle times from several weeks to “about 30 seconds” per stakeholder by enabling them to submit their information directly into a team wiki and making that information instantly available to others in a rich dashboard mashup www.isaca.org 22 Increase employee productivity and operational efficiencies (cont.) • American Red Cross – Designed to incite discussions around issues the American Red Cross cares about and describe actions individuals can take (online or offline) to help people prevent, prepare for, and respond to emergencies and give valuable information about preventing, preparing for, and responding to emergencies. http://redcrosschat.org/ www.isaca.org 23 Increase employee productivity and operational efficiencies (cont.) • Deloitte’s D.Wiki – Provides a safe, flexible knowledge creation and information sharing environment for all Deloitte practitioners across country, practice, and Deloitte organizational borders – Enhances the client service delivery capabilities of our Deloitte practitioners – Serves as a test environment for innovative concepts and solutions, which expand the business interests of Deloitte As used in this document, “Deloitte” means Deloitte LLP. Please see www.deloitte.com/us/about for a detailed description of the legal structure of Deloitte LLP and its subsidiaries. www.isaca.org 24 Foster creativity, innovation, and collaboration • Harness product, process, and service innovations by unlocking creativity and ideas from any area of the company • The diverse group feedback inherent in social computing accelerates the problemsolving process and produces better solutions • Employees create unexpected connections with one another and expand their base of knowledge, experience, and circle of trusted colleagues Product innovation • A leading high-tech manufacturer instituted a “submit-and-vote-for-your-favorite-idea” social community with its consumers, generating over 5,000 ideas and over 300,000 votes in its first three months and subsequently identifying new product offerings Information capture • A federal agency created an internal wiki to bolster the capture and dissemination of mission-critical information between field agents www.isaca.org 25 Foster creativity, innovation, and collaboration (cont.) • Best Buy – A community of Best Buy employees who convene regularly to share knowledge, best practices, frustrations, aspirations, and a few jokes. Community members include everyone from recent high school graduates to semi retirees. https://mix.blueshirtnation.com/ www.isaca.org 26 Foster creativity, innovation, and collaboration (cont.) • Deloitte’s DStreet – Enterprise talent networking site - changing the way we connect with each other – Enables another way of collaboration and community building – Network, build new relationships, and forge successful careers – Learn about colleagues and interesting ways to introduce yourself – Identify new connection points to create a basis for meaningful conversation – A new way of assembling the right team As used in this document, “Deloitte” means Deloitte LLP. Please see www.deloitte.com/us/about for a detailed description of the legal structure of Deloitte LLP and its subsidiaries. www.isaca.org 27 Enhance customer and partner relationships • Opens the lines of communication beyond typical spokespeople, such as marketing, sales, and PR and provides an avenue for other important stakeholders (e.g., engineers, scientists, product managers) to gather firsthand feedback from customers • Allow customers to access help beyond traditional means, with networks that provide peer support and a user-generated knowledgebase, while monitoring customer perception • Provide a forum for collaborative business development, education, and communications with vendors, OEMs, and other partners • Allow consumers who know your products and services best to become a part of the new offering development process Revenue growth • A major consumer goods company improved sales by 31.5% by including customer ratings, user-generated product reviews, and other social features on its online storefront, also resulting in a 40% uptick in average order value www.isaca.org 28 Enhance customer and partner relationships (cont.) • Procter & Gamble – Capessa launched in the “Yahoo! Health” section of Yahoo.com, one of the world's leading internet destinations. Women who register with Capessa.yahoo.com have access to several topic areas, including parenting, pregnancy, weight loss, relationships, career, healthy living, and care giving http://realwomenrealadvice.com/ www.isaca.org 29 Enhance customer and partner relationships (cont.) • American Express – OPEN Forum, an online resource and networking site for business owners. The site is designed to forge meaningful business connections and provide practical, actionable information and insights from influential bloggers, industry leaders, and savvy entrepreneurs. http://www.openforum.com/ www.isaca.org 30 Enhance customer and partner relationships (cont.) • State of Louisville, Kentucky – Interactive audit findings on Web site. Allows the users to discuss previous audit findings. http://www.louisvilleky.gov/InternalAudit/ www.isaca.org 31 Enhance customer and partner relationships (cont.) • Amazon – A social network for people who love books. Users are able to create a virtual shelf to show off their books, see what their friends are reading, and discover new books. http://www.shelfari.com/ www.isaca.org 32 Enhance customer and partner relationships (cont.) • Bank of America (BofA) – On January 29, 2010, Bank of America Web site was down. BofA used twitter to keep in touch with its customers to let them know the latest update. www.isaca.org 33 Risks and challenges www.isaca.org 34 Risks and challenges • Farmers and Mobsters – Top Facebook Applications Rank Name Monthly Active Users * 1 FarmVille 82,580,911 2 Static FBML 46,827,021 3 Birthday Cards 41,904,049 4 Café World 30,032,716 5 Facebook for iPhone 29,438,848 6 Texas HoldEm Poker 28,332,917 7 Slide FunSpace 25,630,033 8 Happy Aquariam (BETA) 24,915,971 9 Mafia Wars 24,704,179 10 Causes 24,317,292 • Source - http://statistics.allfacebook.com/applications/leaderboard/ (March 2010) • There are now more than 500,000 active applications on the Facebook Platform www.isaca.org 35 Risks and challenges (cont.) • New security concerns and attack vectors — as a result of the shift in technology through Web services that are empowering server-side core technology components as well as Asynchronous JavaScript and XML (“AJAX”) and Rich Internet Application (“RIA”) clients that are enhancing client-end interfaces in the browser itself. • Top 10 Web 2.0 Attack Vectors — http://net-square.com/whitepapers/Top10_Web2.0_AV.pdf – – – – – – – – – – Cross-site scripting (“CSS”) in AJAX e.g., “Samy worm that exploited MySpace.com’s CSS flaw” XML poisoning — poison XML blocks coming from AJAX client Malicious AJAX code execution — replay of cookies for each request RSS/Atom injection — inject JavaScripts into the RSS feeds to generate attack on client browser Web Services Definition Language (“WSDL”) scanning and enumeration Client-side validation in AJAX routines — fail to perform server-side checks Web services routing issues — compromise of intermediate nodes Parameter manipulation with SOAP — web services consume information and variables from SOAP XPATH injection in SOAP message — bypass authentication mechanisms RIA thick client binary manipulation — issues with session management www.isaca.org 36 Risks and challenges (cont.) • Example worms / phishing attacks affecting social networking sites – Koobface – targets Facebook, MySpace, hi5, Bebo, Twitter, and other sites. Users are prompted to click on a URL purporting to be an update from Adobe and a worm is downloaded to the PC which looks for personal data – Fbaction - Facebook phishing attack that encourages users to sign up for fbaction.net using their Facebook credentials. Those credentials are then used to hijack the Facebook account www.isaca.org 37 Risks and challenges (cont.) – Boface - convinces users to click on a link pointing to a video resulting in a download. Shortly after the download is complete, the user’s Facebook account will be hijacked and used as a means of spamming (and propagating a worm to) all their friends • Common element – they all take advantage of the implied trust that social networking users have with each other www.isaca.org 38 Risks and challenges (cont.) “Has what we've learned about writing software the last 20 years been expressed in the design of Web 2.0? Of course not! It can't even be said to have a 'design.' If showing people what vulnerabilities can do were going to somehow encourage software developers to be more careful about programming, Web 2.0 would not be happening.” - Marcus Ranum in InfoSec Magazine, May 2008 • Trust — Data reliability commonly causes issues for social media in the workplace. The Web has partially solved this with techniques, such as inbound link counting, but reputation and voting systems are starting to appear, often as plug-ins, for social media tools • May also take advantage of URL Shortening – bit.ly, tr.im, tinyurl.com etc. www.isaca.org 39 Risks and challenges (cont.) • More on phishing — social networks are a target rich environment www.isaca.org 40 Risks and challenges (cont.) • More on phishing — social networks are a target rich environment (cont.) “Dearest One… Sorry for the nature of this email, please bear with me. I am Natasha Kone, a 22 year old lady now, i was born on the 1st of January 1986 to the family of Kone. My father’s name is Kamara Cone. He was a very wealthy Gold and Cocoa Merchant based in ACCRA and ABIDJAN respectively. I am their only child. When I was a kid, I attended a private school and things were well for me and my parents. Things changed when I was in High School, my mother died on the 21st October 1994. My father then took me very special and gave me motherly care. As fate had it, my father died last year…………………..” - See http://www.419legal.org for more details • The 419 scams have evolved with the technology – now using LinkedIn to target specific individuals www.isaca.org 41 Risks and challenges (cont.) • Reputation — Damage to company brand/reputation through inappropriate comments or remarks from employees – Even a lack of a response may damage the brand. For example, XYZ Company, Inc. creates a Twitter account call @XYZ_Cares and then fails to use the account. – Other examples include creating social media program, but not telling the rest of the company about it, so they may be unaware of any promotions or offers being publicized. • Copyright violation — Third-party material, such as essays, articles, and photographs, are used without written consent from the proprietor • Intellectual Property theft — Harder to prevent inadvertent data leakage through the one-to-many nature of Web 2.0 as a medium www.isaca.org 42 Risks and challenges (cont.) • Failures in the use of Social Media — most companies that use Social Media don’t approach it the way they would with other mission critical technology – At best, it can be said that most companies today are merely dabbling with Social Media… – Few have approached the solution with an integrated strategy or a concrete business case, usually because they either aren’t fully convinced of its value or have been slowed by the security and legal issues – Without a strategy and proper metrics based on a business case, their projects will remain small, mismanaged, and likely to fail “Fully half of all Social Media investments will fail” — Gartner www.isaca.org 43 Risks and challenges (cont.) “When I discovered YouTube, I didn't work for five days. I did nothing. I viewed cookie monster sings chocolate rain about 1,000 times.” - Michael Scott from The Office • Productivity — Users employ social media tools for nonproductive purposes, such as socializing (“Social Notworking”) http://news.bbc.co.uk/2/hi/business/8325865.stm www.isaca.org 44 Risks and challenges (cont.) • Technical Integration — Most organizations note that integration between individual Web 2.0 applications and their overall infrastructure is a major concern – Sign in using your account with: • • • • • • Facebook Twitter Myspace Yahoo! Google Windows Live ID www.isaca.org AOL Blogger WordPress Netlog OpenID flickr 45 Risks and challenges (cont.) • Information hoarding — In many industries, value is placed on what an employee knows that others do not know. This belief prevents data sharing • Quantification — Researchers currently face challenges quantifying social networking benefits – Valuation techniques include, among others, Beckstrom’s law which states that — “The value of a network equals the net value of each user’s transactions conducted through that network, valued from the perspective of each user, and summed for all.” Or alternatively – http://en.wikipedia.org/wiki/Beckstrom’s_law www.isaca.org 46 Risks and challenges (cont.) • Litigation issues — Discrimination, defamation, violation of privacy, and harassment are some of the potential concerns that might result in litigation issues www.isaca.org 47 A quick word on privacy “People have really gotten comfortable not only sharing more information and different kinds, but more openly and with more people. That social norm is just something that has evolved over time.” — Mark Zuckerberg, Facebook founder “If you have something that you don’t want anyone to know, maybe you shouldn’t be doing it in the first place...” — Eric Schmidt, CEO Google, Inc. www.isaca.org 48 A quick word on privacy (cont.) • • • • Loss of Fourth Amendment protection Encryption of data storage unlikely Lack of encryption while data in use Data remanence: limited attempt to address www.isaca.org 49 Responding to the risks and challenges • Policies and procedures – Acceptable use policy • • Details how social networking sites and applications can be used Define consequences for failure to comply e.g., “termination of employment and legal action” • Risk assessment – Establish what information is most critical to the business – Understand how information might become vulnerable and how to protect it (data mapping) www.isaca.org 50 Responding to the risks and challenges • Education and awareness – Inform user of the information security risks involved and how to guard against them • For example only install or run applications from trusted sources approved by the corporate IT department www.isaca.org 51 Responding to the risks and challenges (cont.) • Vulnerability Assessments – Identifying, quantifying, and prioritizing the potential vulnerabilities that Social Networking may present to the organization • Firewalls – Historically firewalls focused on ports, IP addresses and packets – But social networking applications operate on Ports 80 & 443 – Next-generation firewall technology that offers granular control of social networking functionality • • • • Identify applications, regardless of port, protocol, evasive tactic or SSL Identify users regardless of IP address Scan application content in real-time Visibility and policy control over application access www.isaca.org 52 What is next in the world of social networking www.isaca.org 53 Where we are at today • Enterprise Social Media has crossed the tipping point and is no longer considered an “emerging” technology “The Hype Cycle” http://en.wikipedia.org/wiki/Hype_cycle www.isaca.org 54 What’s next in the world of social networking • Increase in the use of mobile devices to access Social Networks – Over 600 million people will use their phone to access Social Networks by 2013, and increase of more than 400% than 2009 figure of 140 million Source — eMarketer • Increase in frequency of access – Facebook mobile users are 50% more active than other users of the site • Take your social profile with you as you travel the Web – For example — Facebook Connect • Social Networks will become more pervasive — broadcasting your location in geo-networking apps – Interaction between devices. For example, your car’s navigation system will be able to learn your friend’s location and provide directions to them www.isaca.org 55 Some further predictions • Some quotes on social networks – “Probably the greatest transformative force in our generation, absent a major war.” — Mark Zuckerberg, Facebook founder – “(Twitter is)… Something important that has the potential to change the world, though we have a long way to go.” — Biz Stone, Co-founder of Twitter www.isaca.org 56 Q&A www.isaca.org 57 Today’s Presenters Nelson Gibbs Senior Manager AERS – Audit & Enterprise Risk Services Deloitte & Touche LLP [email protected] +1 213 593 4241 www.isaca.org 58 Appendix • Additional resources – Gopal, Raj et al. “Web 2.0 reinvents corporate networking.” Deloitte Consulting LLP (2008) – The Economist — A special report on social networking “January 30, 2010” – Fraser, Matthew; Dutta, Soumitra (2008). Throwing Sheep in the Boardroom: How Online Social Networking Will Transform Your Life, Work and World – “Wall of Facebook: The Social Network's Plan to Dominate the Internet” — and Keep Google Out by Fred Vogelstein, Wired Magazine (June 2009) – http://www.wired.com/techbiz/it/magazine/17-07/ff_facebookwallGreat – “The Future is Social, Not Search, Facebook COO Says” by Ryan Singel, Wired Magazine (October 2009) http://www.wired.com/epicenter/2009/10/facebook-social-2/ – British Computer Society Social Media Web site — http://www.bcs.org/socialmedia www.isaca.org 59 This presentation contains general information only and Deloitte is not, by means of this presentation, rendering accounting, business, financial, investment, legal, tax, or other professional advice or services. This presentation is not a substitute for such professional advice or services, nor should it be used as a basis for any decision or action that may affect your business. Before making any decision or taking any action that may affect your business, you should consult a qualified professional advisor. Deloitte, its affiliates, and related entities shall not be responsible for any loss sustained by any person who relies on this presentation. www.isaca.org 60
© Copyright 2026 Paperzz