Securing Social Media in the Enterprise
- 1st Edition - August 11, 2015
- Latest edition
- Author: Henry Dalziel
- Language: English
Securing Social Media in the Enterprise is a concise overview of the security threats posed by the use of social media sites and apps in enterprise network environments. Social me… Read more
Robotics & automation week
Empowering Progress
Up to 20% on Robotics and Automation Resources!
Securing Social Media in the Enterprise is a concise overview of the security threats posed by the use of social media sites and apps in enterprise network environments. Social media sites and apps are now a ubiquitous presence within enterprise systems and networks, and are vulnerable to a wide range of digital systems attacks. This brief volume provides security professionals and network systems administrators a much-needed dive into the most current threats, detection techniques, and defenses for these attacks, and provides a roadmap for best practices to secure and manage social media within the enterprise.
- Teaches how to: Use of social engineering techniques, Mimic threat behaviours, Categorize different classes of attacks (e.g., passive, active, insider, close-in, distribution, etc.), Quantify different operational threat environments, Categorize general attack stages
security professionals and network systems administrators
- Author Biography
- Contributing Editor Biography
- Chapter 1. Introduction
- Chapter 2. ISO Security Management Categories
- Chapter 3. Risk Management
- Chapter 4. Policy Management
- Chapter 5. Security Organization Management
- Chapter 6. Human Resources Security Management
- Chapter 7. Asset Management
- Chapter 8. Access Management
- Chapter 9. Cryptography
- Chapter 10. Physical and Environmental Security Management
- Chapter 11. Security Operations Management
- Chapter 12. Communications Security Management
- Chapter 13. Systems Acquisition, Development, and Maintenance
- Chapter 14. Supplier Security Management
- Chapter 15. Information Security Incident Management
- Chapter 16. Business Continuity Management
- Chapter 17. Compliance Management
- Chapter 18. Skillset Groupings
- Chapter 19. Resources
- Chapter 20. Conclusion
- Edition: 1
- Latest edition
- Published: August 11, 2015
- Language: English
HD