CITATION

Bahadur, Gary; Inasi, Jason; and de Carvalho, Alex. Securing the Clicks Network Security in the Age of Social Media. US: McGraw-Hill Osborne Media, 2011.

Securing the Clicks Network Security in the Age of Social Media

Published:  October 2011

eISBN: 9780071769068 0071769064 | ISBN: 9780071769051
  • Contents
  • Foreword
  • Introduction
  • Part I: Assessing Social Media Security
  • Chapter 1 The Social Media Security Process
  • Case Study: Reputation Damage from an Unprepared Social Media Strategy
  • How Security Has Changed in the Recent Past
  • The Assessment Process
  • Organizational Analysis: Your Industry Online, the Good and the Bad
  • Competitive Analysis
  • Wrap Up
  • Chapter 2 Security Strategy Analysis: Foundation of Your Security Policy
  • Case Study: Hacking Is an Equal Opportunity Sport
  • The H.U.M.O.R. Matrix
  • Human Resources
  • Utilization of Resources and Assets
  • Monetary Considerations
  • Operations Management
  • Reputation Management
  • Wrap Up
  • Chapter 3 Monitoring in the Social Media Landscape
  • Case Study: A Dangerous Public
  • What Are Your Customers and the General Public Saying?
  • What Are Your Employees Saying?
  • The “What If” Scenario
  • Wrap Up
  • Part II: Assessing Social Media Threats
  • Chapter 4 Threat Assessment
  • Case Study: Political Hacking
  • The Changing Threat Landscape
  • Identifying the Threats
  • Threat Assessment and the Threat Management Lifecycle
  • H.U.M.O.R. Threat Assessment
  • Assessing Damage
  • Developing a Response
  • Wrap Up
  • Chapter 5 What Can Go Wrong
  • Case Study: Firesheep, A Real-World Example of Social Media Hacking
  • Dangers Specific to Social Networks
  • Cyberstalking
  • Validating the End User
  • Data Scraping
  • Wrap Up
  • Part III: Operations, Policies, & Processes
  • Chapter 6 Social Media Security Policy Best Practices
  • Case Study: Growth of Social Media Policy Usage
  • What Is an Effective Social Media Security Policy?
  • H.U.M.O.R. Guidelines
  • Developing Your Social Media Security Policy
  • A Sample Social Media Security Policy
  • Wrap Up
  • Chapter 7 Human Resources: Strategy & Collaboration
  • Case Study: “Expensive Paperweight” Gets Fired
  • Identifying Business Processes, Regulations, and Legal Requirements
  • The Community Manager: Defining and Implementing
  • Training
  • Wrap Up
  • Chapter 8 Utilization of Resources: Strategy & Collaboration
  • Case Study: Inappropriate Tweets
  • How Are Security Processes Handled?
  • Preventing Data Loss
  • Educating Employees
  • Wrap Up
  • Chapter 9 Monetary Considerations: Strategy & Collaboration
  • Case Study: Calculating the Cost of Data Loss
  • Costs of Implementing Controls
  • Costs of Threats and Countermeasures
  • Wrap Up
  • Chapter 10 Operations Management: Strategy & Collaboration
  • Case Study: Military Cyberprofiles
  • Operations Management Strategy
  • Controls Auditing
  • Wrap Up
  • Chapter 11 Reputation Management: Strategy & Collaboration
  • Case Study: Domino’s Reputation Attack
  • Attempts to Ruin Brand Equity: From Logos to Brands
  • Actively Managing Your Reputation
  • Zen and the Art of Social Media Strategy
  • Who Do You Call in a Crisis?
  • Reducing Reputation Risks with Incident Management
  • Wrap Up
  • Part IV: Monitoring & Reporting
  • Chapter 12 Human Resources Monitoring & Reporting
  • Case Study: Facebook Posting Leads to Firing
  • Monitoring by Human Resources
  • How to Monitor Employee Usage
  • How to Use Social Media to Monitor Prospective Employees
  • Baseline Monitoring and Reporting Requirements
  • Policy Management
  • Wrap Up
  • Chapter 13 Utilization Monitoring & Reporting
  • Case Study: How Not to Respond
  • Who, What, Where, When, and How?
  • Technology
  • Intellectual Property
  • Copyright
  • Incident Management
  • Reporting Metrics
  • Wrap Up
  • Chapter 14 Monetary Monitoring & Reporting
  • Case Study: The Budgetary Challenge
  • Social Media Security on a Limited Budget
  • Social Media Security on a Big Budget
  • Training Costs
  • Wrap Up
  • Chapter 15 Operations Management Monitoring & Reporting
  • Case Study: Social Media Success
  • Types of Monitoring to Ensure Security Practices Are Followed
  • Data Loss Management: Tools and Practices
  • Monitoring and Management Tools
  • Tracking Employee Usage
  • Wrap Up
  • Chapter 16 Reputation Management Monitoring & Reporting
  • Case Study: Uncontrolled Reputation Damage
  • Online Reputation Management
  • Setting Up a Monitoring System
  • Establishing a Baseline and Comparing Historical Periods
  • How to Make Good Use of Reputation Information
  • Wrap Up
  • Part V: Social Media 3.0
  • Chapter 17 Assessing Your Social Media Strategy
  • How JAG’s Doing
  • The Challenges Ahead
  • Active Reputation Management
  • Wrap Up
  • Chapter 18 The Future of Social Media Security
  • The Internet of Things
  • Evolving Threats to the “Global Brain”
  • The Best Defense Is a Good Offense
  • Jumping into the Deep End
  • Wrap Up
  • Appendix: Resource Guide
  • Index