Sign in
|
Register
|
Mobile
Home
Browse
About us
Help/FAQ
Advanced search
Home
>
Browse
>
Securing the Clicks Network Security in the Age of Social Media
CITATION
Bahadur, Gary;
Inasi, Jason; and
de Carvalho, Alex
.
Securing the Clicks Network Security in the Age of Social Media
.
US
: McGraw-Hill Osborne Media, 2011.
Add to Favorites
Email to a Friend
Download Citation
Securing the Clicks Network Security in the Age of Social Media
Authors:
Gary Bahadur
,
Jason Inasi
and
Alex de Carvalho
Published:
October 2011
eISBN:
9780071769068 0071769064
|
ISBN:
9780071769051
Open eBook
Book Description
Table of Contents
Contents
Foreword
Introduction
Part I: Assessing Social Media Security
Chapter 1 The Social Media Security Process
Case Study: Reputation Damage from an Unprepared Social Media Strategy
How Security Has Changed in the Recent Past
The Assessment Process
Organizational Analysis: Your Industry Online, the Good and the Bad
Competitive Analysis
Wrap Up
Chapter 2 Security Strategy Analysis: Foundation of Your Security Policy
Case Study: Hacking Is an Equal Opportunity Sport
The H.U.M.O.R. Matrix
Human Resources
Utilization of Resources and Assets
Monetary Considerations
Operations Management
Reputation Management
Wrap Up
Chapter 3 Monitoring in the Social Media Landscape
Case Study: A Dangerous Public
What Are Your Customers and the General Public Saying?
What Are Your Employees Saying?
The “What If” Scenario
Wrap Up
Part II: Assessing Social Media Threats
Chapter 4 Threat Assessment
Case Study: Political Hacking
The Changing Threat Landscape
Identifying the Threats
Threat Assessment and the Threat Management Lifecycle
H.U.M.O.R. Threat Assessment
Assessing Damage
Developing a Response
Wrap Up
Chapter 5 What Can Go Wrong
Case Study: Firesheep, A Real-World Example of Social Media Hacking
Dangers Specific to Social Networks
Cyberstalking
Validating the End User
Data Scraping
Wrap Up
Part III: Operations, Policies, & Processes
Chapter 6 Social Media Security Policy Best Practices
Case Study: Growth of Social Media Policy Usage
What Is an Effective Social Media Security Policy?
H.U.M.O.R. Guidelines
Developing Your Social Media Security Policy
A Sample Social Media Security Policy
Wrap Up
Chapter 7 Human Resources: Strategy & Collaboration
Case Study: “Expensive Paperweight” Gets Fired
Identifying Business Processes, Regulations, and Legal Requirements
The Community Manager: Defining and Implementing
Training
Wrap Up
Chapter 8 Utilization of Resources: Strategy & Collaboration
Case Study: Inappropriate Tweets
How Are Security Processes Handled?
Preventing Data Loss
Educating Employees
Wrap Up
Chapter 9 Monetary Considerations: Strategy & Collaboration
Case Study: Calculating the Cost of Data Loss
Costs of Implementing Controls
Costs of Threats and Countermeasures
Wrap Up
Chapter 10 Operations Management: Strategy & Collaboration
Case Study: Military Cyberprofiles
Operations Management Strategy
Controls Auditing
Wrap Up
Chapter 11 Reputation Management: Strategy & Collaboration
Case Study: Domino’s Reputation Attack
Attempts to Ruin Brand Equity: From Logos to Brands
Actively Managing Your Reputation
Zen and the Art of Social Media Strategy
Who Do You Call in a Crisis?
Reducing Reputation Risks with Incident Management
Wrap Up
Part IV: Monitoring & Reporting
Chapter 12 Human Resources Monitoring & Reporting
Case Study: Facebook Posting Leads to Firing
Monitoring by Human Resources
How to Monitor Employee Usage
How to Use Social Media to Monitor Prospective Employees
Baseline Monitoring and Reporting Requirements
Policy Management
Wrap Up
Chapter 13 Utilization Monitoring & Reporting
Case Study: How Not to Respond
Who, What, Where, When, and How?
Technology
Intellectual Property
Copyright
Incident Management
Reporting Metrics
Wrap Up
Chapter 14 Monetary Monitoring & Reporting
Case Study: The Budgetary Challenge
Social Media Security on a Limited Budget
Social Media Security on a Big Budget
Training Costs
Wrap Up
Chapter 15 Operations Management Monitoring & Reporting
Case Study: Social Media Success
Types of Monitoring to Ensure Security Practices Are Followed
Data Loss Management: Tools and Practices
Monitoring and Management Tools
Tracking Employee Usage
Wrap Up
Chapter 16 Reputation Management Monitoring & Reporting
Case Study: Uncontrolled Reputation Damage
Online Reputation Management
Setting Up a Monitoring System
Establishing a Baseline and Comparing Historical Periods
How to Make Good Use of Reputation Information
Wrap Up
Part V: Social Media 3.0
Chapter 17 Assessing Your Social Media Strategy
How JAG’s Doing
The Challenges Ahead
Active Reputation Management
Wrap Up
Chapter 18 The Future of Social Media Security
The Internet of Things
Evolving Threats to the “Global Brain”
The Best Defense Is a Good Offense
Jumping into the Deep End
Wrap Up
Appendix: Resource Guide
Index