Securing Social Media in the Enterprise is a concise overview of the security threats posed by the use of social media sites and apps in enterprise network environments. Social media sites and apps are now a ubiquitous presence within enterprise systems and networks, and are vulnerable to a wide range of digital systems attacks. This brief volume provides security professionals and network systems administrators a much-needed dive into the most current threats, detection techniques, and defenses for these attacks, and provides a roadmap for best practices to secure and manage social media within the enterprise.
- Teaches how to: Use of social engineering techniques, Mimic threat behaviours, Categorize different classes of attacks (e.g., passive, active, insider, close-in, distribution, etc.), Quantify different operational threat environments, Categorize general attack stages
Chapter 1 - Introduction Chapter 2 - The Typical Approach Chapter 3 - Red Team Assessment Chapter 4 - Elements for Success Chapter 5 - Who Are We Up Against Chapter 6 - Things To Keep In Mind Chapter 7 - High Risk of Low Risk Chapter 8 - Composite Attacks Chapter 9 - Conclusion
A roadmap for the best practices of social media securityHenry Dalziel is a serial education entrepreneur, founder of Concise Ac Ltd, online cybersecurity blogger and e-book author. He writes for the Concise-Courses.com blog and has developed numerous cybersecurity continuing education courses and books. Concise Ac Ltd develops and distributes continuing education content [books and courses] for cybersecurity professionals seeking skill enhancement and career advancement. The company was recently accepted onto the UK Trade & Investment's (UKTI) Global Entrepreneur Programme (GEP). ...demonstrates just how much information can be gleaned by an attacker through the use of real-life examples,.The solution l�l