Henry Dalziel's Securing Social Media in the Enterprise PDF

By Henry Dalziel

ISBN-10: 0128041803

ISBN-13: 9780128041802

ISBN-10: 012804196X

ISBN-13: 9780128041963

Securing Social Media within the firm is a concise evaluation of the safety threats posed by means of social media websites and apps in company community environments. Social media websites and apps at the moment are a ubiquitous presence inside of firm platforms and networks, and are liable to quite a lot of electronic platforms assaults. This short quantity offers safety pros and community platforms directors a much-needed dive into the most up-tp-date threats, detection ideas, and defenses for those assaults, and gives a roadmap for most sensible practices to safe and deal with social media in the enterprise.

Teaches how to:

  • Use of social engineering techniques
  • Mimic chance behaviours
  • Categorize varied sessions of assaults (e.g., passive, energetic, insider, close-in, distribution, etc.)
  • Quantify various operational chance environments
  • Categorize common assault levels

Show description

Read Online or Download Securing Social Media in the Enterprise PDF

Best security & encryption books

New PDF release: The Giant Black Book of Computer Viruses

During this publication you are going to study every thing you desired to learn about laptop viruses, starting from the best 44-byte virus correct on as much as viruses for 32-bit home windows, Unix and the net. you are going to learn the way anti-virus courses stalk viruses and what viruses do to avert those electronic policemen, together with stealth innovations and poly-morphism.

Martin Freiss's Protecting Networks with SATAN PDF

Devil (Security Administrator's instrument for examining Networks) is a robust reduction for process directors. It plays "security audits," scanning host pcs for defense vulnerabilities attributable to misguided configurations or by way of identified software program mistakes in often used courses. devil is a very fascinating piece of software program since it makes use of the net as its entrance finish.

Download PDF by Mark Scherling: Practical Risk Management for the CIO

The becoming complexity of today’s interconnected structures has not just elevated the necessity for more suitable details defense, but additionally helped to maneuver info from the IT backroom to the administrative boardroom as a strategic asset. And, like the tip of an iceberg is all you spot until eventually you run into it, the hazards in your details are commonly invisible till catastrophe moves.

Download e-book for kindle: Information Security Continuous Monitoring (ISCM) for by Kelley Dempsey, Nirali Shah Chawla, Arnold Johnson, Ronald

This book in particular addresses review and research of protection keep watch over effectiveness and of organizational safeguard prestige according to organizational possibility tolerance.

Additional resources for Securing Social Media in the Enterprise

Sample text

Start incredibly small, or start with the CEO of your organization. Go through an exercise of understanding what’s exposed on that specific individual and what an attacker could find. The screenshot we have on the slide is from a Twitter account by Glenn Wilkinson from SensePost. Glenn is one of the lead developers of Snoopy, the tool we mentioned earlier. Glenn and I were teaching a course a few years ago, where one of the components was open source intelligence. As part of his material, Glenn wanted to give an example to our class and he just randomly picked a CEO of a company in the United States.

At many organizations it is done quarterly and they try to phish their own employees. When you look at those rates, and the rates of success, you understand where to target your remediation. If Jane Doe in accounting is clicking on every spear phishing email and attachment we send her, but she has no profile on the Internet, it’s not ideal. However, it’s also not very high risk versus a CFO who has a massive public profile and is clicking on every single spear phishing email and attachment. Maybe we know where to target our education and maybe we need a session specifically with the CFO to educate them on the risks.

If we went looking to impersonate this user, or attack some of their social network, we now know that we can probably register this account on Flickr or Blogger, where it’s available, and start impersonating the user on those accounts or media. This makes aggregators really useful. Another really interesting tool is Snoopy, developed by the guys at SensePost. Snoopy is helpful because it works with geolocation very well. At a high level, what Snoopy really does is listen for Wi-Fi beaconing from mobile devices.

Download PDF sample

Securing Social Media in the Enterprise by Henry Dalziel


by Christopher
4.1

Rated 4.33 of 5 – based on 22 votes