Library Logo
Normal view MARC view ISBD view

Securing social media in the enterprise / [electronic resource]

by Dalziel, Henry [author.].
Material type: materialTypeLabelBookPublisher: Waltham, MA : Elsevier : 2015Description: 1 online resource.ISBN: 9780128041963; 012804196X; 0128041803; 9780128041802.Subject(s): Social media | Computer security | PSYCHOLOGY -- Social Psychology | Computer security | Social media | IT-s�akerhet | Sociala medier | Electronic books | Electronic booksOnline resources: ScienceDirect
Contents:
The typical approach -- Red team assessment -- Elements for success -- Who are weup against -- Things to keep in mind -- High risk of low risk -- Composite attacks.
Summary: Securing Social Media in the Enterprise is a concise overview of the security threats posed by the use of social media sites and apps in enterprise network environments. Social media sites and apps are now a ubiquitous presence within enterprise systems and networks, and are vulnerable to a wide range of digital systems attacks. This brief volume provides security professionals and network systems administrators a much-needed dive into the most current threats, detection techniques, and defenses for these attacks, and provides a roadmap for best practices to secure and manage social media within the enterprise. Teaches how to: Use of social engineering techniques, Mimic threat behaviours, Categorize different classes of attacks (e.g., passive, active, insider, close-in, distribution, etc.), Quantify different operational threat environments, Categorize general attack stages.
Tags from this library: No tags from this library for this title. Add tag(s)
Log in to add tags.
    average rating: 0.0 (0 votes)
No physical items for this record

Vendor-supplied metadata.

Securing Social Media in the Enterprise is a concise overview of the security threats posed by the use of social media sites and apps in enterprise network environments. Social media sites and apps are now a ubiquitous presence within enterprise systems and networks, and are vulnerable to a wide range of digital systems attacks. This brief volume provides security professionals and network systems administrators a much-needed dive into the most current threats, detection techniques, and defenses for these attacks, and provides a roadmap for best practices to secure and manage social media within the enterprise. Teaches how to: Use of social engineering techniques, Mimic threat behaviours, Categorize different classes of attacks (e.g., passive, active, insider, close-in, distribution, etc.), Quantify different operational threat environments, Categorize general attack stages.

The typical approach -- Red team assessment -- Elements for success -- Who are weup against -- Things to keep in mind -- High risk of low risk -- Composite attacks.

There are no comments for this item.

Log in to your account to post a comment.
Last Updated on September 15, 2019
© Dhaka University Library. All Rights Reserved|Staff Login