Securing Social Media in the Enterprise
Securing Social Media in the Enterprise is a concise overview of the security threats posed by the use of social media sites and apps in enterprise network environments. Social media sites and apps are now a ubiquitous presence within enterprise systems and networks, and are vulnerable to a wide range of digital systems attacks. This brief volume provides security professionals and network systems administrators a much-needed dive into the most current threats, detection techniques, and defenses for these attacks, and provides a roadmap for best practices to secure and manage social media within the enterprise.

  • Teaches how to: Use of social engineering techniques, Mimic threat behaviours, Categorize different classes of attacks (e.g., passive, active, insider, close-in, distribution, etc.), Quantify different operational threat environments, Categorize general attack stages
1132571176
Securing Social Media in the Enterprise
Securing Social Media in the Enterprise is a concise overview of the security threats posed by the use of social media sites and apps in enterprise network environments. Social media sites and apps are now a ubiquitous presence within enterprise systems and networks, and are vulnerable to a wide range of digital systems attacks. This brief volume provides security professionals and network systems administrators a much-needed dive into the most current threats, detection techniques, and defenses for these attacks, and provides a roadmap for best practices to secure and manage social media within the enterprise.

  • Teaches how to: Use of social engineering techniques, Mimic threat behaviours, Categorize different classes of attacks (e.g., passive, active, insider, close-in, distribution, etc.), Quantify different operational threat environments, Categorize general attack stages
39.95 Out Of Stock
Securing Social Media in the Enterprise

Securing Social Media in the Enterprise

by Henry Dalziel
Securing Social Media in the Enterprise

Securing Social Media in the Enterprise

by Henry Dalziel

Paperback

$39.95 
  • SHIP THIS ITEM
    Temporarily Out of Stock Online
  • PICK UP IN STORE

    Your local store may have stock of this item.

Related collections and offers


Overview

Securing Social Media in the Enterprise is a concise overview of the security threats posed by the use of social media sites and apps in enterprise network environments. Social media sites and apps are now a ubiquitous presence within enterprise systems and networks, and are vulnerable to a wide range of digital systems attacks. This brief volume provides security professionals and network systems administrators a much-needed dive into the most current threats, detection techniques, and defenses for these attacks, and provides a roadmap for best practices to secure and manage social media within the enterprise.

  • Teaches how to: Use of social engineering techniques, Mimic threat behaviours, Categorize different classes of attacks (e.g., passive, active, insider, close-in, distribution, etc.), Quantify different operational threat environments, Categorize general attack stages

Product Details

ISBN-13: 9780128041802
Publisher: Elsevier Science
Publication date: 09/02/2015
Pages: 48
Product dimensions: 5.80(w) x 8.90(h) x 0.40(d)

About the Author

Henry Dalziel is a serial education entrepreneur, founder of Concise Ac Ltd, online cybersecurity blogger and e-book author. He writes for the Concise-Courses.com blog and has developed numerous cybersecurity continuing education courses and books. Concise Ac Ltd develops and distributes continuing education content [books and courses] for cybersecurity professionals seeking skill enhancement and career advancement. The company was recently accepted onto the UK Trade & Investment's (UKTI) Global Entrepreneur Programme (GEP).

Table of Contents

Chapter 1 - Introduction Chapter 2 - The Typical Approach Chapter 3 - Red Team Assessment Chapter 4 - Elements for Success Chapter 5 - Who Are We Up Against Chapter 6 - Things To Keep In Mind Chapter 7 - High Risk of Low Risk Chapter 8 - Composite Attacks Chapter 9 - Conclusion

From the B&N Reads Blog

Customer Reviews