Securing Social Media in the Enterprise Securing Social Media in the Enterprise

Securing Social Media in the Enterprise

    • $46.99
    • $46.99

Publisher Description

Securing Social Media in the Enterprise is a concise overview of the security threats posed by the use of social media sites and apps in enterprise network environments. Social media sites and apps are now a ubiquitous presence within enterprise systems and networks, and are vulnerable to a wide range of digital systems attacks. This brief volume provides security professionals and network systems administrators a much-needed dive into the most current threats, detection techniques, and defenses for these attacks, and provides a roadmap for best practices to secure and manage social media within the enterprise. Teaches how to: Use of social engineering techniques, Mimic threat behaviours, Categorize different classes of attacks (e.g., passive, active, insider, close-in, distribution, etc.), Quantify different operational threat environments, Categorize general attack stages

GENRE
Computers & Internet
RELEASED
2015
August 11
LANGUAGE
EN
English
LENGTH
48
Pages
PUBLISHER
Elsevier Science
SELLER
Elsevier Ltd.
SIZE
6.8
MB

More Books Like This

Cyber Threat Intelligence Cyber Threat Intelligence
2021
Reverse Deception: Organized Cyber Threat Counter-Exploitation Reverse Deception: Organized Cyber Threat Counter-Exploitation
2012
Next Generation Red Teaming Next Generation Red Teaming
2015
Social Engineering Penetration Testing Social Engineering Penetration Testing
2014
7 Rules to Influence Behaviour and Win at Cyber Security Awareness 7 Rules to Influence Behaviour and Win at Cyber Security Awareness
2019
Seven Deadliest Social Network Attacks Seven Deadliest Social Network Attacks
2010

More Books by Henry Dalziel

How to Define and Build an Effective Cyber Threat Intelligence Capability How to Define and Build an Effective Cyber Threat Intelligence Capability
2014
Essential Skills for Hackers Essential Skills for Hackers
2015
Meeting People via WiFi and Bluetooth Meeting People via WiFi and Bluetooth
2015
Deploying Secure Containers for Training and Development Deploying Secure Containers for Training and Development
2015
Cyber Security Awareness for CEOs and Management Cyber Security Awareness for CEOs and Management
2015
Automated Security Analysis of Android and iOS Applications with Mobile Security Framework Automated Security Analysis of Android and iOS Applications with Mobile Security Framework
2015