|
Securing the Clicks: Network Security in the Age of Social Media provides you with knowledge and actions you can put to use immediately to harden corporate networks against social media attacks now. The 1 vehicle for hackers today is social media. Part I of this book details effective methods for analyzing the organization from multiple perspectives and includes compelling, illustrative, real-world case examples. Part II digs into the types of threats social media brings and how you can predict and defend against various types of risks. Part III outlines best practices for developing the plans, policies, and processes that are the backbone of reducing risk to organizations? networks. Part IV provides methods for maintaining, monitoring, and managing these plans on an ongoing basis for maximum results and long-term security.
About the Author Gary Bahadur is the founder and CEO of KRAA Security (www.kraasecurity.com/social-media-security), which protects organizations from threats through a combination of prevention services.
Jason Inasi is CEO and cofounder of The Factory Interactive (www.thefactoryi.com), a digital design and marketing agency, and president of Inasi Group.
Alex de Carvalho is vice president of business development and community at VoxMed, cofounder of The Startup Forum, director of social media at Medimix International.
Table of Contents Part I Assessing Social Media Security
Chapter 1 The Social Media Security Process Chapter 2 Security Strategy Analysis: Foundation of Your Security Policy Chapter 3 Monitoring in the Social Media Landscape
Part II Assessing Social Media Threats
Chapter 4 Threat Assessment Chapter 5 What Can Go Wrong
Part III Operations, Policies, & Processes
Chapter 6 Social Media Security Policy Best Practices Chapter 7 Human Resources: Strategy & Collaboration Chapter 8 Utilization of Resources: Strategy & Collaboration Chapter 9 Monetary Considerations: Strategy & Collaboration Chapter 10 Operations Management: Strategy & Collaboration Chapter 11 Reputation Management: Strategy & Collaboration
Part IV Monitoring & Reporting
Chapter 12 Human Resources Monitoring & Reporting Chapter 13 Utilization Monitoring & Reporting Chapter 14 Monetary Monitoring & Reporting Chapter 15 Operations Management Monitoring & Reporting Chapter 16 Reputation Management Monitoring & Reporting
Part V Social Media 3.0
Chapter 17 Assessing Your Social Media Strategy Chapter 18 The Future of Social Media Security Appendix Resource Guide isbn 9781259027451
|
|
|