CHAPTER 2
Security Strategy Analysis: Foundation of Your Security Policy

Every corporation has a process to accomplish every goal. The process could be good or bad. Companies that do not follow a set process tend to make mistakes, achieve unexpected results, have teams going in different directions, and miss their targets. As the motivational speaker and author Zig Ziglar pointed out, “People don’t plan to fail; they fail to plan!”

In this chapter, we define the first steps toward developing a secure social media framework so you can track, measure, and monitor your social media usage over time. More specifically, you will learn about the different aspects of the H.U.M.O.R. Matrix and how you can use it to assess your current environment. A framework for security must anticipate future social media developments and how they will impact security.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset