CHAPTER 5
What Can Go Wrong

Traditional attacks have taken the form of identity theft, corporate espionage, supply chain disruption, phishing, and hardware/software attacks such as SSL and DoS. However, as discussed in Chapter 4, social media threats can originate from almost anywhere and quickly challenge a company’s traditional IT security policy. Unethical hackers now have much more nefarious designs when launching their attacks. This chapter builds on the previous chapter by looking specifically at

image The dangers of social media and the importance of encryption

image Cyberstalking and corporate cyberstalking

image Validating the end user

image Data scraping

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset