Home Page Icon
Home Page
Table of Contents for
Part III Operations, Policies, & Processes
Close
Part III Operations, Policies, & Processes
by Alex de Carvalho, Jason Inasi, Gary Bahadur
Securing the Clicks: Network Security in the Age of Social Media
Title Page
Copyright Page
Dedication
About the Authors
Contents at a Glance
Contents
Foreword
Introduction
Part I Assessing Social Media Security
Chapter 1 The Social Media Security Process
Case Study: Reputation Damage from an Unprepared Social Media Strategy
How Security Has Changed in the Recent Past
The Assessment Process
Organizational Analysis: Your Industry Online, the Good and the Bad
Competitive Analysis
Wrap Up
Chapter 2 Security Strategy Analysis: Foundation of Your Security Policy
Case Study: Hacking Is an Equal Opportunity Sport
The H.U.M.O.R. Matrix
Human Resources
Utilization of Resources and Assets
Monetary Considerations
Operations Management
Reputation Management
Wrap Up
Chapter 3 Monitoring in the Social Media Landscape
Case Study: A Dangerous Public
What Are Your Customers and the General Public Saying?
What Are Your Employees Saying?
The “What If” Scenario
Wrap Up
Part II Assessing Social Media Threats
Chapter 4 Threat Assessment
Case Study: Political Hacking
The Changing Threat Landscape
Identifying the Threats
Threat Assessment and the Threat Management Lifecycle
H.U.M.O.R. Threat Assessment
Assessing Damage
Developing a Response
Wrap Up
Chapter 5 What Can Go Wrong
Case Study: Firesheep, A Real-World Example of Social Media Hacking
Dangers Specific to Social Networks
Cyberstalking
Validating the End User
Data Scraping
Wrap Up
Part III Operations, Policies, & Processes
Chapter 6 Social Media Security Policy Best Practices
Case Study: Growth of Social Media Policy Usage
What Is an Effective Social Media Security Policy?
H.U.M.O.R. Guidelines
Developing Your Social Media Security Policy
A Sample Social Media Security Policy
Wrap Up
Chapter 7 Human Resources: Strategy & Collaboration
Case Study: “Expensive Paperweight” Gets Fired
Identifying Business Processes, Regulations, and Legal Requirements
The Community Manager: Defining and Implementing
Training
Wrap Up
Chapter 8 Utilization of Resources: Strategy & Collaboration
Case Study: Inappropriate Tweets
How Are Security Processes Handled?
Preventing Data Loss
Educating Employees
Wrap Up
Chapter 9 Monetary Considerations: Strategy & Collaboration
Case Study: Calculating the Cost of Data Loss
Costs of Implementing Controls
Costs of Threats and Countermeasures
Wrap Up
Chapter 10 Operations Management: Strategy & Collaboration
Case Study: Military Cyberprofiles
Operations Management Strategy
Controls Auditing
Wrap Up
Chapter 11 Reputation Management: Strategy & Collaboration
Case Study: Domino’s Reputation Attack
Attempts to Ruin Brand Equity: From Logos to Brands
Actively Managing Your Reputation
Zen and the Art of Social Media Strategy
Who Do You Call in a Crisis?
Reducing Reputation Risks with Incident Management
Wrap Up
Part IV Monitoring & Reporting
Chapter 12 Human Resources Monitoring & Reporting
Case Study: Facebook Posting Leads to Firing
Monitoring by Human Resources
How to Monitor Employee Usage
How to Use Social Media to Monitor Prospective Employees
Baseline Monitoring and Reporting Requirements
Policy Management
Wrap Up
Chapter 13 Utilization Monitoring & Reporting
Case Study: How Not to Respond
Who, What, Where, When, and How?
Technology
Intellectual Property
Copyright
Incident Management
Reporting Metrics
Wrap Up
Chapter 14 Monetary Monitoring & Reporting
Case Study: The Budgetary Challenge
Social Media Security on a Limited Budget
Social Media Security on a Big Budget
Training Costs
Wrap Up
Chapter 15 Operations Management Monitoring & Reporting
Case Study: Social Media Success
Types of Monitoring to Ensure Security Practices Are Followed
Data Loss Management: Tools and Practices
Monitoring and Management Tools
Tracking Employee Usage
Wrap Up
Chapter 16 Reputation Management Monitoring & Reporting
Case Study: Uncontrolled Reputation Damage
Online Reputation Management
Setting Up a Monitoring System
Establishing a Baseline and Comparing Historical Periods
How to Make Good Use of Reputation Information
Wrap Up
Part V Social Media 3.0
Chapter 17 Assessing Your Social Media Strategy
How JAG’s Doing
The Challenges Ahead
Active Reputation Management
Wrap Up
Chapter 18 The Future of Social Media Security
The Internet of Things
Evolving Threats to the “Global Brain”
The Best Defense Is a Good Offense
Jumping into the Deep End
Wrap Up
Appendix Resource Guide
Index
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
Wrap Up
Next
Next Chapter
Chapter 6 Social Media Security Policy Best Practices
PART III
Operations, Policies, & Processes
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset