Traditional attacks have taken the form of identity theft, corporate espionage, supply chain disruption, phishing, and hardware/software attacks such as SSL and DoS. However, as discussed in Chapter 4, social media threats can originate from almost anywhere and quickly challenge a company’s traditional IT security policy. Unethical hackers now have much more nefarious designs when launching their attacks. This chapter builds on the previous chapter by looking specifically at
The dangers of social media and the importance of encryption
Cyberstalking and corporate cyberstalking
Validating the end user
Data scraping