Part I Assessing Social Media Security
Chapter 1 The Social Media Security Process
Case Study: Reputation Damage from an Unprepared Social Media Strategy
How Security Has Changed in the Recent Past
Why Follow the Assessment Process?
Organizational Analysis: Your Industry Online, the Good and the Bad
Analyzing Your Social Media Initiatives
Analyzing Your Existing Internal Processes
Securing Channels of Communication
Identifying the Current Gaps in How Your Company Utilizes Social Media Securely
Chapter 2 Security Strategy Analysis: Foundation of Your Security Policy
Case Study: Hacking Is an Equal Opportunity Sport
Assessing the Current Environment
Measuring the Current State: H.U.M.O.R. Matrix
Utilization of Resources and Assets
Assessing the Current Environment
Measuring the Current State: H.U.M.O.R. Matrix
Assessing the Current Environment
Measuring the Current State: H.U.M.O.R. Matrix
Assessing the Current Environment
Measuring the Current State: H.U.M.O.R. Matrix
Assessing the Current Environment
Measuring the Current State: H.U.M.O.R. Matrix
Chapter 3 Monitoring in the Social Media Landscape
Case Study: A Dangerous Public
What Are Your Customers and the General Public Saying?
When to Dedicate Resources to Combating Negative Mentions
Processes to Track the Conversations Leading Up to an Attack
What Are Your Employees Saying?
Part II Assessing Social Media Threats
Threat Assessment and the Threat Management Lifecycle
Case Study: Firesheep, A Real-World Example of Social Media Hacking
Dangers Specific to Social Networks
IT Security Restrictions to Protect Your Networks
Part III Operations, Policies, & Processes
Chapter 6 Social Media Security Policy Best Practices
Case Study: Growth of Social Media Policy Usage
What Is an Effective Social Media Security Policy?
Regulatory and Legal Requirements
Managing In-house (Self-hosted) Applications
Managing Externally Hosted Applications
Codes of Conduct and Acceptable Use
Roles and Responsibilities: The Community Manager
Developing Your Social Media Security Policy
A Sample Social Media Security Policy
Chapter 7 Human Resources: Strategy & Collaboration
Case Study: “Expensive Paperweight” Gets Fired
Identifying Business Processes, Regulations, and Legal Requirements
The Community Manager: Defining and Implementing
Small Companies’ Human Resource Challenges
Medium-Sized Companies’ Human Resource Challenges
Large Companies’ Human Resource Challenges
Chapter 8 Utilization of Resources: Strategy & Collaboration
Case Study: Inappropriate Tweets
How Are Security Processes Handled?
Chapter 9 Monetary Considerations: Strategy & Collaboration
Case Study: Calculating the Cost of Data Loss
Costs of Implementing Controls
Costs of Threats and Countermeasures
Chapter 10 Operations Management: Strategy & Collaboration
Case Study: Military Cyberprofiles
Operations Management Strategy
Application Development and Testing
Auditing Steps for Internal Security Tools and Social Media Sites
Auditing Steps for External Social Media Sites
Chapter 11 Reputation Management: Strategy & Collaboration
Case Study: Domino’s Reputation Attack
Attempts to Ruin Brand Equity: From Logos to Brands
Actively Managing Your Reputation
Contacting Post Authors and Domain Owners
Utilizing Search Engine Optimization
Zen and the Art of Social Media Strategy
When Marketing Campaigns Go Wrong…
Creating Your Own Social Network
Reducing Reputation Risks with Incident Management
Part IV Monitoring & Reporting
Chapter 12 Human Resources Monitoring & Reporting
Case Study: Facebook Posting Leads to Firing
How to Use Social Media to Monitor Prospective Employees
Baseline Monitoring and Reporting Requirements
Chapter 13 Utilization Monitoring & Reporting
Case Study: How Not to Respond
Who, What, Where, When, and How?
Chapter 14 Monetary Monitoring & Reporting
Case Study: The Budgetary Challenge
Social Media Security on a Limited Budget
Social Media Security on a Big Budget
Chapter 15 Operations Management Monitoring & Reporting
Case Study: Social Media Success
Types of Monitoring to Ensure Security Practices Are Followed
Data Loss Management: Tools and Practices
Monitoring and Management Tools
Benefits of Tracking Employee Usage
Dissemination of Policy Changes
Following the Social Media News
Chapter 16 Reputation Management Monitoring & Reporting
Case Study: Uncontrolled Reputation Damage
Reputation Management and Employees
Setting Up a Monitoring System
Establishing a Baseline and Comparing Historical Periods
How to Make Good Use of Reputation Information
Chapter 17 Assessing Your Social Media Strategy
Determine the Implementation Processes
Continuous Changes in Management and Policy
Authentication Systems Are Changing
Brand Attacks Are Hard to Track
Chapter 18 The Future of Social Media Security
Evolving Threats to the “Global Brain”