You are previewing Securing the Clicks: Network Security in the Age of Social Media.
O'Reilly logo
Securing the Clicks: Network Security in the Age of Social Media

Book Description

Defend against corporate espionage launched from social networks

Protect your organization from devastating social media attacks with instruction from a team of information security experts. Securing the Clicks: Network Security in the Age of Social Media explains the latest threats along with detailed fixes, best practices, and "from the headlines" case studies. Find out how to analyze risk, implement robust security protocols, and enforce social media usage policies. Regulatory compliance, online reputation management, and incident response are also covered in this comprehensive volume.

• Assess your global social media presence and identify vulnerabilities

• Establish solid security policies at every level of your organization

• Allocate resources for planning, administration, and corrective action

• Monitor usage by employees, clients, competitors, and the public

• Block cyberstalking. phishing, malware, and identity theft exploits

• Guard intellectual property rights, trademarks, copyrights, and logos

• Preserve your brand image using online reputation management tools

Gary Bahadur is the founder and CEO of KRAA Security [], which protects organizations from threats through a combination of prevention services. He was the cofounder and CIO of Foundstone, Inc.

Jason Inasi is CEO and cofounder of The Factory Interactive {], a digital design and marketing agency, and president of Inasi Group, an international, multidisciplinary, technology advisory firm.

Alex de Carvalho is vice president of business development and community at VoxMed, cofounder of The Startup Forum, director of social media at Medimix International, and adjunct professor of social media at the University of Miami.

Table of Contents

  1. Title Page
  2. Copyright Page
  3. Dedication
  4. About the Authors
  5. Contents at a Glance
  6. Contents
  7. Foreword
  8. Introduction
  9. Part I Assessing Social Media Security
    1. Chapter 1 The Social Media Security Process
      1. Case Study: Reputation Damage from an Unprepared Social Media Strategy
      2. How Security Has Changed in the Recent Past
      3. The Assessment Process
      4. Organizational Analysis: Your Industry Online, the Good and the Bad
      5. Competitive Analysis
      6. Wrap Up
    2. Chapter 2 Security Strategy Analysis: Foundation of Your Security Policy
      1. Case Study: Hacking Is an Equal Opportunity Sport
      2. The H.U.M.O.R. Matrix
      3. Human Resources
      4. Utilization of Resources and Assets
      5. Monetary Considerations
      6. Operations Management
      7. Reputation Management
      8. Wrap Up
    3. Chapter 3 Monitoring in the Social Media Landscape
      1. Case Study: A Dangerous Public
      2. What Are Your Customers and the General Public Saying?
      3. What Are Your Employees Saying?
      4. The “What If” Scenario
      5. Wrap Up
  10. Part II Assessing Social Media Threats
    1. Chapter 4 Threat Assessment
      1. Case Study: Political Hacking
      2. The Changing Threat Landscape
      3. Identifying the Threats
      4. Threat Assessment and the Threat Management Lifecycle
      5. H.U.M.O.R. Threat Assessment
      6. Assessing Damage
      7. Developing a Response
      8. Wrap Up
    2. Chapter 5 What Can Go Wrong
      1. Case Study: Firesheep, A Real-World Example of Social Media Hacking
      2. Dangers Specific to Social Networks
      3. Cyberstalking
      4. Validating the End User
      5. Data Scraping
      6. Wrap Up
  11. Part III Operations, Policies, & Processes
    1. Chapter 6 Social Media Security Policy Best Practices
      1. Case Study: Growth of Social Media Policy Usage
      2. What Is an Effective Social Media Security Policy?
      3. H.U.M.O.R. Guidelines
      4. Developing Your Social Media Security Policy
      5. A Sample Social Media Security Policy
      6. Wrap Up
    2. Chapter 7 Human Resources: Strategy & Collaboration
      1. Case Study: “Expensive Paperweight” Gets Fired
      2. Identifying Business Processes, Regulations, and Legal Requirements
      3. The Community Manager: Defining and Implementing
      4. Training
      5. Wrap Up
    3. Chapter 8 Utilization of Resources: Strategy & Collaboration
      1. Case Study: Inappropriate Tweets
      2. How Are Security Processes Handled?
      3. Preventing Data Loss
      4. Educating Employees
      5. Wrap Up
    4. Chapter 9 Monetary Considerations: Strategy & Collaboration
      1. Case Study: Calculating the Cost of Data Loss
      2. Costs of Implementing Controls
      3. Costs of Threats and Countermeasures
      4. Wrap Up
    5. Chapter 10 Operations Management: Strategy & Collaboration
      1. Case Study: Military Cyberprofiles
      2. Operations Management Strategy
      3. Controls Auditing
      4. Wrap Up
    6. Chapter 11 Reputation Management: Strategy & Collaboration
      1. Case Study: Domino’s Reputation Attack
      2. Attempts to Ruin Brand Equity: From Logos to Brands
      3. Actively Managing Your Reputation
      4. Zen and the Art of Social Media Strategy
      5. Who Do You Call in a Crisis?
      6. Reducing Reputation Risks with Incident Management
      7. Wrap Up
  12. Part IV Monitoring & Reporting
    1. Chapter 12 Human Resources Monitoring & Reporting
      1. Case Study: Facebook Posting Leads to Firing
      2. Monitoring by Human Resources
      3. How to Monitor Employee Usage
      4. How to Use Social Media to Monitor Prospective Employees
      5. Baseline Monitoring and Reporting Requirements
      6. Policy Management
      7. Wrap Up
    2. Chapter 13 Utilization Monitoring & Reporting
      1. Case Study: How Not to Respond
      2. Who, What, Where, When, and How?
      3. Technology
      4. Intellectual Property
      5. Copyright
      6. Incident Management
      7. Reporting Metrics
      8. Wrap Up
    3. Chapter 14 Monetary Monitoring & Reporting
      1. Case Study: The Budgetary Challenge
      2. Social Media Security on a Limited Budget
      3. Social Media Security on a Big Budget
      4. Training Costs
      5. Wrap Up
    4. Chapter 15 Operations Management Monitoring & Reporting
      1. Case Study: Social Media Success
      2. Types of Monitoring to Ensure Security Practices Are Followed
      3. Data Loss Management: Tools and Practices
      4. Monitoring and Management Tools
      5. Tracking Employee Usage
      6. Wrap Up
    5. Chapter 16 Reputation Management Monitoring & Reporting
      1. Case Study: Uncontrolled Reputation Damage
      2. Online Reputation Management
      3. Setting Up a Monitoring System
      4. Establishing a Baseline and Comparing Historical Periods
      5. How to Make Good Use of Reputation Information
      6. Wrap Up
  13. Part V Social Media 3.0
    1. Chapter 17 Assessing Your Social Media Strategy
      1. How JAG’s Doing
      2. The Challenges Ahead
      3. Active Reputation Management
      4. Wrap Up
    2. Chapter 18 The Future of Social Media Security
      1. The Internet of Things
      2. Evolving Threats to the “Global Brain”
      3. The Best Defense Is a Good Offense
      4. Jumping into the Deep End
      5. Wrap Up
  14. Appendix Resource Guide
  15. Index