Wrap Up

Threat assessment is the first step in defending the company from attacks. If you do not know what form an attack is taking, you won’t be able to defend yourself. Having a logical process in place to identify the threat, the danger it poses to the company, how it can be exploited, and how the company will respond is critical to providing a secure environment, whether defending against traditional hacker attackers or social media attacks.

Improvement Checklist

image Can you identify the methods by which threats can be launched against your company?

Can you identify who is launching an attack?

Can you determine what damage may occur from a social ...

Get Securing the Clicks Network Security in the Age of Social Media now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.