CHAPTER 5What Can Go Wrong

Traditional attacks have taken the form of identity theft, corporate espionage, supply chain disruption, phishing, and hardware/software attacks such as SSL and DoS. However, as discussed in Chapter 4, social media threats can originate from almost anywhere and quickly challenge a company’s traditional IT security policy. Unethical hackers now have much more nefarious designs when launching their attacks. This chapter builds on the previous chapter by looking specifically at

image The dangers of social media and the importance of encryption

Cyberstalking and corporate cyberstalking

Validating the end user

Data scraping ...

Get Securing the Clicks Network Security in the Age of Social Media now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.