Incident Management

As discussed in Chapter 3, the threat landscape is diverse when it comes to social media. A well-thought-out incident response program is necessary to manage this changing landscape. An incident, as it relates to the company’s information assets, can take one of two forms:

image Electronic

image Physical

Electronic incidents range from an attacker or user accessing the network for unauthorized/malicious purposes, to a virus outbreak, to a suspected Trojan or malware infection, to the posting of disparaging comments and lies. Physical incidents ...

Get Securing the Clicks Network Security in the Age of Social Media now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.