Cargando…

How to use Web 2.0 and social networking sites securely /

Given the widespread use of Web 2.0 technologies and their impact in terms of the number and types of incidents and the cost of them, controlling Web 2.0 risks needs to be a high priority for all organisations. This pocket guide provides recommendations for organisations that will help them ensure t...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: IT Governance (Organization). Research Team
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Ely, U.K. : IT Governance Pub., ©2009.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)
Tabla de Contenidos:
  • HOW TO USE WEB 2.0 AND SOCIAL NETWORKING SITES SECURELY; INTRODUCTION; CHAPTER 1: WEB 2.0 THREATS; Malware and blended attacks; Hacking attacks; Phishing; Social engineering; Loss of productivity; Reputational risk; CHAPTER 2: PROTECTING ORGANISATIONS FROM RISK; Introducing policies and staff awareness training; Protecting an organisation from reputational risk; Checking a commercial website's credentials; Filtering; Vulnerability management; APPENDIX A: GLOSSARY; APPENDIX B: SOCIAL NETWORKING SCREENSHOTS; ITG RESOURCES; Pocket Guides; Toolkits; Best Practice Reports; Training and Consultancy.