Loading…

How to use Web 2.0 and social networking sites securely /

Given the widespread use of Web 2.0 technologies and their impact in terms of the number and types of incidents and the cost of them, controlling Web 2.0 risks needs to be a high priority for all organisations. This pocket guide provides recommendations for organisations that will help them ensure t...

Full description

Bibliographic Details
Call Number:Libro Electrónico
Corporate Author: IT Governance (Organization). Research Team
Format: Electronic eBook
Language:Inglés
Published: Ely, U.K. : IT Governance Pub., ©2009.
Subjects:
Online Access:Texto completo (Requiere registro previo con correo institucional)
Table of Contents:
  • HOW TO USE WEB 2.0 AND SOCIAL NETWORKING SITES SECURELY; INTRODUCTION; CHAPTER 1: WEB 2.0 THREATS; Malware and blended attacks; Hacking attacks; Phishing; Social engineering; Loss of productivity; Reputational risk; CHAPTER 2: PROTECTING ORGANISATIONS FROM RISK; Introducing policies and staff awareness training; Protecting an organisation from reputational risk; Checking a commercial website's credentials; Filtering; Vulnerability management; APPENDIX A: GLOSSARY; APPENDIX B: SOCIAL NETWORKING SCREENSHOTS; ITG RESOURCES; Pocket Guides; Toolkits; Best Practice Reports; Training and Consultancy.