All
All

Information Security Management Handbook, Sixth Edition, Volume 7

800 KB | 3 files | null DOC,null PDF

Chapter 21 focuses on security and privacy issues associated with social media. As with any technology, along with the good, there is always the harmful.

Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 7 is one of the most comprehensive and up-to-date references available on information security and assurance. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the up-to-date understanding required to stay one step ahead of evolving threats, standards, and regulations.

Reporting on the latest developments in information security and recent changes to the (ISC) CISSP Common Body of Knowledge (CBK®), this volume features 27 new chapters on topics such as BYOD, IT consumerization, smart grids, security, and privacy.

  • Covers the fundamental knowledge, skills, techniques, and tools required by IT security professionals
  • Updates its bestselling predecessors with new developments in information security and the (ISC)CISSP® CBK®
  • Provides valuable insights from leaders in the field on the theory and practice of computer security technology
  • Facilitates the comprehensive and up-to-date understanding you need to stay fully informed

This excerpt from chapter 21 focuses on security and privacy issues associated with social media. As with any technology, along with the good, there is always the harmful. While there are many benefits, there are also many risks and dangers with social media use, most of which can negatively impact all types of businesses.

Excerpted with permission from the publisher, CRC Press, from "Information Security Management Handbook, Sixth Edition, Volume 7," edited by Richard O'Hanley and James S. Tiller. Copyright © 2014.

The attached zip file includes:                                                                                                        

  • Intro Page.pdf
  • Terms and Conditions.pdf
  • SocialMediaChallenges.pdf
IT Downloads help you save time and money while executing essential IT management tasks. Download this useful resource now and put it to work for your business.
Related IT Downloads

Compliance2 Building a GRC Program: Assessing Stakeholder Needs and Readiness

This table outlines the top needs of each stakeholder group that can help guide your conversations on priorities and needs for the GRC program. ...  More >>

Security95 Guide to Cyber Threat Information Sharing

This publication provides guidelines for establishing and participating in cyber threat information sharing relationships. ...  More >>

email9 Trustworthy Email

This document provides recommendations and guidelines for enhancing trust in email, including transmission and content security recommendations. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.