800 KB | 3 files | DOC, PDF
Chapter 21 focuses on security and privacy issues associated with social media. As with any technology, along with the good, there is always the harmful.
Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 7 is one of the most comprehensive and up-to-date references available on information security and assurance. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the up-to-date understanding required to stay one step ahead of evolving threats, standards, and regulations.
Reporting on the latest developments in information security and recent changes to the (ISC)2® CISSP Common Body of Knowledge (CBK®), this volume features 27 new chapters on topics such as BYOD, IT consumerization, smart grids, security, and privacy.
This excerpt from chapter 21 focuses on security and privacy issues associated with social media. As with any technology, along with the good, there is always the harmful. While there are many benefits, there are also many risks and dangers with social media use, most of which can negatively impact all types of businesses.
Excerpted with permission from the publisher, CRC Press, from "Information Security Management Handbook, Sixth Edition, Volume 7," edited by Richard O'Hanley and James S. Tiller. Copyright © 2014.
The attached zip file includes:
This table outlines the top needs of each stakeholder group that can help guide your conversations on priorities and needs for the GRC program. ... More >>
This publication provides guidelines for establishing and participating in cyber threat information sharing relationships. ... More >>
This document provides recommendations and guidelines for enhancing trust in email, including transmission and content security recommendations. ... More >>