0%

Book Description

This pocket guide tells you the steps your organisation should take to ensure that your employees are using Web 2.0 sites in a secure manner, and that your confidential corporate data is protected.

Table of Contents

  1. Copyright
  2. Foreword
  3. Introduction
  4. 1. Web 2.0 Threats
    1. Malware and blended attacks
    2. Hacking attacks
      1. SQL injection attacks
      2. Cross-site scripting
      3. Cookie theft
      4. Keystroke logging
      5. Screen scraping
      6. Denial of service
      7. Threats from downloaded content
    3. Phishing
    4. Social engineering
    5. Loss of productivity
      1. Data leakage
      2. The different types of personal and company data and associated risks
        1. Name and e-mail address
        2. General personal data
        3. Bank account information
        4. Date of birth/mother’s maiden name
        5. CVs and professional homepages
      3. The volume of personal and company data stored on the Internet
      4. Length of time personal and company data is stored on the Internet
      5. Subsequent uses of personal and company data
      6. Personal and company profiles and the broad meaning of ‘friends’
        1. The concept of ‘friends’
    6. Reputational risk
  5. 2. Protecting Organisations from Risk
    1. Introducing policies and staff awareness training
    2. Protecting an organisation from reputational risk
    3. Checking a commercial website’s credentials
      1. Privacy policies
      2. Privacy seals
    4. Filtering
    5. Vulnerability management
  6. A. Glossary
  7. B. Social Networking Screenshots
    1. Facebook
  8. ITG Resources
    1. Pocket Guides
    2. Toolkits
    3. Best Practice Reports
    4. Training and Consultancy
    5. Newsletter
18.223.21.5