Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Image

Book Review: Securing the Clicks 19

brothke writes:"The book Digital Assassination: Protecting Your Reputation, Brand, or Business Against Online Attacks says businesses that take days to respond to social media issues are way behind the curve. Social media operates in real-time, and responses need to be almost as quick. In a valuable new book on the topic, Securing the Clicks Network Security in the Age of Social Media, Gary Bahadur, Jason Inasi and Alex de Carvalho provide the reader with a comprehensive overview on how not to be a victim of social media based security problems." Read on for the rest of Ben's review.
Securing the Clicks Network Security in the Age of Social Media
author Gary Bahadur, Jason Inasi and Alex de Carvalho
pages 368
publisher McGraw-Hill Osborne Media
rating 9/10
reviewer Ben Rothke
ISBN 0071769056
summary Definitive guide around social network security
Social media is now mainstream in corporate America, and even though it is hot, the security and privacy issues around it are even hotter. In the past, many firms simply said no to social media at the corporate level. But as Natalie Petouhoff of Weber Shandwick has observed, that will no longer work, as "social media isn't a choice anymore; it's a business transformation tool".

The main security and privacy issue around social media is that users will share huge amounts of highly confidential personal and business information with people they perceive to be legitimate. Besides that, issues such as malware, vulnerabilities (cross site scripting, cross site request forgery, etc.), corporate espionage, phishing, spear phishing and more; are just a few of the many security risks around social media that need to be taken into consideration.

In the book, the authors detail a framework for analyzing the corporate threats that arise from social media. The book uses the H.U.M.O.R methodology (Human resources, Utilization of resources and assets, Monetary considerations, Operations management, Reputation management) a matrix that outlines a systematic approach for developing the necessary security plans, policies and processes to mitigate social media risks.

At 325 pages, the books 5 parts and 18 chapters provide the reader with a comprehensive overview of all of the critical areas around social media secure, that can be used to safeguard its assets and digital rights, in addition to defending their reputation from social network-based attacks. The book covers all of the core topic areas, from assessing social media security, to monitoring in the social media landscape, threat assessments, reputation management: strategy and collaboration and more; the authors provide the reader with an enlightening overview of all of the core areas.

In chapter 1 the authors astutely note that no company today is immune to the many threats posted by a single individual, let alone a socially engaged and networked population. No firm should engage in social media before they fully understand the security and privacy risks that are being introduced. This book not only effectually does that; it also provides an all-inclusive framework around social media security.

As to the notion of the inherent security risks around social media, this was recently proven when Chris Hadnagy (author of Social Engineering: The Art of Human Hacking) and James O'Gorman detailed in their Social Engineering Capture the Flag results from Defcon 19 observed that information leakage via social media is a difficult problem to solve due to how it is used and the frequency it is used in today's society. Having access to social media from computers and cell phones means that people can update their accounts instantaneously, from anywhere. The ease of which an employee can share data can contribute heavily to information leakage.

Chapter 4 on threat assessments provides an exhaustive list of the different types of attackers and threat vectors that need to be considered when using social media. The attacks in the social media space are often different from typical IT attackers. As to threat vectors, there are a number of different vectors, both internal and external that can impact an organization. The chapter lists those vectors and details them.

Chapter 9 – monetary considerations – strategy and collaboration– is a fascinating chapter in that it notes that in many firms, IT security budgets have not yet clearly defined the line item for social media security. In addition, trying to retrofit the IT security budget by assuming that tools already purchased for data loss prevention will also cover social media security concerns will likely be inadequate.

Chapter 11 deals with reputation management – which has the goal to build and protect a positive Internet-based reputation, and not let it get subterfuge via social media. This is a significant issue as the risk to a firm's reputation is significant and growing with the increased use of social networks.

One very helpful feature of the book that effectively brings home the message is numerous real-world case studies in every chapter. One fascinating example in chapter 13 is about the Cooks Source infringement controversy and the nature of how notto respond to a social media issue.

The book also lists numerous amounts of tools. Chapter 13 has a comprehensive list of monitoring tools and the appendix has a list of nearly 100 tools for activity tracking, analytics, geolocation, plagiarism checking and more. These lists are extremely helpful, and the reader can start using many of these tools to get an initial pulse on the level of security around how their firm uses social media.

Chapter 14 provides excellent guidance on how to execute social media security on a limited budget. The authors suggest the use of free or inexpensive software and other resources that can be used to help a company monitor the impact of their social media infrastructure. The chapter also details how social media security can be executed on a bugger budget, via the use of more sophisticated tools that can be used to secure manage the data flows within an organization.

It will not be long until Facebook has its 1 billionth user. Given that a New York court recently referred to a user's reasonable expectation of privacy on sites like Facebook and MySpace as wishful thinking, the importance of Securing the Clicks Network Security in the Age of Social Media can't be overemphasized.

For those firms that are looking to securely use social media, and not get abused by it, this book should be required reading.

Ben Rothke is the author of Computer Security: 20 Things Every Employee Should Know.

You can purchase Securing the Clicks Network Security in the Age of Social Media from amazon.com. Slashdot welcomes readers' book reviews -- to see your own review here, read the book review guidelines, then visit the submission page.

*

This discussion has been archived. No new comments can be posted.

Book Review: Securing the Clicks

Comments Filter:
  • by Anonymous Coward

    that it says "businesses that take days to respond are behind the curve"... but then it was published in book format, which can take months to publish, and days to arrive after someone orders it.

  • hurry up and panic. don't think. just react.
  • This isn't news for nerds. It's a promotion for a marketing guy's book. The post merely summarizes the book and says that it's topic is REALLY REALLY IMPORTANT.

    Book review FAIL. Slashdot FAIL. I miss you taco.
    • And the reviewer's book has the same publisher as this book (McGraw-Hill Osborne Media). How blatantly obvious can a shill be?

      At least Taco would have the decency to not state that the reviewer is also an author...

      • http://en.wikipedia.org/wiki/Shill [wikipedia.org] A shill, plant or stooge is a person who helps a person or organization without disclosing that he or she has a close relationship with that person or organization. Does that fact that he wrote a book for the same publisher constitute ‘a close relationship’? Me thinks no. :::Shill typically refers to someone who purposely gives onlookers the impression that he or she is an enthusiastic independent customer of a seller (or marketer of ideas) that he or she is
    • http://en.wikipedia.org/wiki/Book_review [wikipedia.org] A book review is a form of literary criticism in which a book is analyzed based on content, style, and merit.[1] A book review could be a primary source opinion piece, summary review or scholarly review.[2] It is often carried out in periodicals, as school work, or on the internet. And he did just that. He analyzed and recommended it. What do you want?
  • Misread the book title as "Securing the Chicks" and thought - ooh using nerd skills in the dating game....
    Was a little disappointed.
  • Number of comments is directly proportional to the (quality/subject/summary/intension) of the post.

E = MC ** 2 +- 3db

Working...