gogogo
Syndetics cover image
Image from Syndetics

Seven deadliest social network attacks [electronic book] / by Carl Timm, Richard Perez.

By: Contributor(s): Material type: TextTextSeries: Syngress seven deadliest attacks seriesPublication details: Rockland, Mass. : Syngress ; Oxford : Elsevier Science [distributor], 2010.Description: p. cmISBN:
  • 159749545X
  • 9781597495455
Subject(s): Genre/Form: Additional physical formats: No titleOnline resources:
Contents:
Chapter 1: Social Networking Infrastructure Attacks -- Chapter 2: Malware Attacks -- Chapter 3: Phishing Attacks -- Chapter 4: Evil Twin Attacks -- Chapter 5: Identity Theft -- Chapter 6: Cyber Bullying -- Chapter 7: Physical Threats.
Summary: Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Social Networking Infrastructure Attacks Malware Attacks Phishing Attacks Evil Twin Attacks Identity Theft Cyber Bullying Physical Threats Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable.
No physical items for this record

Enhanced descriptions from Syndetics:

Seven Deadliest Social Network Attacks describes the seven deadliest social networking attacks and how to defend against them. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, and provides a comprehensive view into how such attacks have impacted the livelihood and lives of adults and children. It lays out the anatomy of these attacks, including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable.

The book is separated into seven chapters, with each focusing on a specific type of attack that has been furthered with social networking tools and devices. These are: social networking infrastructure attacks; malware attacks; phishing attacks; Evil Twin Attacks; identity theft; cyberbullying; and physical threat. Each chapter takes readers through a detailed overview of a particular attack to demonstrate how it was used, what was accomplished as a result, and the ensuing consequences. In addition to analyzing the anatomy of the attacks, the book offers insights into how to develop mitigation strategies, including forecasts of where these types of attacks are heading.

This book can serve as a reference guide to anyone who is or will be involved in oversight roles within the information security field. It will also benefit those involved or interested in providing defense mechanisms surrounding social media as well as information security professionals at all levels, those in the teaching profession, and recreational hackers.

Chapter 1: Social Networking Infrastructure Attacks -- Chapter 2: Malware Attacks -- Chapter 3: Phishing Attacks -- Chapter 4: Evil Twin Attacks -- Chapter 5: Identity Theft -- Chapter 6: Cyber Bullying -- Chapter 7: Physical Threats.

Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then you need Seven Deadliest Social Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Social Networking Infrastructure Attacks Malware Attacks Phishing Attacks Evil Twin Attacks Identity Theft Cyber Bullying Physical Threats Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable.

Electronic reproduction. Amsterdam : Elsevier Science & Technology, 2010. Mode of access: World Wide Web. System requirements: Web browser. Title from title screen (viewed on May 12, 2010). Access may be restricted to users at subscribing institutions.

Table of contents provided by Syndetics

  • About the Authors (p. ix)
  • Acknowledgments (p. xi)
  • Introduction (p. xiii)
  • Chapter 1 Social Networking Infrastructure Attacks (p. 1)
  • Bringing the Social Networks to Their Knees (p. 1)
  • What Happened to the Social Networks? (p. 2)
  • Distributed Denial-of-Service Attacks (p. 3)
  • Owning the Social Network (p. 8)
  • How Could This Happen? (p. 8)
  • Saving the Social Networks and Ourselves (p. 16)
  • The Floodgates Have Opened, What Do I Do? (p. 16)
  • Beating the Bot (p. 19)
  • Cutting the Strings (p. 21)
  • Summary (p. 21)
  • Chapter 2 Malware Attacks (p. 23)
  • Malware Defined (p. 24)
  • Understanding the Types of Malware (p. 24)
  • Cross-Site Scripting Explored (p. 27)
  • Dissecting Cross-Site Scripting (p. 29)
  • Introducing Cross-Site Request Forgery (p. 33)
  • Cross-Site Request Forgery Explored (p. 35)
  • Protecting Yourself (p. 36)
  • Mitigating Malware (p. 36)
  • Mitigating Cross-Site Scripting Attacks (p. 38)
  • Mitigating Cross-Site Request Forgery Attacks (p. 39)
  • Summary (p. 40)
  • Endnotes (p. 41)
  • Chapter 3 Phishing Attacks (p. 43)
  • Phishing Attack Scenarios against Social Networks (p. 44)
  • What Happened? (p. 47)
  • How Did It Occur? (p. 48)
  • What Were the Repercussions? (p. 48)
  • Phishing Attack against MySpace (p. 51)
  • Phishing Attack against Twitter (p. 51)
  • How to Mitigate a Phishing Attack (p. 55)
  • Take No Immediate Action (p. 56)
  • Examine the Message (p. 57)
  • Validate the Source (p. 57)
  • Take the Offensive (p. 58)
  • Safeguard Your Computers (p. 59)
  • Ask for Help (p. 59)
  • Future Outlook of Phishing Attacks (p. 60)
  • Summary (p. 61)
  • Endnotes (p. 61)
  • Chapter 4 Evil Twin Attacks (p. 63)
  • Evil Twin Attacks Defined (p. 64)
  • Creating the Evil Twin (p. 66)
  • Protecting Ourselves and the Ones We Love (p. 73)
  • Don't Befriend the Evil Twin (p. 73)
  • Don't Become an Evil Twin (p. 74)
  • Summary (p. 81)
  • Endnotes (p. 82)
  • Chapter 5 Identity Theft (p. 83)
  • The Art of Dumpster Diving (p. 83)
  • Profile of an Identity Thief (p. 84)
  • How Did Nelson Do It? (p. 84)
  • Consequences of Stealing Identities (p. 84)
  • Identity Theft via Facebook (p. 85)
  • Identity Theft through Social Networking (p. 85)
  • Clues to How Bryan's Facebook Account Was Hijacked (p. 87)
  • Repercussions of Having Your Facebook ID Stolen from You (p. 88)
  • Methods to Prevent Identity Theft (p. 89)
  • Avoid Password Reusage (p. 90)
  • Have Secondary E-Mail Address Handy (p. 92)
  • Shred Your Documents (p. 92)
  • Limit Your Liability (p. 92)
  • What to Do if Your Identity Is Compromised (p. 93)
  • Freeze All of Your Assets (p. 94)
  • Initiate a Fraud Alert on Your Credit Reports (p. 94)
  • Notify the Local Police (p. 94)
  • Notify the Federal Trade Commission (p. 95)
  • Document and Retain Records! (p. 95)
  • Continuously Monitor Your Credit Report (p. 95)
  • The Future of Identity Theft (p. 96)
  • Summary (p. 97)
  • Endnotes (p. 98)
  • Chapter 6 Cyberbullying (p. 99)
  • Cyberbullying Tragedy of Megan Meier via MySpace (p. 100)
  • Why Was Megan the Target of Cyberbullying? (p. 101)
  • What Was the Outcome of This Tragic Event? (p. 102)
  • How to Deal with Cyberbullying (p. 102)
  • Steps toward Fighting Cyberbullying (p. 103)
  • Cyberbully Tools of the Trade (p. 106)
  • How to Deal with Cyberbullying in the Gaming and Virtual Worlds (p. 107)
  • What to Do about Griefers (p. 108)
  • Workplace Bullying (p. 109)
  • What Can Be Done about Workplace Bullying? (p. 110)
  • What Is the Future of Cyberbullying? (p. 110)
  • Summary (p. 112)
  • Endnotes (p. 112)
  • Chapter 7 Physical Threats (p. 113)
  • Physical Threats against Your Company (p. 114)
  • Bypassing Physical Security Controls (p. 114)
  • Protecting Your Company (p. 116)
  • Physical Threats against Your Person (p. 118)
  • Jasper Howard: Murder and Online Threats (p. 119)
  • Protecting Yourself (p. 120)
  • Take Action (p. 121)
  • Notify the Attacker (p. 121)
  • Notify the Appropriate Authorities (p. 122)
  • Be Open to Suggestions (p. 123)
  • Preventative Measures to Physical Threats (p. 123)
  • Background Checks (p. 124)
  • Future Outlook to Physical Threats on Social Networks (p. 126)
  • Summary (p. 127)
  • Endnotes (p. 129)
  • Index (p. 131)

Author notes provided by Syndetics

Carl Timm is the Regional Director of Security for Savvis, Inc. As Regional Director of Security, Mr. Timm is responsible for keeping up-to-date on security threats businesses experience and finding solutions that mitigate the threats. Mr. Timm has worked in the Information Security area for over 16 years providing security and IT governance consulting services for fortune 500 companies. Mr. Timm is also an industry recognized author, having authored multiple books on the topics of security and networking. Mr. Timm holds multiple industry certifications including the CCIE and PMP.

Powered by Koha