© The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature 2023
S. J. NielsonDiscovering Cybersecurityhttps://doi.org/10.1007/978-1-4842-9560-1_10

10. Overlay Security: Email and Social Media

Seth James Nielson1  
(1)
Austin, TX, USA
 
Chapter Quick Start Guide

The rich infrastructure of the Internet and the World Wide Web allows us to build semantic communications networks that operate at a more abstract level. In this chapter, we’ll discuss email and social media, two kinds of overlay networks that allow communications between individuals and organizations. Similar security principles apply here, but because these networks also present unique security challenges.

Key Concepts

  1. 1.

    An overlay network allows communication ...

Get Discovering Cybersecurity: A Technical Introduction for the Absolute Beginner now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.