Skip to Main Content
Information Security Management Handbook, Volume 7, 6th Edition
book

Information Security Management Handbook, Volume 7, 6th Edition

by Richard O'Hanley, James S. Tiller
August 2013
Intermediate to advanced content levelIntermediate to advanced
434 pages
15h 17m
English
Auerbach Publications
Content preview from Information Security Management Handbook, Volume 7, 6th Edition
Hacktivism ◾  329
and analysis focusing on international affairs using traditional media, open source monitor-
ing, and human intelligence (HUMINT) gathering to collect the information they use in their
analysis (Stratfor, n.d.). e company had to launch a massive campaign regarding the incident,
including an open message to Stratfor’s current and future clients regarding the incident. Stratfor’s
president, George Friedman also explains in the announcement that some of the messages which
were released could be fraudulent or have been altered. One such example are email communica-
tions indicating he had resigned (Hacking News, n.d.).
While most employees feel there is some measure of “privacy” in email communications
between the sender and recipien ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Information Security Management Handbook, Volume 5, 6th Edition

Information Security Management Handbook, Volume 5, 6th Edition

Micki Krause Nozaki, Harold F. Tipton
Information Security for Managers

Information Security for Managers

Michael Workman, Daniel C. Phelps, John N. Gathegi

Publisher Resources

ISBN: 9781466567498