O'Reilly logo

Security Risks in Social Media Technologies by Alan Oxley

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

7

Mitigating the risks of identity theft and malware

Abstract:

In Chapter 4 the security controls are classified according to NIST’s classification – management, technical, and operational. Chapter 7 gives an alternative classification, which shows the relationships between threats and security controls. This classification might be preferable to some readers. The following classification starts by specifying each threat. Under each threat, once again the controls are categorized according to whether they are management, technical, or operational. The list of security controls under each of these categories is then listed. The chapter as a whole does not give a comprehensive breakdown of the threats and applicable security controls but indicates ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required