Seven Deadliest Social Network Attacks
By Carl Timm and Richard Perez
()
About this ebook
Seven Deadliest Social Network Attacks describes the seven deadliest social networking attacks and how to defend against them. This book pinpoints the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, and provides a comprehensive view into how such attacks have impacted the livelihood and lives of adults and children. It lays out the anatomy of these attacks, including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable.
The book is separated into seven chapters, with each focusing on a specific type of attack that has been furthered with social networking tools and devices. These are: social networking infrastructure attacks; malware attacks; phishing attacks; Evil Twin Attacks; identity theft; cyberbullying; and physical threat. Each chapter takes readers through a detailed overview of a particular attack to demonstrate how it was used, what was accomplished as a result, and the ensuing consequences. In addition to analyzing the anatomy of the attacks, the book offers insights into how to develop mitigation strategies, including forecasts of where these types of attacks are heading.
This book can serve as a reference guide to anyone who is or will be involved in oversight roles within the information security field. It will also benefit those involved or interested in providing defense mechanisms surrounding social media as well as information security professionals at all levels, those in the teaching profession, and recreational hackers.
- Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally
- Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how
- Institute countermeasures, don’t be caught defenseless again, and learn techniques to make your computer and network impenetrable
Carl Timm
Carl Timm is the Regional Director of Security for Savvis, Inc. As Regional Director of Security, Mr. Timm is responsible for keeping up-to-date on security threats businesses experience and finding solutions that mitigate the threats. Mr. Timm has worked in the Information Security area for over 16 years providing security and IT governance consulting services for fortune 500 companies. Mr. Timm is also an industry recognized author, having authored multiple books on the topics of security and networking. Mr. Timm holds multiple industry certifications including the CCIE and PMP.
Related to Seven Deadliest Social Network Attacks
Related ebooks
Seven Deadliest Network Attacks Rating: 3 out of 5 stars3/5Seven Deadliest Web Application Attacks Rating: 0 out of 5 stars0 ratingsSnort Intrusion Detection 2.0 Rating: 4 out of 5 stars4/5Protect Your Personal Information Rating: 0 out of 5 stars0 ratingsUnified Communications Forensics: Anatomy of Common UC Attacks Rating: 4 out of 5 stars4/5Network Attacks and Exploitation: A Framework Rating: 4 out of 5 stars4/5Web Application Vulnerabilities: Detect, Exploit, Prevent Rating: 0 out of 5 stars0 ratingsSeven Deadliest Unified Communications Attacks Rating: 0 out of 5 stars0 ratings8 Steps to Better Security: A Simple Cyber Resilience Guide for Business Rating: 0 out of 5 stars0 ratingsProfessional Penetration Testing: Volume 1: Creating and Learning in a Hacking Lab Rating: 4 out of 5 stars4/5Mobile Malware Protection Third Edition Rating: 0 out of 5 stars0 ratingsAVIEN Malware Defense Guide for the Enterprise Rating: 0 out of 5 stars0 ratingsMobile Malware Infringement and Detection Rating: 0 out of 5 stars0 ratingsSeven Deadliest USB Attacks Rating: 0 out of 5 stars0 ratingsCracking the Fortress: Bypassing Modern Authentication Mechanism Rating: 0 out of 5 stars0 ratings#HACKED: 10 Practical Cybersecurity Tips to Help Protect Personal or Business Inform Rating: 0 out of 5 stars0 ratingsNessus, Snort, and Ethereal Power Tools: Customizing Open Source Security Applications Rating: 0 out of 5 stars0 ratingsThe Antivirus Hacker's Handbook Rating: 0 out of 5 stars0 ratingsMetasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research Rating: 0 out of 5 stars0 ratingsPractical Malware Prevention Rating: 0 out of 5 stars0 ratingsSoftware Security For You Rating: 0 out of 5 stars0 ratingsPenetration Testing: Protecting networks and systems Rating: 0 out of 5 stars0 ratingsContemporary Digital Forensic Investigations of Cloud and Mobile Applications Rating: 0 out of 5 stars0 ratingsLearning iOS Penetration Testing Rating: 0 out of 5 stars0 ratingsOffensive Security Web Expert A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsMobile Malware Attacks and Defense Rating: 5 out of 5 stars5/5CEH v9: Certified Ethical Hacker Version 9 Study Guide Rating: 0 out of 5 stars0 ratingsWarDriving and Wireless Penetration Testing Rating: 5 out of 5 stars5/5Ethical Hacking and Computer Securities for Beginners Rating: 0 out of 5 stars0 ratings
Crime & Violence For You
Bloodbath Nation Rating: 3 out of 5 stars3/5Homicide: A Year on the Killing Streets Rating: 4 out of 5 stars4/5Gavin de Becker’s The Gift of Fear Survival Signals That Protect Us From Violence | Summary Rating: 4 out of 5 stars4/5Dreamland: The True Tale of America's Opiate Epidemic Rating: 4 out of 5 stars4/5Chasing the Scream: The Inspiration for the Feature Film "The United States vs. Billie Holiday" Rating: 4 out of 5 stars4/5Slenderman: Online Obsession, Mental Illness, and the Violent Crime of Two Midwestern Girls Rating: 4 out of 5 stars4/5They Thought They Were Free: The Germans, 1933–45 Rating: 4 out of 5 stars4/5The Madness of Crowds: Gender, Race and Identity Rating: 4 out of 5 stars4/5Ordinary Men: Reserve Police Battalion 101 and the Final Solution in Poland Rating: 4 out of 5 stars4/5No Visible Bruises: What We Don’t Know About Domestic Violence Can Kill Us Rating: 5 out of 5 stars5/5Evidence of Love: A True Story of Passion and Death in the Suburbs Rating: 4 out of 5 stars4/5Batman and Psychology: A Dark and Stormy Knight (2nd Edition) Rating: 0 out of 5 stars0 ratingsOn Killing: The Psychological Cost of Learning to Kill in War and Society Rating: 4 out of 5 stars4/5The Devil You Know: Encounters in Forensic Psychiatry Rating: 4 out of 5 stars4/5Regarding the Pain of Others Rating: 4 out of 5 stars4/5The New Jim Crow Study Guide and Call to Action Rating: 5 out of 5 stars5/5No Stone Unturned: The True Story of the World's Premier Forensic Investigators Rating: 4 out of 5 stars4/5The Man from the Train: The Solving of a Century-Old Serial Killer Mystery Rating: 4 out of 5 stars4/5Worse Than Slavery Rating: 4 out of 5 stars4/5And The Mountains Echoed Rating: 2 out of 5 stars2/5Murder at McDonald's: The Killers Next Door Rating: 4 out of 5 stars4/5Whoever Fights Monsters: My Twenty Years Tracking Serial Killers for the FBI Rating: 4 out of 5 stars4/5The Enigma of Ted Bundy: The Questions and Controversies Surrounding America's Most Infamous Serial Killer Rating: 5 out of 5 stars5/5Lost Girls: The Unsolved American Mystery of the Gilgo Beach Serial Killer Murders Rating: 4 out of 5 stars4/5The Least of Us: True Tales of America and Hope in the Time of Fentanyl and Meth Rating: 4 out of 5 stars4/5Death Row, Texas: Inside the Execution Chamber Rating: 4 out of 5 stars4/5Manson: The Life and Times of Charles Manson Rating: 4 out of 5 stars4/5Tell Your Children: The Truth About Marijuana, Mental Illness, and Violence Rating: 3 out of 5 stars3/5House of Secrets Rating: 4 out of 5 stars4/5
Reviews for Seven Deadliest Social Network Attacks
0 ratings0 reviews