Description

Seven Deadliest Social Network Attacks provides a comprehensive view into how social networking attacks have impacted the livelihood and lives of adults and children. The book is separated into seven chapters, with each focusing on a specific type of attack that has been furthered through the use of social networking tools and devices. These are: (i) social networking infrastructure attacks; (ii) malware attacks; (iii) phishing attacks; (iv) Evil Twin Attacks; (v) identity theft; (vi) cyberbullying; and (vii) physical threat. Each chapter takes readers through a comprehensive overview of a particular attack to demonstrate how it was used, what was accomplished as a result, and the ensuing consequences. Alongside examining the anatomy of the attacks, insight will be gained into how to develop mitigation strategies, including forecasts of where these types of attacks are heading. This book can serve as a reference guide to anyone who is or will be involved in oversight roles within the information security field. It will also benefit those involved or interested in providing defense mechanisms surrounding social media as well as information security professionals, those in the teaching profession, and all levels of professional management.

Key Features

  • Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally
  • Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how
  • Institute countermeasures, don’t be caught defenseless again, and learn techniques to make your computer and network impenetrable

Readership

Information security professionals of all levels; recreational hackers

Table of Contents

About the Authors Acknowledgments Introduction Chapter 1 Social Networking Infrastructure Attacks     Bringing the Social Networks to Their Knees          What Happened to the Social Networks?          Distributed Denial-of-Service Attacks          Owning the Social Network          How Could This Happen?     Saving the Social Networks and Ourselves          The Floodgates Have Opened, What Do I Do?          Beating the Bot          Cutting the Strings     Summary Chapter 2 Malware Attacks     Malware Defined          Understanding the Types of Malware     Cross-Site Scripting Explored          Dissecting Cross-Site Scripting     Introducing Cross-Site Request Forgery          Cross-Site Request Forgery Explored     Protecting Yourself          Mitigating Malware          Mitigating Cross-Site Scripting Attacks          Mitigating Cross-Site Request Forgery Attacks     Summary     Endnotes Chapter 3 Phishing Attacks     Phishing Attack Scenarios against Social Networks          What Happened?          How Did It Occur?          What Were the Repercussions?          Phishing Attack against MySpace          Phishing Attack against Twitter     How to Mitigate a Phishing Attack          Take No Immediate Action          Examine the Message          Validate the Source          Take the Offensive          Safeguard Your Computers          Ask for Help     Future Outlook of Phishing Attacks     Summary     Endnotes Chapter 4 Evil Twin Attacks     Evil Twin Attacks Defined          Creating the Evil Twin     Protecting Ourselves and the Ones We Love          Don’t Befriend the Evil Twin          Don’t Become an Evil Twin     Summary     Endnotes Chapter 5 Identity Theft     The Art of Dumpster Diving          Profile of an Identity Thief          How Did Nelson Do It?          Consequences of Stealing Identities     Identity Theft via Facebook          Identity Theft through Social Networking          Clues to How

Details

No. of pages:
192
Language:
English
Copyright:
© 2010
Published:
Imprint:
Syngress
Print ISBN:
9781597495455
Electronic ISBN:
9781597495462

About the authors

Carl Timm

Carl Timm is the Regional Director of Security for Savvis, Inc. As Regional Director of Security, Mr. Timm is responsible for keeping up-to-date on security threats businesses experience and finding solutions that mitigate the threats. Mr. Timm has worked in the Information Security area for over 16 years providing security and IT governance consulting services for fortune 500 companies. Mr. Timm is also an industry recognized author, having authored multiple books on the topics of security and networking. Mr. Timm holds multiple industry certifications including the CCIE and PMP.