Discover millions of ebooks, audiobooks, and so much more with a free trial

Only $11.99/month after trial. Cancel anytime.

How to Use Web 2.0 and Social Networking Sites Securely: A Pocket Guide
How to Use Web 2.0 and Social Networking Sites Securely: A Pocket Guide
How to Use Web 2.0 and Social Networking Sites Securely: A Pocket Guide
Ebook97 pages1 hour

How to Use Web 2.0 and Social Networking Sites Securely: A Pocket Guide

Rating: 0 out of 5 stars

()

Read preview

About this ebook

This pocket guide tells you the steps your organisation should take to ensure that your employees are using Web 2.0 sites in a secure manner, and that your confidential corporate data is protected.

LanguageEnglish
Publisheritgovernance
Release dateJan 15, 2009
ISBN9781849281140
How to Use Web 2.0 and Social Networking Sites Securely: A Pocket Guide
Author

Alan Calder

Alan Calder is a leading author on IT governance and information security issues. He is the CEO of GRC International Group plc, the AIM-listed company that owns IT Governance Ltd. Alan is an acknowledged international cyber security guru. He has been involved in the development of a wide range of information security management training courses that have been accredited by the International Board for IT Governance Qualifications (IBITGQ). He is a frequent media commentator on information security and IT governance issues, and has contributed articles and expert comment to a wide range of trade, national and online news outlets.

Read more from Alan Calder

Related to How to Use Web 2.0 and Social Networking Sites Securely

Related ebooks

Security For You

View More

Related articles

Reviews for How to Use Web 2.0 and Social Networking Sites Securely

Rating: 0 out of 5 stars
0 ratings

0 ratings0 reviews

What did you think?

Tap to rate

Review must be at least 10 words

    Book preview

    How to Use Web 2.0 and Social Networking Sites Securely - Alan Calder

    978-1-849281-14-0

    FOREWORD

    At its simplest, Web 2.0 is the term used to describe the second generation of web technologies, including social networking sites, blogs and wikis, all of which enable the Web to be used in a different, more interactive way than before. These technologies also enable users to connect with a very large number of people in a short period of time at low cost.

    The use of Web 2.0 technologies has also spawned new business models and enabled improved collaboration, knowledge sharing and communication within organisations.

    At the same time, however, Web 2.0 technologies bring greater security risks for their fast growing universe of users. The number of risks is also growing exponentially. The challenge for businesses, therefore, is to find ways of enabling their users to use Web 2.0 technologies whilst minimising the risks.

    Given the widespread use of Web 2.0 technologies and their impact in terms of the number and types of incidents and the cost of them, controlling Web 2.0 risks needs to be a high priority for all organisations. This pocket guide provides recommendations for organisations that will help them ensure that their employees are using Web 2.0 sites in a secure manner, and that their personal and confidential corporate data is protected.

    CONTENTS

    INTRODUCTION

    At its simplest, Web 2.0 is the term used to describe the second generation of Web technologies, including social networking sites, blogs and wikis, which enable the Web to be used in a different, more interactive way than before. These technologies enable activities such as online networking, user involvement, creativity and online collaboration. The technologies also enable users to connect with a very large number of people in a short period of time at low cost.

    The combination of newer technologies such as Ajax and CSS has enabled some websites those described as Web 2.0 sites to feature enhanced functionality, better storage of data and a richer user interface. For example, the Google maps application provides much detail of information, together with a rich interface where the page and the map are refreshed instantly as the cursor is moved.

    The use of Web 2.0 technologies has also spawned new business models and enabled improved collaboration, knowledge sharing and communication within organisations.

    At the same time, however, Web 2.0 technologies bring greater security risks for their fast growing universe of users. The number of risks is also growing exponentially. A report carried out by ScanSafe in July 2008 showed that there was more web-based malware in July 2008 than in the whole of 2007¹. Not only that, but the amount of malware reported in October 2008 exceeded that of July 2008 by 21%.

    The challenge for businesses, therefore, is to find ways of enabling their users to use Web 2.0 technologies whilst minimising the risks.

    Mary Landesman, Senior Security Researcher at ScanSafe points to three reasons for the increasing number of security risks associated with Web 2.0 technologies²:

    1 The maturity of Web 2.0 and the sheer number of websites and inexperienced people who are able to put up websites.

    2 Automated tools that allowed for discovery of vulnerable web servers and sites. Attackers no longer have to manually probe for vulnerable targets that are slow, inefficient and exposed the attacker to discovery.

    3 Exploit frameworks available in the public sector. These are pre-built with exploits that

    ¹ ‘Web-borne malware targets unexpected industries’, Neil Roiter, SearchSecurity.com, 13 November 2008, http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1338866,00.html.

    ² ‘Web-borne malware targets unexpected in industires’, Neil Roiter, SearchSecurity.com, 13 November 2008, http://searchsecurity.techtarget.com/news/article/0,289142,sid14_gci1338866,00.html

    make it easy

    Enjoying the preview?
    Page 1 of 1