TAILIEUCHUNG - Security Guide to Social Networks

Threat Discovery Services provides corporatewide traffic threat detection and analysis capabilities via a threat discovery appliance or any VMware-based system. It is deployed out of band at the network layer on the core switch, where it can monitor the stealth techniques being used by modern malware to provide 24 x 7 network monitoring and detection of hidden malware infections. The threat discovery technology detects day-zero infections by leveraging Trend Micro Smart Protection Network and multiple threat analysis engines. By performing in-depth correlation analysis, the technology assembles network traffic packets into single streams. Single-session correlation is performed on . | @ By David Sancho Senior Threat Researcher A Trend Micro White Paper I August 2009 Security Guide to Social Networks @ TABLE OF CONTENTS PRIVACY IN A CONNECTED WORLD DATA MINING IN SOCIAL CREATING LARGE WHEN CODE BEST trend MICRO 2 WHITE PAPER SECURITY GUIDE TO SOCIAL NETWORKS Security Guide to Social Networks INTRODUCTION Social networking sites are websites designed for human interaction. They enable users to meet others keep in touch with them and share experiences feelings and opinions. They are all built on a similar foundation the user builds a network of contacts bound by an element of trust. The user then creates content for his her friends and in turn accesses the content they have created. This content can include such diverse things as holiday pictures interesting links latest news opinions comments and mood updates. The potential for mischief and malicious activities arises when one or more of those contacts breaks your trust. When that happens a number of things can go wrong such as Your contact s account was compromised and somebody else is using it. You added somebody to your network that you thought you knew but in fact you did not. You added somebody you thought was trustworthy but he she turns out not to be. Insufficient use of privacy controls caused you to share data with people you never intended. This document will cover the most common areas of attack using social networks and will recommend ways of minimizing risks. The goal of this paper is not to stop you from participating in social networks but to enable you to use them more safely. TREND MICRO 3 WHITE PAPER SECURITY GUIDE TO SOCIAL .

TỪ KHÓA LIÊN QUAN
TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.