Copyright
Acquiring Editor:Chris Katsaropoulos
Editorial Project Manager:Benjamin Rearick
Project Manager:Malathi Samayan
Designer:Matthew Limbert
Syngress is an imprint of Elsevier
225 Wyman Street, Waltham, MA 02451, USA
2014 Elsevier Inc. All rights reserved
No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or any information storage and retrieval system, without permission in writing from the publisher. Details on how to seek permission, further information about the Publishers permissions policies and our arrangements with organizations such as the Copyright Clearance Center and the Copyright Licensing Agency, can be found at our website: www.elsevier.com/permissions.
This book and the individual contributions contained in it are protected under copyright by the Publisher (other than as may be noted herein).
Notices
Knowledge and best practice in this field are constantly changing. As new research and experience broaden our understanding, changes in research methods or professional practices, may become necessary. Practitioners and researchers must always rely on their own experience and knowledge in evaluating and using any information or methods described here in. In using such information or methods they should be mindful of their own safety and the safety of others, including parties for whom they have a professional responsibility.
To the fullest extent of the law, neither the Publisher nor the authors, contributors, or editors, assume any liability for any injury and/or damage to persons or property as a matter of products liability, negligence or otherwise, or from any use or operation of any methods, products, instructions, or ideas contained in the material herein.
Library of Congress Cataloging-in-Publication Data
Cross, Michael, 1965
Social media security: leveraging social networking while mitigating risk / Michael Cross.
pages cm
Includes bibliographical references and index.
ISBN 978-1-59749-986-6 (pbk.)
1. Social media--Security measures. 2. Online social networks--Security measures. 3. Risk management--Social aspects. 4. Computer security. I. Title.
HM742.C77 2013
005.8--dc23
2013036147
British Library Cataloguing-in-Publication Data
A catalogue record for this book is available from the British Library
For information on all Syngress publications, visit our website at store.elsevier.com/Syngress
ISBN: 978-1-59749-986-6
Printed and bound in the United States of America
14 15 16 13 12 11 10 9 8 7 6 5 4 3 2 1
Acknowledgements
This book is gratefully dedicated to my wife and children, who were unbelievably supportive and helpful in making this possible. As I completed the chapters, my wife read them and provided the perspective of a reader who wants to know how to use social media effectively and securely. At the time this book comes out, my wife Jennifer and I will have been together 20 years. I love her as much today as when we first got together, and anyone who knows her can understand why.
We have three children that are full of ideas and dreams, and have no reservations in sharing them. Throughout this book, each of them showed their interests and individuality, and contributed their own suggestions. Sara at age 10 showed her compassion for others, offered insights into the concerns children have about cyberbullying and online harassment, and took interest reading the sections on those topics. Jason at age 8 showed his love of technology and how things work, but still managed to surprise me when he offered suggestions about adding information on hacking. Emily at age 7 shared her independence and thoughts on protecting others, proposing I add information on blocking users and sites. Rather than being upset about how little they saw me as I worked on the book, they found their own ways to become a part of it.
About the Author
Michael Cross is a SharePoint Administrator and Developer, and has worked in the areas of software development, Web design, hardware installation/repairs, database administration, graphic design, and network administration. Working for law enforcement, he is part of an Information Technology team that provides support to over 1000 civilian and uniformed users. His theory is that when the users carry guns, you tend to be more motivated in solving their problems.
Michael has a diverse background in technology. He was the first computer forensic analyst for a local police service, and performed digital forensic examinations on computers involved in criminal investigations. Over five years, he recovered and examined evidence involved in a wide range of crimes, inclusive to homicides, fraud, and possession of child pornography. In addition to this, he successfully tracked numerous individuals electronically, as in cases involving threatening email. He has consulted and assisted in numerous cases dealing with computer-related/Internet crimes and served as an expert witness on computers for criminal trials. In 2007, he was awarded a Police Commendation for the work he did in developing a system to track local high-risk offenders and sexual offenders.
With extensive experience in Web design and Internet-related technologies, Michael has created and maintained numerous Web sites and implementations of Microsoft SharePoint. This has included public Web sites, private ones on corporate intranets, and solutions that integrate them. In doing so, he has incorporated and promoted social networking features, created software to publish press releases online, and developed a wide variety of solutions that make it easier to get work done.
Michael has been a freelance writer and technical editor on over four dozen IT-related books, as well as writing material for other genres. He previously taught as an instructor and has written courseware for IT training courses. He has also made presentations on Internet safety, SharePoint, and other topics related to computers and the Internet. Despite his experience as a speaker, he still finds his wife wont listen to him.
Over the years, Michael has acquired a number of certifications from Microsoft, Novell, and CompTIA, including MCSE, MCP+I, CNA, and Network+. When he isnt writing or otherwise attached to a computer, he spends as much time as possible with the joys of his life: his lovely wife Jennifer, darling daughter Sara, adorable daughter Emily, and charming son Jason.
For the latest information on him, his projects, and a variety of other topics, you can follow him on Twitter @mybinarydreams, visit his Facebook page at www.facebook.com/mybinarydreams, follow him on LinkedIn at www.linkedin.com/in/mcross1, or read his blog at http://mybinarydreams.wordpress.com.