Overview
Read this article from a comprehensive knowledge base, updated and supplemented with articles reviewed by scientific committees.
Read the articleAUTHORS
-
Pierre MONGIN: Mind mapping speaker, consultant and author
-
Laurent DELHALLE: Lecturer at Sciences Po Lyon and École de Guerre Économique
INTRODUCTION
To combat cyberattacks effectively, it is crucial to take full advantage of social networks, focusing on the broadest possible cooperation. This collaboration can limit threats and disrupt closed groups.
This fact sheet deals with cyber-attacks and how to reduce them through cooperation with social networks. It proposes concrete solutions for securing corporate and individual data, covering the essential points.
The objectives are as follows:
understand and implement strategies for effective collaboration with social networks ;
identify and monitor threatening closed groups using appropriate methods ;
apply tips for improving digital security through these partnerships;
explore answers to frequently asked questions about cybersecurity cooperation.
Exclusive to subscribers. 97% yet to be discovered!
You do not have access to this resource.
Click here to request your free trial access!
Already subscribed? Log in!

The Ultimate Scientific and Technical Reference
This article is included in
Management and innovation engineering
This offer includes:
Knowledge Base
Updated and enriched with articles validated by our scientific committees
Services
A set of exclusive tools to complement the resources
Practical Path
Operational and didactic, to guarantee the acquisition of transversal skills
Doc & Quiz
Interactive articles with quizzes, for constructive reading
Countering attacks on social networks
Bibliography
Also in our database
Bibliography
DOE John - Cybersecurity and social networks. Éditions Cybersécurité (2020).
Regulations
Law no. 2018-133 of February 26, 2018 on cybersecurity
Websites
Cybermalveillance.gouv's mission is to assist private individuals, companies, associations, local authorities and government agencies who are victims of cyber-malveillance, and to inform them about digital threats and how to protect themselves.
Exclusive to subscribers. 97% yet to be discovered!
You do not have access to this resource.
Click here to request your free trial access!
Already subscribed? Log in!

The Ultimate Scientific and Technical Reference