|
Review: "Delivers practical security advice on a range of issues."
Internet Works
Description: The web is an exciting but unstable place to do business. The potential rewards are high but so are the risks, and the effective management of these risks is likely to be the greatest business enabler/destroyer of the next decade.
Risk to e-business activities comes in many forms “ fraud, espionage, viruses, spamming, denial of service “ and the potential for damage or irretrievable loss is very real. Information security is no longer an issue confined to the IT department; it is critical to all operational functions and departments within an organization. Nor are the solutions purely technical “ given that two “ thirds of security breaches are caused by human error, management controls and processes are equally important.
The Secure Online Business Handbook is a practical guide for managers in developing and implementing appropriate strategies of online risk management. The contributions draw on a wide range of expertise and know-how, both in IT and in other disciplines such as the law, insurance accounting and consulting. Topics covered include:
recent attack trends ¢ phishing and e-mail fraud ¢ web protection ¢ network vulnerabilities ¢ online payments ¢ software protection ¢ firewalls and viruses ¢ operational management ¢ countering cyber crime ¢ information security training ¢ contingency planning ¢ data recovery and forensics.
Security should not be an afterthought in developing a strategy. It is an integral part of setting up new channels of communication and business - ignore it at your peril!
Contents
Part 1: Information at risk: The information security management system ¢ The business case for IT security ¢ Recent attack trends ¢ The fine art of elephant husbandry - a practical guide to patch management ¢ Gone phishing ¢ The marketing dimension ¢ Part 2: Points of exposure: Web security ¢ Broadband ¢ Don`t indulge in unprotected wireless ¢ No phishing: protecting employees from e-mail fraud ¢ Network vulnerabilities ¢ Wireless applications ¢ Protecting online privacy ¢ Online payments: key areas of exposure ¢ The spy that came in from the cold ¢ Part 3: Software protection: Firewalls ¢ Viruses ¢ Authentication and encryption ¢ Digital signatures ¢ Biometrics ¢ From ˜Made in Hollywood` to` Appearing in your local car boot sale`a piracy and the business of digital entertainment ¢ Keeping on the right side of the law ¢ Part 4: Operational management: Flow clearing: financial supply chain management ¢ Developing a culture of security in the workplace ¢ Security as standard ¢ Converged security ” why manage three when one will do? ¢ Countering cybercrime: risk management ¢ Countering cybercrime ¢ Centralized security management ¢ Electronic contracting ¢ lnformation security training ¢ Outsourced solutions ¢ Securing the mobile workforce ¢ Part 5: Contingency planning: Business continuity and crisis management ¢ Dealing with the risks of peer- to-peer ¢ Data recovery ¢ Crisis or disaster management ¢ Forensics ¢ Forensic investigation
About the Editor: Jonathan Reuvid is an economist and was formerly engaged in investment banking, general management of a Fortune 500 multinational and business development in China. He now works as a consultant editor and is the author of a number of corporate business titles published by Kogan Page, including Managing Business Risk and The Corporate Finance Handbook.
Target Audience: IT professionals, students of computer science & management
Special prices are applicable to the authorised sales territory only. Prices are subject to change without prior notice. ISBN 9780749449087
|
|
Pages : 240
|