Securing e-business systems: a guide for managers and executives
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
New York
Wiley
2002
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | Includes bibliographic references and index |
Beschreibung: | XVI, 272 S. Ill. |
ISBN: | 0471072982 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV014640508 | ||
003 | DE-604 | ||
005 | 20030917 | ||
007 | t | ||
008 | 020806s2002 xxua||| |||| 00||| eng d | ||
010 | |a 2002284328 | ||
020 | |a 0471072982 |9 0-471-07298-2 | ||
035 | |a (OCoLC)48931786 | ||
035 | |a (DE-599)BVBBV014640508 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-92 |a DE-522 | ||
050 | 0 | |a HF5548.32 | |
082 | 0 | |a 658.478 |2 21 | |
082 | 0 | |a 658.8/4 |2 21 | |
084 | |a ST 520 |0 (DE-625)143678: |2 rvk | ||
100 | 1 | |a Braithwaite, Timothy |e Verfasser |4 aut | |
245 | 1 | 0 | |a Securing e-business systems |b a guide for managers and executives |c Timothy Braithwaite |
264 | 1 | |a New York |b Wiley |c 2002 | |
300 | |a XVI, 272 S. |b Ill. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Includes bibliographic references and index | ||
650 | 4 | |a Unternehmen | |
650 | 4 | |a Business enterprises |x Computer networks |x Security measures | |
650 | 4 | |a Electronic commerce |x Security measures | |
650 | 4 | |a Internet |x Security measures | |
650 | 0 | 7 | |a Sicherheit |0 (DE-588)4054790-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Electronic Commerce |0 (DE-588)4592128-3 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Electronic Commerce |0 (DE-588)4592128-3 |D s |
689 | 0 | 1 | |a Sicherheit |0 (DE-588)4054790-5 |D s |
689 | 0 | |5 DE-604 | |
856 | 4 | 2 | |m HBZ Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=009942753&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-009942753 |
Datensatz im Suchindex
_version_ | 1804129405487808512 |
---|---|
adam_text | Contents
Preface xiii
Chapter 1 Electronic Business Systems Security 1
Introduction 1
How Is E Business Security Defined? 2
Can E Business Security Be Explained
More Simply? 3
Is E Business Security Really Such a Big Deal? 3
Is E Business Security More Important Than
Other Information Technology Initiatives? 4
How Does an Organization Get Started? 5
Instead of Playing Catch Up, What Should
an Organization Be Doing to Design
E Business Systems That Are Secure in the
First Place? 7
Chapter 2 E Business Systems and Infrastructure
Support Issues 8
Introduction 8
E Business Defined 9
A Short History of E Business Innovations 9
The Need for Secure E Business Systems 14
Software: The Vulnerable Underbelly
of Computing 17
The Interoperability Challenge and
E Business Success 20
E Business Security: An Exercise in Trade Offs 23
Few Systems Are Designed to Be Secure 25
Conclusion 26
Chapter 3 Security Weaknesses in E Business
Infrastructure and Best Practices Security 27
Introduction 27
Fundamental Technical Security Threats 28
The Guiding Principles of Protection 38
Best Practice Prevention, Detection, and
Countermeasures and Recovery Techniques 47
ix
x Contents
Chapter 4 Managing E Business Systems and Security 58
Introduction 58
Part One: Misconceptions and Questionable
Assumptions 60
Part Two: Managing E Business Systems as
a Corporate Asset 69
Part Three: E Business Security Program
Management 97
Chapter 5 A Just in Time Strategy for Securing
the E Business System: The Role for
Security Monitoring and Incident Response 129
The Current State of E Business Security 130
Standard Requirements of an E Business
Security Strategy 132
A New Security Strategy 133
The Crucial Role of Security Monitoring
and Incident Response to the Securing
of E Business Systems 134
The Current State of Intrusion Detection
Systems (IDS) 134
Defining a Cost Effective Security Monitoring
and Incident Response Capability 137
Alternatives to Building Your Own Security
Monitoring and Incident Response Capability 138
Summary 139
Chapter 6 Designing and Delivering Secured
E Business Application Systems 140
Introduction 140
Past Development Realities 145
Contemporary Development Realities 148
Developing Secured E Business Systems 150
Using the SDR Framework 153
Choosing a Systems Development
Methodology That Is Compatible with
the SDR Framework 154
Participants in the Identification of Security and
Integrity Controls 154
Importance of Automated Tools 162
A Cautionary Word About New Technologies 165
Summary and Conclusions 165
x
Contents xi
Chapter 7 Justifying E Business Security and the
Security Management Program 167
Introduction 167
The Quantifiable Argument 169
Emerging Nonquantifiable Arguments 170
Benefits Justifications Must Cover Security
Program Administration 175
Conclusion 177
Chapter 8 Computers, Software, Security, and
Issues of Liability 178
Evolving Theories of Responsibility 178
Likely Scenarios 179
How Might a Liability Case Unfold? 180
Questions to Be Asked to Ensure That
Reasonable Care Has Been Taken in
Developing a Secure E Business System 182
Chapter 9 The National Critical Infrastructure
Protection (CIP) Initiative 187
The Problem of Dependency 187
Critical Infrastructure Protection (CIP) Purpose,
Directives, Organizations, and Relationships 188
Frequently Asked Questions About the IT IS AC 190
Critical Information Infrastructure Protection
Issues that Need Resolution 192
Appendix A: Y2K Lessons Learned and Their
Importance for E Business Security 194
Appendix B: Systems Development Review Framework
for E Business Development Projects 208
Appendix C: A Corporate Plan of Action for Securing
E Business Systems (Sample) 229
Appendix D: E Business Risk Management Review Model
Instructions for Use 251
Appendix E: Resources Guide 262
Index 267
xi
|
any_adam_object | 1 |
author | Braithwaite, Timothy |
author_facet | Braithwaite, Timothy |
author_role | aut |
author_sort | Braithwaite, Timothy |
author_variant | t b tb |
building | Verbundindex |
bvnumber | BV014640508 |
callnumber-first | H - Social Science |
callnumber-label | HF5548 |
callnumber-raw | HF5548.32 |
callnumber-search | HF5548.32 |
callnumber-sort | HF 45548.32 |
callnumber-subject | HF - Commerce |
classification_rvk | ST 520 |
ctrlnum | (OCoLC)48931786 (DE-599)BVBBV014640508 |
dewey-full | 658.478 658.8/4 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.478 658.8/4 |
dewey-search | 658.478 658.8/4 |
dewey-sort | 3658.478 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Informatik Wirtschaftswissenschaften |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01679nam a2200457zc 4500</leader><controlfield tag="001">BV014640508</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20030917 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">020806s2002 xxua||| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2002284328</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0471072982</subfield><subfield code="9">0-471-07298-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)48931786</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV014640508</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-92</subfield><subfield code="a">DE-522</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">HF5548.32</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.478</subfield><subfield code="2">21</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.8/4</subfield><subfield code="2">21</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 520</subfield><subfield code="0">(DE-625)143678:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Braithwaite, Timothy</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Securing e-business systems</subfield><subfield code="b">a guide for managers and executives</subfield><subfield code="c">Timothy Braithwaite</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York</subfield><subfield code="b">Wiley</subfield><subfield code="c">2002</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XVI, 272 S.</subfield><subfield code="b">Ill.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographic references and index</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Unternehmen</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business enterprises</subfield><subfield code="x">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic commerce</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheit</subfield><subfield code="0">(DE-588)4054790-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Electronic Commerce</subfield><subfield code="0">(DE-588)4592128-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Electronic Commerce</subfield><subfield code="0">(DE-588)4592128-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Sicherheit</subfield><subfield code="0">(DE-588)4054790-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HBZ Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=009942753&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-009942753</subfield></datafield></record></collection> |
id | DE-604.BV014640508 |
illustrated | Illustrated |
indexdate | 2024-07-09T19:04:37Z |
institution | BVB |
isbn | 0471072982 |
language | English |
lccn | 2002284328 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-009942753 |
oclc_num | 48931786 |
open_access_boolean | |
owner | DE-92 DE-522 |
owner_facet | DE-92 DE-522 |
physical | XVI, 272 S. Ill. |
publishDate | 2002 |
publishDateSearch | 2002 |
publishDateSort | 2002 |
publisher | Wiley |
record_format | marc |
spelling | Braithwaite, Timothy Verfasser aut Securing e-business systems a guide for managers and executives Timothy Braithwaite New York Wiley 2002 XVI, 272 S. Ill. txt rdacontent n rdamedia nc rdacarrier Includes bibliographic references and index Unternehmen Business enterprises Computer networks Security measures Electronic commerce Security measures Internet Security measures Sicherheit (DE-588)4054790-5 gnd rswk-swf Electronic Commerce (DE-588)4592128-3 gnd rswk-swf Electronic Commerce (DE-588)4592128-3 s Sicherheit (DE-588)4054790-5 s DE-604 HBZ Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=009942753&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Braithwaite, Timothy Securing e-business systems a guide for managers and executives Unternehmen Business enterprises Computer networks Security measures Electronic commerce Security measures Internet Security measures Sicherheit (DE-588)4054790-5 gnd Electronic Commerce (DE-588)4592128-3 gnd |
subject_GND | (DE-588)4054790-5 (DE-588)4592128-3 |
title | Securing e-business systems a guide for managers and executives |
title_auth | Securing e-business systems a guide for managers and executives |
title_exact_search | Securing e-business systems a guide for managers and executives |
title_full | Securing e-business systems a guide for managers and executives Timothy Braithwaite |
title_fullStr | Securing e-business systems a guide for managers and executives Timothy Braithwaite |
title_full_unstemmed | Securing e-business systems a guide for managers and executives Timothy Braithwaite |
title_short | Securing e-business systems |
title_sort | securing e business systems a guide for managers and executives |
title_sub | a guide for managers and executives |
topic | Unternehmen Business enterprises Computer networks Security measures Electronic commerce Security measures Internet Security measures Sicherheit (DE-588)4054790-5 gnd Electronic Commerce (DE-588)4592128-3 gnd |
topic_facet | Unternehmen Business enterprises Computer networks Security measures Electronic commerce Security measures Internet Security measures Sicherheit Electronic Commerce |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=009942753&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT braithwaitetimothy securingebusinesssystemsaguideformanagersandexecutives |