Advanced Security Strategies: Protecting Today's E-business Environment

by CTR staff

0 ratings • 0 reviews • 0 shelved
Book cover for Advanced Security Strategies

Bookhype may earn a small commission from qualifying purchases. Full disclosure.

Businesses are increasingly implementing security countermeasures like firewalls, public key encryption and virtual private networks (VPNs) to defend against internal and external threats in today's e-business environment. "Advanced Security Strategies" examines current security issues, enabling managers to protect the enterprise from all directions by using proven techniques to sharpen vigilance, allocating resources strategically, and acquiring state-of-the-art technological solutions. These techniques should enable businesses to move confidently forward with Internet initiatives. Conventional wisdom attributes approximately 80% of attacks to internal sources and only 20% to external sources. In addition, the fallout from internal security incidents can be more severe because employees usually have information that can cause much damage if misused. External attacks are increasing, however. Available attack tools reduce the skill level needed to mount attacks, thereby increasing their number. Because attacks are frequently more random than targeted, the odds of escaping attack simply through obscurity are decreasing.
"Advanced Security Strategies" scrutinizes common attack methods and details how to stop them using crucial countermeasures such as firewalls, security scanners, intrusion detection systems (IDSs) and anti-virus software. As organizations grow and merge, functions are increasingly being distributed across many local area networks (LANs). In addition, an increasing number of employees now work away from the corporate office, and external partners and customers are accessing internal systems via extranets and Web sites. This remote access presents hackers with new ways to enter the corporate network. "Advanced Security Strategies" analyzes effective measures that protect against this remote threat. For example, home office computers should comply with the same security standards as machines in the company offices, and remote workers should be subject to more stringent authentication measures, such as tokens, digital certificates, or biometrics. In addition, VPNs provide secure access for single users and between networks.
Although proprietary file formats may become obsolete as extensible mark-up language (XML) implementation increases, their obscurity offers some inherent data protection. XML, however, is a plain-text file format that contains sensitive business data and thus requires security in transit. "Advanced Security Strategies" explains how this security can be achieved by sending XML files via secure sockets layer (SSL) or a VPN.
  • ISBN10 1566070880
  • ISBN13 9781566070881
  • Publish Date 1 January 2001
  • Publish Status Active
  • Publish Country US
  • Imprint Computer Technology Research Corporation,U.S.
  • Format Paperback
  • Pages 151
  • Language English