Safety Net: Protecting Your Business on the Internet
A hands-on guide for managers to keep their on-line business secure
Written by a respected expert in the field of e-commerce, Safety Net shows managers, considering Web commerce, the different types of attacks online businesses can experience and details prevention, detection, and recovery countermeasures. Kathleen Sindell provides managers with easy-to-follow directions on how to determine exactly how vulnerable their current system is and how to create an effective security policy that meets the unique requirements of an online business. Readers will learn how to set security policies for customers and internal users; uncover the most common online business vulnerabilities; ensure their business from new types of frauds and cyber crimes; acquire defense tactics for today and tomorrow's virus outbreaks; use multitiered security approaches for protecting distributed offices; and much more.
52 pages matching attack organization in this book
Results 1-3 of 52
What people are saying - Write a review
We haven't found any reviews in the usual places.
Top Security Troubles for Online Businesses
Assessing Your Security Level
16 other sections not shown
access control Additionally allows antivirus assets attack organization audit authentication Available bastion host browser Center certificate chapter checklist client communication computer security connection cookies create curity cyber-crimes databases DDoS December denial of service determine develop digital rights management digital signature documents domain name e-mail electronic employees encryption enterprise's example Figure files firewall hackers hacking hardware identify incident infection information security install Internet security Internet users Internet-based business intrusion detection systems IP address losses Microsoft monitoring online business operating system organization's packet sniffer packets passwords percent Phone programs protect Protocol provides proxy server public key remote requests require response risk assessment routers secu security breaches sensitive information solutions spoofing threats tion traffic transactions Trojan horse types unauthorized user's virus viruses vulnerabilities web bugs web server web-based business web-based enterprise wireless