Security in a Web 2.0+ world a standards based approach

Discover how technology is affecting your business, and why typical security mechanisms are failing to address the issue of risk and trust. Security for a Web 2.0+ World looks at the perplexing issues of cyber security, and will be of interest to those who need to know how to make effective security...

Descripción completa

Detalles Bibliográficos
Otros Autores: Solari, C. author (author)
Formato: Libro electrónico
Idioma:Inglés
Publicado: Chichester, [England] : Wiley 2009.
Edición:1st edition
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009628356606719
Tabla de Contenidos:
  • Title Page; Copyright Page; About the Authors and Contributors. . .; Foreword; Prologue; Chapter 1 - The World of Cyber Security in 2019; General Review of Security Challenges; Cyber Security as the Friction and Latency of Business and Government; Protecting Web 2.0 Data; The Present Models for Cyber Security are Broken; Chapter 2 - The Costs and Impact of Cyber Security; The Economics of Security; The Security Value Life Cycle; Security Costs at the Point of Creation; Security Costs at the Point of Purchase - Service Creation; Security Cost at Point of Service
  • Impact of Security Costs on Security Decisions and Investments: Network ...Chapter 3 - Protecting Web 2.0: What Makes it so Challenging?; Defining Web 2.0; The Challenges of Web 2.0 Security; Securing the Web 2.0 Network; The Wireless Data Challenge; Securing the Web 2.0 Applications and Content; Chapter 4 - Limitations of the Present Models; Aftermarket Security - A Broken Model; Standards and Regulations; Regulate Yourself into Good Security?; Silos of Risk; Absence of Metrics to Define Trust; The Current Model is Broken - Now What?
  • Chapter 5 - Defining the Solution - ITU-T X.805 Standard ExplainedThe ITU-T X.805 Standard Explained: Building a foundation for the Security ...; Coupling to the ISO/IEC 27000 Series Standard: Complementary Standards that ...; Enterprise Risk and IT Management Frameworks; Chapter 6 - Building the Security Foundation Using the ITU-T X.805 Standard: ...; The standard made operational; Key lesson: Complexity breeds insecurity; Key lesson: The cloud has entered the building; Key lesson: Address common vulnerabilities; Key lesson: Not all vulnerabilities are created equal
  • Key lesson: What is reportable and when is it reportable?Key lesson: Security mitigation is also a business risk management decision; Key lesson: Performing the assessment with confidence in the results; Key lesson: Convince the product unit; Closing thoughts on the key lessons; Chapter 7 - The Benefits of a Security Framework Approach; Convincing the CFO; Chapter 8 - Correcting Our Path - What Will it Take?; The Power of the Customer to Transform an Industry; Summary and Conclusions; Appendix A - Building Secure Products and Solutions
  • Appendix B - Using the Bell Labs Security Framework to Enhance the ISO ...Appendix C; Glossary; Index