Security in a Web 2.0+ world a standards based approach
Discover how technology is affecting your business, and why typical security mechanisms are failing to address the issue of risk and trust. Security for a Web 2.0+ World looks at the perplexing issues of cyber security, and will be of interest to those who need to know how to make effective security...
Otros Autores: | |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Chichester, [England] :
Wiley
2009.
|
Edición: | 1st edition |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009628356606719 |
Tabla de Contenidos:
- Title Page; Copyright Page; About the Authors and Contributors. . .; Foreword; Prologue; Chapter 1 - The World of Cyber Security in 2019; General Review of Security Challenges; Cyber Security as the Friction and Latency of Business and Government; Protecting Web 2.0 Data; The Present Models for Cyber Security are Broken; Chapter 2 - The Costs and Impact of Cyber Security; The Economics of Security; The Security Value Life Cycle; Security Costs at the Point of Creation; Security Costs at the Point of Purchase - Service Creation; Security Cost at Point of Service
- Impact of Security Costs on Security Decisions and Investments: Network ...Chapter 3 - Protecting Web 2.0: What Makes it so Challenging?; Defining Web 2.0; The Challenges of Web 2.0 Security; Securing the Web 2.0 Network; The Wireless Data Challenge; Securing the Web 2.0 Applications and Content; Chapter 4 - Limitations of the Present Models; Aftermarket Security - A Broken Model; Standards and Regulations; Regulate Yourself into Good Security?; Silos of Risk; Absence of Metrics to Define Trust; The Current Model is Broken - Now What?
- Chapter 5 - Defining the Solution - ITU-T X.805 Standard ExplainedThe ITU-T X.805 Standard Explained: Building a foundation for the Security ...; Coupling to the ISO/IEC 27000 Series Standard: Complementary Standards that ...; Enterprise Risk and IT Management Frameworks; Chapter 6 - Building the Security Foundation Using the ITU-T X.805 Standard: ...; The standard made operational; Key lesson: Complexity breeds insecurity; Key lesson: The cloud has entered the building; Key lesson: Address common vulnerabilities; Key lesson: Not all vulnerabilities are created equal
- Key lesson: What is reportable and when is it reportable?Key lesson: Security mitigation is also a business risk management decision; Key lesson: Performing the assessment with confidence in the results; Key lesson: Convince the product unit; Closing thoughts on the key lessons; Chapter 7 - The Benefits of a Security Framework Approach; Convincing the CFO; Chapter 8 - Correcting Our Path - What Will it Take?; The Power of the Customer to Transform an Industry; Summary and Conclusions; Appendix A - Building Secure Products and Solutions
- Appendix B - Using the Bell Labs Security Framework to Enhance the ISO ...Appendix C; Glossary; Index