+353-1-416-8900REST OF WORLD
+44-20-3973-8888REST OF WORLD
1-917-300-0470EAST COAST U.S
1-800-526-8630U.S. (TOLL FREE)


Safety Net. Protecting Your Business on the Internet

  • ID: 2209824
  • Book
  • April 2002
  • 336 Pages
  • John Wiley and Sons Ltd
Learn how to battle online security threats with this hands–on guide for managers

Protecting your online business is a never–ending battle between security systems and existing technologies and the sophistication of those seeking to thwart them. Defending your Web business does not rest solely on finding the solution to just one security problem; it relies on your ability to devise an entire program that puts a stop to the security hazards you face today and anticipates those you may face tomorrow. Written especially for managers, Safety Net reveals the different types of attacks your online business can experience and details prevention, detection, and recovery countermeasures you can employ to protect your business from financial losses due to online sabotage.

Packed with easy–to–follow directions, Safety Net helps you determine exactly how vulnerable your current system is and how to create an effective security policy that meets the unique requirements of your online business. Through step–by–step directions, checklists, tests, action plans, and questionnaires, you′ll learn how to:

∗ Set security policies for customers and internal users

∗ Uncover the most common online business vulnerabilities

∗ Safeguard your business from new types of frauds and cybercrimes

∗ Acquire defense tactics for today′s and tomorrow′s virus outbreaks

∗ Use multitiered security approaches for protecting distributed offices

∗ And much more
Note: Product cover images may vary from those shown

Top Security Troubles for Online Businesses.

Assessing Your Security Level.

Determining the Impact of Security on Your Bottom Line.

Your Online Business and Intrusion Detection.

Your Vulnerable Web Server.

Guarding Your Wireless Operations.

Reducing Denial of Service Attacks.

The Insecure Employee.

Handling Public Relations After a Cyber–Attack.

Protecting Your Web–Based Business from Invisible Cyber Crimes and Frauds.

Firewalls and Protecting Your Distributed Office.

Safeguarding Your Customers′ Privacy and Personal Information.

Antivirus Technology and Your Online Business.

Developing an Effective Security Policy.


Resource Center.


About the Author.
Note: Product cover images may vary from those shown
Kathleen Sindell
Note: Product cover images may vary from those shown