Cover image for Securing E-business systems : a guide for managers and executives
Title:
Securing E-business systems : a guide for managers and executives
Personal Author:
Publication Information:
New York : John Wiley, 2002
ISBN:
9780471072980

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010047184 HF5548.32 B72 2002 Open Access Book Book
Searching...

On Order

Summary

Summary

The essential guide to e-business security for managers and IT professionals
Securing E-Business Systems provides business managers and executives with an overview of the components of an effective e-business infrastructure, the areas of greatest risk, and best practices safeguards. It outlines a security strategy that allows the identification of new vulnerabilities, assists in rapid safeguard deployment, and provides for continuous safeguard evaluation and modification. The book thoroughly outlines a proactive and evolving security strategy and provides a methodology for ensuring that applications are designed with security in mind. It discusses emerging liabilities issues and includes security best practices, guidelines, and sample policies. This is the bible of e-business security.
Timothy Braithwaite (Columbus, MD) is Deputy Director of Information Assurance Programs for Titan Corporation. He has managed data centers, software projects, systems planning, and budgeting organizations, and has extensive experience in project and acquisition management. He is also the author of Y2K Lessons Learned (Wiley: 0-471-37308-7).


Author Notes

TIMOTHY BRAITHWAITE has spent more than fifteen years in senior security management positions and another twenty years in executive director positions for computer and communications services organizations in both the public and private sectors. He has also worked as a private consultant. Tim has previously published The Power of IT: Maximizing Your Technology Investments and Evaluating the Year 2000 Project: A Management Guide for Determining Reasonable Care (Wiley).


Table of Contents

Prefacep. xiii
Chapter 1 Electronic Business Systems Securityp. 1
Introductionp. 1
How Is E-Business Security Defined?p. 2
Can E-Business Security Be Explained More Simply?p. 3
Is E-Business Security Really Such a Big Deal?p. 3
Is E-Business Security More Important Than Other Information Technology Initiatives?p. 4
How Does an Organization Get Started?p. 5
Instead of Playing "Catch-Up," What Should an Organization Be Doing to Design E-Business Systems That Are Secure in the First Place?p. 7
Chapter 2 E-Business Systems and Infrastructure Support Issuesp. 8
Introductionp. 8
E-Business Definedp. 9
A Short History of E-Business Innovationsp. 9
The Need for Secure E-Business Systemsp. 14
Software: The Vulnerable Underbelly of Computingp. 17
The Interoperability Challenge and E-Business Successp. 20
E-Business Security: An Exercise in Trade-Offsp. 23
Few Systems Are Designed to Be Securep. 25
Conclusionp. 26
Chapter 3 Security Weaknesses in E-Business Infrastructure and "Best Practices" Securityp. 27
Introductionp. 27
Fundamental Technical Security Threatsp. 28
The Guiding Principles of Protectionp. 38
"Best Practice" Prevention, Detection, and Countermeasures and Recovery Techniquesp. 47
Chapter 4 Managing E-Business Systems and Securityp. 58
Introductionp. 58
Part 1 Misconceptions and Questionable Assumptionsp. 60
Part 2 Managing E-Business Systems as a Corporate Assetp. 69
Part 3 E-Business Security Program Managementp. 97
Chapter 5 A "Just-in-Time" Strategy for Securing the E-Business System: The Role for Security Monitoring and Incident Responsep. 129
The Current State of E-Business Securityp. 130
Standard Requirements of an E-Business Security Strategyp. 132
A New Security Strategyp. 133
The Crucial Role of Security Monitoring and Incident Response to the Securing of E-Business Systemsp. 134
The Current State of Intrusion Detection Systems (IDS)p. 134
Defining a Cost-Effective Security Monitoring and Incident Response Capabilityp. 137
Alternatives to Building "Your Own" Security Monitoring and Incident Response Capabilityp. 138
Summaryp. 139
Chapter 6 Designing and Delivering Secured E-Business Application Systemsp. 140
Introductionp. 140
Past Development Realitiesp. 145
Contemporary Development Realitiesp. 148
Developing Secured E-Business Systemsp. 150
Using the SDR Frameworkp. 153
Choosing a Systems Development Methodology That Is Compatible with the SDR Frameworkp. 154
Participants in the Identification of Security and Integrity Controlsp. 154
Importance of Automated Toolsp. 162
A Cautionary Word About New Technologiesp. 165
Summary and Conclusionsp. 165
Chapter 7 Justifying E-Business Security and the Security Management Programp. 167
Introductionp. 167
The "Quantifiable" Argumentp. 169
Emerging "Nonquantifiable" Argumentsp. 170
Benefits Justifications Must Cover Security Program Administrationp. 175
Conclusionp. 177
Chapter 8 Computers, Software, Security, and Issues of Liabilityp. 178
Evolving Theories of Responsibilityp. 178
Likely Scenariosp. 179
How Might a Liability Case Unfold?p. 180
Questions to Be Asked to Ensure That Reasonable Care Has Been Taken in Developing a Secure E-Business Systemp. 182
Chapter 9 The National Critical Infrastructure Protection (CIP) Initiativep. 187
The Problem of Dependencyp. 187
Critical Infrastructure Protection (CIP) Purpose, Directives, Organizations, and Relationshipsp. 188
Frequently Asked Questions About the IT-ISACp. 190
Critical Information Infrastructure Protection Issues that Need Resolutionp. 192
Appendix A Y2K Lessons Learned and Their Importance for E-Business Securityp. 194
Appendix B Systems Development Review Framework for E-Business Development Projectsp. 208
Appendix C A Corporate Plan of Action for Securing E-Business Systems (Sample)p. 229
Appendix D E-Business Risk Management Review Model Instructions for Usep. 251
Appendix E Resources Guidep. 262
Indexp. 267