The Secure Online Business

Adam Jolly

Physical

In Circulation

The Web is an exciting but unstable place to do business. The potential rewards are high but so are the risks and the effective management of these risks "online" is likely to be the greatest business enabler/destroyer of the early 21st century. Risk to the integrity, availability and confidentiality of e-business activities comes in many forms - fraud, espionage, viruses, spamming, denial of service - and the potential for damage or irretrievable loss is very real. Information security is no longer an issue confined to the IT department but is critical to all operational functions and departments within an organisation.

Nor are the solutions purely technical - with two thirds of security breaches caused by human error, management controls and processes are equally important. This book is designed as a practical guide for managers in developing and implementing appropriate strategies for online risk management. Published in association with the Institute of Directors, the contributions draw on a wide range of expertise and know-how, both in IT and in other disciplines such as the law, insurance, accounting and consulting. Security should not be an afterthought in developing a strategy. It is an integral part of setting up sustainable new channels of communication and business.

What will you learn from this book

  1. Cybersecurity Fundamentals: Explaining foundational concepts of cybersecurity, including threats, vulnerabilities, and risk management in the context of online businesses.

  2. Data Protection and Privacy Compliance: Addressing compliance requirements such as GDPR, CCPA, or industry-specific regulations concerning data protection and user privacy.

  3. Secure Transactions and Payment Processing: Discussing methods to secure online transactions, payment gateways, and protect financial data from cyber threats.

  4. Securing Websites and Online Platforms: Exploring strategies for securing websites, e-commerce platforms, and databases against cyberattacks like DDoS, SQL injection, and XSS.

  5. Authentication and Access Control: Explaining secure authentication methods, user access controls, and best practices to prevent unauthorized access.

  6. Employee Training and Awareness: Emphasizing the importance of educating employees about cybersecurity risks, social engineering attacks, and promoting a security-conscious culture.

  7. Incident Response and Recovery: Outlining protocols and procedures for responding to cybersecurity incidents, mitigating damages, and restoring operations after an attack.

  8. Secure Cloud Computing: Addressing security considerations and best practices for businesses using cloud services and storing data in the cloud.

  9. Mobile and IoT Security: Discussing challenges and strategies for securing mobile apps, devices, and the Internet of Things (IoT) connected to online business operations.

  10. Continuous Monitoring and Compliance Audits: Exploring methods for continuous cybersecurity monitoring, regular security audits, and maintaining compliance with security standards.

Language English
ISBN-10 0-7494-3936-X
ISBN-13 9780749439361
No of pages 210
Font Size Medium
Book Publisher Kogan Page
Published Date 15 Dec 2002

About Author

Author : Adam Jolly

2 Books

Related Books