Bültmann & Gerriets
Threat 2.0
Security and Compliance for Web 2.0 Sites
von Alan Calder
Verlag: IT Governance Ltd
E-Book / EPUB
Kopierschutz: Adobe DRM


Speicherplatz: 0 MB
Hinweis: Nach dem Checkout (Kasse) wird direkt ein Link zum Download bereitgestellt. Der Link kann dann auf PC, Smartphone oder E-Book-Reader ausgeführt werden.
E-Books können per PayPal bezahlt werden. Wenn Sie E-Books per Rechnung bezahlen möchten, kontaktieren Sie uns bitte.

ISBN: 978-1-905356-85-0
Erschienen am 15.01.2009
Sprache: Englisch
Umfang: 84 Seiten

Preis: 11,99 €

11,99 €
merken
Klappentext

Optimise your Web 2.0 and Social networking efforts, whilst managing risk and information security this essential guide will show you howWeb 2.0 technologies have many advantages both to business and to consumers. Today's CEOs tweet, the modern politician has to have a Facebook page, while Wikipedia has created a new way for people to share their knowledge. When something has become a pervasive feature of modern life, you cannot afford to ignore it. However, you also need to understand the risks associated with Web 2.0 technologies, both in terms of the threat to your information security, and in terms of legal issues, such as libel, data protection and intellectual property rights.This pocket guide will provide you with an invaluable introduction to the security and compliance issues surrounding Web 2.0 technologies. It includes a programme of best-practice steps you can take to manage the risks involved with Web 2.0, together with advice on how to ensure your organisation stays on the right side of the relevant privacy and data protection requirements.Benefits to business include:Understand the risks Social networking and file-sharing sites have changed the nature of Internet traffic. As a result, the threat landscape has changed as well. This pocket guide describes the security risks associated with Web 2.0 sites.Prevent hacking attacks Hackers subject Web 2.0 sites to various types of attack, including cookie theft, keystroke logging and screen scraping. This pocket guide contains advice on how to prevent SQL attacks from occurring and how to improve Web 2.0 security by scanning for malware.Avoid problems with user-generated content Businesses which run forum sites, or publish customer reviews online, need to avoid publishing comments which are libellous or defamatory. This pocket guide offers some basic guidelines on what to do to avoid being sued for a comment someone has placed on your organisation's website.Protect commercial confidentiality and respect privacy File-sharing sites and online educational resources run the risk of publishing content that infringes copyright. This pocket guide tells you the pitfalls to avoid regarding intellectual property. It also looks at the difficulties social networking sites, such as Facebook, have had with data protection and privacy law.Get to grips with 'Threat 2.0' and buy this pocket guide today