gogogo
Syndetics cover image
Image from Syndetics

Control and Security of E-Commerce / Gordon Smith.

By: Material type: TextTextPublication details: Hoboken ;/ Wiley, 2004Description: 232 pISBN:
  • 0471180904
Subject(s): DDC classification:
  • 658.872 SMI
Holdings
Item type Current library Call number Copy number Status Date due Barcode
Standard Loan Moylish Library Main Collection 658.872 SMI (Browse shelf(Opens below)) 1 Available 39002000382664

Enhanced descriptions from Syndetics:

* Explores the components of e-commerce (including EDI).
* Shows the risks involved when using an e-commerce system.
* Provides controls for protecting an e-commerce site (e.g., securing financial transactions and confidential transactions).
* Provides COSO compliant audit approach.
* Provides risk/control tables and checklists.
* Technical topics are discussed in simple user-friendly language.

Table of contents provided by Syndetics

  • Preface (p. vii)
  • Chapter 1 Introduction (p. 1)
  • E-Commerce Results in Business Globalization (p. 4)
  • Chapter 2 Legal Issues Related to E-Commerce (p. 11)
  • E-Commerce in the Courtroom (p. 14)
  • Legal Agreements in Support of E-Commerce (p. 19)
  • Risk/Control Table (p. 24)
  • Audit Checklist (p. 27)
  • Chapter 3 Information Security: Overview (p. 31)
  • Specific Threats to E-Commerce (p. 35)
  • Cryptography and Encryption (p. 39)
  • Symmetric Cryptosystems (p. 39)
  • Asymmetric Cryptosystems (p. 43)
  • Key Management and Transfer Techniques (p. 43)
  • Digital Signatures and Other Authentication Techniques (p. 46)
  • Risk/Control Table (p. 48)
  • Audit and Security Checklist (p. 52)
  • Chapter 4 Certificates and Nonrepudiation (p. 57)
  • Certificates (p. 57)
  • Nonrepudiation: Requirement for Internet Business (p. 63)
  • Risk/Control Table (p. 67)
  • Audit and Security Checklist (p. 71)
  • Chapter 5 Protecting the E-Commerce Environment (p. 73)
  • Protecting the Internet Zone (p. 73)
  • Protecting the Extranet Zone (p. 82)
  • Protecting the Intranet (p. 88)
  • Business Continuance: Keeping the Web Site Accessible (p. 89)
  • Risk/Control Summary (p. 93)
  • Audit and Security Checklist (p. 106)
  • Chapter 6 Protecting E-Commerce Data (p. 111)
  • Securing Confidential Data (p. 113)
  • Securing the UNIX Environment (p. 115)
  • Securing the Windows Server Environment (p. 118)
  • Data-Related Risk/Control Table (p. 124)
  • Checklists for Protecting the Data (p. 137)
  • Checklists for UNIX Systems (p. 138)
  • Checklists for Windows Systems (p. 140)
  • Checklists for Network Issues (p. 141)
  • Chapter 7 Auditing an E-Commerce Application (p. 143)
  • Sales and Invoicing Function Audit Guide (p. 145)
  • Index (p. 225)

Author notes provided by Syndetics

Gordon E. Smith is the President of Canaudit, Inc., an auditing seminar development and presentation firm. He has twenty-eight years of audit experience.

His areas of expertise include networks, information security, operating systems, and client/server environments. Smith is a regular speaker at conferences and seminars worldwide, and received the 2002 Wasserman Award for outstanding achievement in information audit and security.

Powered by Koha