Control and Security of E-Commerce / Gordon Smith.
Material type: TextPublication details: Hoboken ;/ Wiley, 2004Description: 232 pISBN:- 0471180904
- 658.872 SMI
Item type | Current library | Call number | Copy number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|
Standard Loan | Moylish Library Main Collection | 658.872 SMI (Browse shelf(Opens below)) | 1 | Available | 39002000382664 |
Enhanced descriptions from Syndetics:
* Explores the components of e-commerce (including EDI).
* Shows the risks involved when using an e-commerce system.
* Provides controls for protecting an e-commerce site (e.g., securing financial transactions and confidential transactions).
* Provides COSO compliant audit approach.
* Provides risk/control tables and checklists.
* Technical topics are discussed in simple user-friendly language.
Table of contents provided by Syndetics
- Preface (p. vii)
- Chapter 1 Introduction (p. 1)
- E-Commerce Results in Business Globalization (p. 4)
- Chapter 2 Legal Issues Related to E-Commerce (p. 11)
- E-Commerce in the Courtroom (p. 14)
- Legal Agreements in Support of E-Commerce (p. 19)
- Risk/Control Table (p. 24)
- Audit Checklist (p. 27)
- Chapter 3 Information Security: Overview (p. 31)
- Specific Threats to E-Commerce (p. 35)
- Cryptography and Encryption (p. 39)
- Symmetric Cryptosystems (p. 39)
- Asymmetric Cryptosystems (p. 43)
- Key Management and Transfer Techniques (p. 43)
- Digital Signatures and Other Authentication Techniques (p. 46)
- Risk/Control Table (p. 48)
- Audit and Security Checklist (p. 52)
- Chapter 4 Certificates and Nonrepudiation (p. 57)
- Certificates (p. 57)
- Nonrepudiation: Requirement for Internet Business (p. 63)
- Risk/Control Table (p. 67)
- Audit and Security Checklist (p. 71)
- Chapter 5 Protecting the E-Commerce Environment (p. 73)
- Protecting the Internet Zone (p. 73)
- Protecting the Extranet Zone (p. 82)
- Protecting the Intranet (p. 88)
- Business Continuance: Keeping the Web Site Accessible (p. 89)
- Risk/Control Summary (p. 93)
- Audit and Security Checklist (p. 106)
- Chapter 6 Protecting E-Commerce Data (p. 111)
- Securing Confidential Data (p. 113)
- Securing the UNIX Environment (p. 115)
- Securing the Windows Server Environment (p. 118)
- Data-Related Risk/Control Table (p. 124)
- Checklists for Protecting the Data (p. 137)
- Checklists for UNIX Systems (p. 138)
- Checklists for Windows Systems (p. 140)
- Checklists for Network Issues (p. 141)
- Chapter 7 Auditing an E-Commerce Application (p. 143)
- Sales and Invoicing Function Audit Guide (p. 145)
- Index (p. 225)
Author notes provided by Syndetics
Gordon E. Smith is the President of Canaudit, Inc., an auditing seminar development and presentation firm. He has twenty-eight years of audit experience.His areas of expertise include networks, information security, operating systems, and client/server environments. Smith is a regular speaker at conferences and seminars worldwide, and received the 2002 Wasserman Award for outstanding achievement in information audit and security.