CHAPTER 30
E-COMMERCE AND WEB SERVER SAFEGUARDS
Robert Gezelter
30.2 BUSINESS POLICIES AND STRATEGIES
30.2.1 Step 1: Define Information Security Concerns Specific to the Application
30.2.2 Step 2: Develop Security Service Options
30.2.3 Step 3: Select Security Service Options Based on Requirements
30.2.4 Step 4: Ensures the Ongoing Attention to Changes in Technologies and Requirements
30.2.5 Using the Security Services Framework
30.3.1 Web Site–Specific Measures
30.3.5 Working with Law Enforcement
30.3.8 Appropriate Responses to Attacks
30.4.3 Loss of Customers/Business
30.4.5 Proactive versus Reactive Threats
30.4.6 Threat and Hazard Assessment
30.5.1 Ubiquitous Internet Protocol Networking
30.5.8 Multiple Security Domains
30.5.9 What Needs to Be Exposed?
30.5.12 Maintaining Site Integrity
Get Computer Security Handbook, Fifth Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.