CHAPTER 8: TECHNOLOGY SOLUTIONS

Chapter 2 identified the key IT risks arising from the use of Internet technologies. This chapter considers how these risks can be addressed through the implementation of certain IT solutions. The categories of technology considered are:

•  communications;

•  information and data;

•  business continuity and disaster recovery;

•  networks;

•  identity and access management;

•  outsourced IT;

•  Web 2.0.

Communications

The principal technology solution for securing electronic communications is the application of cryptography, which is a technique employed for the concealment of the content of communications.

E-mail encryption

The method of cryptography employed within electronic communications is encryption. Currently, ...

Get Cyber Risks for Business Professionals now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.