”SoftOne”
Sören Janstål

.   Tidigare gallups
Fun

Data Research DPU ab
Torsvikssvängen 34
181 34 Lidingö


Tel +46 (0)70 727 67 95
Skype sjanstal

eMail to Sören Janstål

Sören Janstål
Sören Janstål
Data Research DPU
Data Research DPU ab
Data Research DPU for Evaluation of Information Technology

Sören Janstål
Sören Janstål

The Information Technology Security Report for the 21st Century: Security HOTT Guide

Pages: 400
Published: May 1999
ISBN: 90-76604-01-0

See order form for price!

Svenska


About the report

The Current Business Environment

Successful businesses use technology to create competitive advantages. Today's powerful data processing and networking technologies create unlimited opportunities for innovative new customer services, increased employee productivity, and higher profitability. Meanwhile, information is being transformed into an even more valuable business resource.

Yet, all the benefits of advanced technology can disappear in an instant if the system is not secure. Security measures must be implemented to safeguard data, software, and hardware against accidental or deliberate loss, disclosure, or corruption.

A Valuable Security Resource

The Information Technology Security Report, prepared by Systems Consultants Nederland (SCN) B.V., offers 400 pages of security strategies, implementation plans, and case studies. The report, which contains in-depth analyses, white papers, and articles written by international leaders in IT security, is designed to meet the need for information in the rapidly growing security industry.

The report examines every aspect of enterprise security, from controlling access to the building to protecting the computer network. Security assessment methodologies and outsourcing issues are also discussed. The report also comes with a CD-ROM that includes more in-depth security articles, sample security software, links to relevant security Web sites, and a complete copy of ICSA's Annual Firewall Buyer Guide.

Security Technologies and Techniques

The Information Technology Security Report offers detailed descriptions of the most effective security technologies and techniques used in the enterprise: firewalls, encryption, point-to-point tunneling protocol (PPTP), pretty good privacy (PGP), and virtual private networks (VPNs).

The report also examines the threat of viruses and the numerous tools available to help prevent them.

Internet Security Issues

Organizations are increasingly using public information infrastructures, such as the Internet, to improve communications and even increase profitibility. Although companies can benefit from having an Internet business presence, the increased use of Internet technology also increases the risk of a security breach.

The Information Technology Security Report explores the most effective Internet security tools:

  • Identification, authentication, and authorization on the Web
  • Smartcards
  • Internet protocol security (IPSec)
  • E-mail encryption
  • Secure sockets layer (SSL)

Business Continuity Planning

Despite all the precautions an organization may take to prevent both internal and external security breaches, they will undoubtedly occur.

The Information Technology Security Report offers critical solutions for forming a business continuity plan that will counteract interruptions to business activities and enable vital operations to continue.


Report contents

Major Information Technology Security Issues

  • A Security Overview for Management
  • Security Basics: A White Paper
  • Information Security Predictions for 1999
  • Outsourcing Security
  • Security Assessment Methodologies
  • The Inevitability of Failure
  • The Flawed Assumption of Security in Modern Computing Environments
  • Secure Third-party Access to Corporate Data
  • The Risks of Key Recovery, Key Escrow, and Trusted Third-party (TTP) Encryption
  • Preventing Viruses

Intrusion Detection Systems

  • Intrusion Detection Systems (IDS)
  • Hacking
  • Security Administration
  • Computer Emergency Response Team (CERT)
  • Threats, Vulnerabilities, and Real-world Responses
  • A Network Security Case Study
  • Intruder Alerts
  • Reusable Passwords

Virtual Private Networks

  • VPN Applications
  • Redefining VPNs
  • VPNs and Firewalls
  • VPNs and Wide Area Networks (WANs)
  • Frame Relay (FR) VPNs
  • Internet Protocol (IP) VPNs
  • A Secure Foundation for VPNs
  • Large-scale Secure Networking
  • IPSec
  • VPNs: A Microsoft Overview

Firewall Issues

  • Proxies
  • The DeMorgan Security Technology Review: A Comparison Study on Behalf of AT&T
  • Firewalls for NT
  • Forming a Security Policy
  • The Linux Firewall
  • ICSA's Annual Firewall Buyer Guide

Identification, Authentication, and Authorization

  • Smart Access: Strong Authentication on the Web
  • Encryption
  • How Electronic Encryption Works
  • Enterprisewide Authentication
  • Cryptography

Public Key Management

  • Secure E-commerce
  • Public Key Infrastructure (PKI)
  • Public Cryptography to Protect Commercial Transactions
  • Scrambled Messages: Why Key Recovery Will Not Work

Security on the Internet

  • Internet Security: The Next Generation
  • IPSec Hardware Implementation
  • Securing and Managing Web Resources
  • E-mail Encryption
  • Smartcards
  • SSL

Microsoft Products

  • Single Sign-On (SSO) in Windows 2000 Networks
  • How to Set Up Security Using Systems Management Server Version 1.2
  • Securing Microsoft SQL Server
  • PPTP

Related reports:

ERP market, just this minute

Look how the users rate their systems!

Give your rating of any system and get a market analyse report free of charge!

Give your rating of any IT vendor and get a market analyse report free of charge!

Data Research DPU
for Evaluation of Information Technology and Computing


[ Order | More info | Suggest new evaluations ]
[ Consulting | Price List | Mailing List ]
[ Contact ]

Back to Data Research DPU top page.


Data Research DPU ab - Torsvikssvngen 34, SE-181 34 Liding, Sweden - Tel +46 70 727 67 95 - Skype: sjanstal, SkypeIN: +46 8 559 25 900 Contact (email)



Ataio

Space 5 for sponsor/e


Space 9 for sponsor/e


Metodika

Changed May 7, 2001