Chapter 2 identified the key IT risks arising from the use of Internet technologies. This chapter considers how these risks can be addressed through the implementation of certain IT solutions. The categories of technology considered are:
• information and data;
• business continuity and disaster recovery;
• identity and access management;
• outsourced IT;
• Web 2.0.
The principal technology solution for securing electronic communications is the application of cryptography, which is a technique employed for the concealment of the content of communications.
The method of cryptography employed within electronic communications is encryption. Currently, ...