O'Reilly logo

Cyber Risks for Business Professionals by Rupert Kendrick

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 8: TECHNOLOGY SOLUTIONS

Chapter 2 identified the key IT risks arising from the use of Internet technologies. This chapter considers how these risks can be addressed through the implementation of certain IT solutions. The categories of technology considered are:

•  communications;

•  information and data;

•  business continuity and disaster recovery;

•  networks;

•  identity and access management;

•  outsourced IT;

•  Web 2.0.

Communications

The principal technology solution for securing electronic communications is the application of cryptography, which is a technique employed for the concealment of the content of communications.

E-mail encryption

The method of cryptography employed within electronic communications is encryption. Currently, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required