Discover millions of ebooks, audiobooks, and so much more with a free trial

Only $11.99/month after trial. Cancel anytime.

Threat 2.0: Security and Compliance for Web 2.0 Sites
Threat 2.0: Security and Compliance for Web 2.0 Sites
Threat 2.0: Security and Compliance for Web 2.0 Sites
Ebook100 pages54 minutes

Threat 2.0: Security and Compliance for Web 2.0 Sites

Rating: 0 out of 5 stars

()

Read preview

About this ebook

This pocket guide will provide you with an invaluable introduction to the security and compliance issues surrounding Web 2.0 technologies. It includes a programme of best-practice steps you can take to manage the risks involved with Web 2.0, together with advice on how to ensure your organisation stays on the right side of the relevant privacy and data protection requirements.

LanguageEnglish
Publisheritgovernance
Release dateJan 15, 2009
ISBN9781849281249
Threat 2.0: Security and Compliance for Web 2.0 Sites
Author

Alan Calder

Alan Calder is a leading author on IT governance and information security issues. He is the CEO of GRC International Group plc, the AIM-listed company that owns IT Governance Ltd. Alan is an acknowledged international cyber security guru. He has been involved in the development of a wide range of information security management training courses that have been accredited by the International Board for IT Governance Qualifications (IBITGQ). He is a frequent media commentator on information security and IT governance issues, and has contributed articles and expert comment to a wide range of trade, national and online news outlets.

Read more from Alan Calder

Related to Threat 2.0

Related ebooks

Security For You

View More

Related articles

Reviews for Threat 2.0

Rating: 0 out of 5 stars
0 ratings

0 ratings0 reviews

What did you think?

Tap to rate

Review must be at least 10 words

    Book preview

    Threat 2.0 - Alan Calder

    978-1-849281-24-9

    FOREWORD

    Web 2.0 – a widespread series of developments in the way websites are designed and accessed, and more widely known as ‘social networking sites’ – is a new and exciting way for websites to work. The extent to which Web 2.0 sites (such as Wikipedia, FaceBook, and YouTube) also rely on user-generated content adds to their immediacy, excitement and relevance.

    Web 2.0 sites do, however, come with their own set of risks – risks to users, to their confidential information, and to associated parties. It is not unusual, when technology is evolving so quickly, and is subject to such rapid take up, for such security risks to be bypassed – to the detriment of users.

    This book is probably the first book on this subject to be published; it has its origins in the detailed research which we did into Web 2.0 during Autumn 2008 and provides organisations with core guidance on how to ensure that their websites remain secure – and comply with the rapidly evolving regulatory requirements that cover personal data and computer security.

    CONTENTS

    CHAPTER 1:

    WEB 2.0

    There is no doubt that Web 2.0 technologies bring many benefits. For example, the viral nature of Web 2.0 technologies such as social networking is an extremely powerful tool, which can be used to engage a large number of Web users very quickly for collaborative, knowledge sharing and networking purposes.

    However, the interactivity and openness of Web 2.0 technologies in themselves also create risks. Sophos have reported that there has been a phenomenal growth in web threats over the last year¹. Malware is present not only on malicious websites, but there is also a growing number of trusted and reputable websites which are compromised. For example, in April 2008 the Cambridge University Press website was compromised². Visitors to its online dictionary were subject to attempts to run an unauthorised hacker’s script on their computers.

    The risks from Web 2.0 technologies are compounded by the exponential growth in the volume of web-based personal data. In addition, the time lag between the fast moving pace of Web technology development and the speed at which legislation evolves means that complying with legislation can be complex and unclear.

    ¹ Mid-Year Report: Malware, Spam and Web Threats in 2008, Mike Harris, Sophos (2008).

    ² Security threat report update, Sophos (July 2008).

    The benefits of Web 2.0 technologies

    The business benefits of Web 2.0 technologies include:

    The central, online storage of documents enabling increased collaboration and group knowledge in real time and across geographic boundaries.

    Improved and more interactive relationship with customers.

    Increased vertical networking among colleagues in larger organisations.

    Improved communication.

    Improved partnership working.

    Incentivised working conditions for the younger members of the workforce.

    The following sections detail the ways in which Web 2.0 technologies can be used to provide benefits in specific business areas.

    Product innovation: increased efficiency and cost savings derived from the speed of sharing, combined with enabling a central location for sharing files and drawings. Collaboration tools also enable employees to be tapped for ideas which are then hosted and developed in a single virtual location.

    Sales, marketing and market research: the main benefit of these tools for sales and marketing and market research is in lead generation and brand awareness.

    Video, blogging, social networking, forums and videoconferencing all enable customers to be tapped for ideas, feedback, preferences and recommendations which can then in turn be used to advertise products and feed the marketing and sales process. For example, Amazon has a function on their website that suggests, based on one’s previous purchases, ‘other products which you might like to buy’.

    Production: Web 2.0 tools such as wikis and collaboration tools can be used to gain and generate input from a wide number of employees, which is available to view in a central place.

    HR processes: Web 2.0 technologies, particularly interactive videos, can also be used for employee training.

    Enjoying the preview?
    Page 1 of 1