- 1
- 0
- 约1.63万字
- 约 43页
- 2017-03-09 发布于上海
- 举报
Web Development Evolution The Assimilation of Web Engineering网络发展网络工程的同化
Web Development Evolution: The Business Perspective on Security William Bradley Glisson L. Milton Glisson Ray Welland Why? Data, Information, Knowledge “One man’s data can be another man’s knowledge, and vice versa, depending on context” (Stewart, T. A., The Wealth of Knowledge. ) Information is the worlds new currency; information has value.“ (Secret Service Director Ralph Basham ) “Knowledge is what we buy, sell, and do” (Stewart, T. A., The Wealth of Knowledge. ) Business Incentive The 2004 (FBI) Computer Crime and Security Survey estimates that losses from internet security breaches, in the US, exceeded $141 million within the last year. PricewaterhouseCoopers 2004 Survey indicates that security problems are on the rise in the United Kingdom and that malicious attacks are the primary culprits. The Department of Trade and Industry’s (2004) survey estimates “security breaches continue to cost” UK businesses “several billions of pounds.” The Deloitte 2005 Global Survey estimates that identity theft cost the UK almost a billion dollars in 2003. Application Security Truth Companies do not want to admit that their systems have been compromised They do not want to incur the expense necessary to rectify the problem They do not know how to fix the problem They are not even aware that their systems have been compromised. Soft and Hard Cost Telang and Wattal’s research indicates that a software vendor loses, on average, approximately 0.6% of their stock price per vulnerability announcement. Minimize the chance of copy cat attacks on their systems until the issue has been resolved and patched. Legislative Pressure Economic Espionage Act of 1996 (EEA) Health Insurance Portability and Accountability Act of 1996 (HIPAA) Graham-Leach-Bliley Act of 1999 Sarbanes-Oxley Act of 2002 (SOX) Recently a ninety-one page bill was introduced in the Senate by Senator Patrick Leahy and Senator Arlen Specter containing new rules for corporate data security and stiff
您可能关注的文档
- Visualization Tool for Flow Cytometry Data Standards 流式细胞仪数据标准的可视化工具.ppt
- Visualizing HighOrder Surface Geometry Soda Hall高阶曲面几何可视化.ppt
- Visualizing Diffusion Tensor Imaging Data with Merging融合的可视化扩散张量成像数据.ppt
- Vitamin C Degradation University of Washington维生素D降解华盛顿大学.ppt
- Vitamins Minerals Sam Houston State University维生素和矿物质山姆·休斯敦州立大学.ppt
- Vivid Verbs Lebanon生动的动词黎巴嫩.ppt
- VIVI. La Misa, paso a paso Liturgia de la Palabra y .ppt
- Viva Las Vegas marc拉斯维加斯马克.merlins.ppt
- Vladimir N弗拉迪米尔. Vapnik’s The Nature of Statistical .ppt
- VO2 Max iws2VO2 max iws2.collin.ppt
- 广东省广州省实验中学教育集团2025-2026学年八年级上学期期中考试物理试题(解析版).docx
- 广东省广州大学附属中学2025-2026学年八年级上学期奥班期中物理试题(解析版).docx
- 广东省广州市第八十六中学2025-2026学年八年级上学期期中物理试题(含答案).docx
- 广东省广州市第八十九中学2025-2026学年八年级上学期期中考试物理试题(解析版).docx
- 广东省广州市第二中学2025-2026学年八年级上学期期中考试物理试题(含答案).docx
- 广东省广州市第八十六中学2025-2026学年八年级上学期期中物理试题(解析版).docx
- 广东省广州市第八十九中学2025-2026学年八年级上学期期中考试物理试题(含答案).docx
- 广东省广州市第二中学2025-2026学年八年级上学期期中考试物理试题(解析版).docx
- 2026《中国人寿上海分公司营销员培训体系优化研究》18000字.docx
- 《生物探究性实验教学》中小学教师资格模拟试题.docx
原创力文档

文档评论(0)