E-mail Security

E-mail Security

E-mail Security

Paul Dowland / Steven Furnell

14,15 €
IVA incluido
Disponible
Editorial:
IT Governance Publishing Ltd
Año de edición:
2010
Materia
Redes y comunicaciones informáticas
ISBN:
9781849280969
14,15 €
IVA incluido
Disponible
Añadir a favoritos

Make your organisation’s email secure Your business relies on e-mail for its everyday dealings with partners, suppliers and customers. While e-mail is an invaluable form of communication, it also represents a potential threat to your information security. E-mail could become the means for criminals to install a virus or malicious software on your computer system and fraudsters will try to use e-mails to obtain sensitive information through phishing scams. Safeguard email security If you want to safeguard your company’s ability to function, it is essential to have an effective e-mail security policy in place, and to ensure your staff understand the risks associated with e-mail. Email security best practice This pocket guide will help businesses to address the most important issues. Its comprehensive approach covers both the technical and the managerial aspects of the subject, offering valuable insights for IT professionals, managers and executives, as well as for individual users of e-mail. Overcome email security threats The pocket guide covers the various types of threat to which e-mail may expose your organisation, and offers advice on how to counter social engineering by raising staff awareness. Choose the most secure email client The client is the computer programme that manages the user’s e-mail. Malicious e-mails often operate through attachment files that infect computer systems with malware when downloaded. This pocket guide explains how you can enhance your information security by configuring the e-mail client to block attachments or to limit their size. Protect your company’s information What kind of information should you include in an e-mail? How do you know that the e-mail will not be intercepted by a third party after you have sent it? This guide looks at countermeasures you can take to ensure that your e-mails only reach the intended recipient, and how to preserve confidentiality through the use of encryption. Protect your company’s reputation Crude jokes, obscene language or sexist remarks will have an adverse effect on your organisation’s reputation when they are found in e-mails sent out by your employees from their work account. This pocket guide offers advice on how to create an acceptable use policy to ensure that employee use of e-mail in the workplace does not end up embarrassing your organisation. The pocket guide provides a concise reference to the main security issues affecting those that deploy and use e-mail to support their organisations, considering e-mail in terms of its significance in a business context, and focusing upon why effective security policy and safeguards are crucial in ensuring the viability of business operations. About the authors: Professor Steven Furnell is Professor of Information Systems Security and Head of School at the University of Plymouth’s Centre for Security, Communications and Network Research. He is the author of Mobile Security: A Pocket Guide (2009), also published by IT Governance. Dr Paul Dowland is Senior Lecturer in Information Systems Security at the University of Plymouth’s Centre for Security, Communications and Network Research. He is the author or editor of over 70 research publications.

Artículos relacionados

  • Next Generation Search Engines
    Recent technological progress in computer science, Web technologies, and the constantly evolving information available on the Internet has drastically changed the landscape of search and access to information. Current search engines employ advanced techniques involving machine learning, social networks, and semantic analysis. Next Generation Search Engines: Advanced Models for ...
    Disponible

    256,63 €

  • Collaboration and the Semantic Web
    Collaborative working has been increasingly viewed as a good practice for organizations to achieve efficiency. Organizations that work well in collaboration may have access to new sources of funding, deliver new, improved, and more integrated services, make savings on shared costs, and exchange knowledge, information and expertise. Collaboration and the Semantic Web: Social Net...
    Disponible

    229,92 €

  • Resource Allocation in Next-Generation Broadband Wireless Access Networks
    With the growing popularity of wireless networks in recent years, the need to increase network capacity and efficiency has become more prominent in society. This has led to the development and implementation of heterogeneous networks. Resource Allocation in Next-Generation Broadband Wireless Access Networks is a comprehensive reference source for the latest scholarly research o...
    Disponible

    249,42 €

  • Advanced Topics in Information Technology Standards and Standardization Research, Volume 1
    Kai Jakobs
    ...
    Disponible

    118,72 €

  • Data Warehouses and OLAP
    ...
    Disponible

    118,72 €

  • Selected Readings on Database Technologies and Applications
    Terry Halpin
    Education and research in the field of database technology can prove problematic without the proper resources and tools on the most relevant issues, trends, and advancements. Selected Readings on Database Technologies and Applications supplements course instruction and student research with quality chapters focused on key issues concerning the development, design, and analysis ...
    Disponible

    256,64 €