|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910820872503321 |
|
|
Autore |
Glaessner Thomas C |
|
|
Titolo |
Electronic safety and soundness : securing finance in a new age / / Thomas Glaessner, Tom Kellermann, and Valerie McNevin |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Washington, DC, : World Bank, 2004 |
|
|
|
|
|
|
|
ISBN |
|
1-280-08433-2 |
9786610084333 |
1-4175-0059-X |
|
|
|
|
|
|
|
|
Edizione |
[1st ed.] |
|
|
|
|
|
Descrizione fisica |
|
ix, 174 pages : illustrations ; ; 26 cm |
|
|
|
|
|
|
Collana |
|
World Bank working paper ; ; no. 26 |
|
|
|
|
|
|
Altri autori (Persone) |
|
KellermannTom |
McNevinValerie |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Electronic funds transfers - Security measures |
Electronic security systems |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Bibliographic Level Mode of Issuance: Monograph |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references. |
|
|
|
|
|
|
Nota di contenuto |
|
Intro -- TABLE OF CONTENTS -- Foreword -- Abstract -- Preface -- Executive Summary -- 1. Introduction to E-Security -- 2. Policy Framework -- 3. Legal and Regulatory Framework (Pillar 1) -- 4. External Monitoring of E-Security Practices (Pillar 2) -- 5. Certifications, Policies, Standards, and Procedures (Pillar 3) -- 6. Twelve Layers of Security (Pillar 4) -- Annexes: -- Annex A: Selected Public E-Security Incidents -- Annex B: Types of E-Fraud -- Annex C: Worldwide E-Security Industry -- Annex D: Risk Management: A Blueprint for Layered Security -- Annex E: Identity Management: Authentication and Non-Repudiation -- Annex F: Wireless Vulnerabilities -- Glossary -- References -- LIST OF BOXES: -- Box 1.1: Money Laundering -- Box 1.2: Selected Country Case Studies -- Box 2.1: G8 Principles for Protecting Critical Information Infrastructures 2003 -- Box 2.2: The Electronic Security Industry: Imperfect Competition -- Box 3.1: Money Transmitters and Internet Service Providers -- Box 4.1: Principles for Managing Risk in Online Banking -- Box 4.2: ISO/IEC 13335 Information Technology-Security Techniques-Guidelines for the Management of IT Security GMITS -- Box 6.1: Instant Messaging -- Box 6.2: Blended Threats -- Box 6.3: Survivable System Development -- |
|
|
|
|