LEADER 04600nam 2200661Ia 450 001 9910820872503321 005 20200520144314.0 010 $a1-280-08433-2 010 $a9786610084333 010 $a1-4175-0059-X 024 7 $a10.1596/0-8213-5759-X 035 $a(CKB)111087027998146 035 $a(OCoLC)54752538 035 $a(CaPaEBR)ebrary10051554 035 $a(SSID)ssj0000086521 035 $a(PQKBManifestationID)11123737 035 $a(PQKBTitleCode)TC0000086521 035 $a(PQKBWorkID)10026502 035 $a(PQKB)10933470 035 $a(MiAaPQ)EBC3050656 035 $a(Au-PeEL)EBL3050656 035 $a(CaPaEBR)ebr10051554 035 $a(CaONFJC)MIL8433 035 $a(The World Bank)2004040702 035 $a(US-djbf)13451282 035 $a(EXLCZ)99111087027998146 100 $a20040107d2004 uf 0 101 0 $aeng 135 $aurcn||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aElectronic safety and soundness $esecuring finance in a new age /$fThomas Glaessner, Tom Kellermann, and Valerie McNevin 205 $a1st ed. 210 $aWashington, DC $cWorld Bank$d2004 215 $aix, 174 pages $cillustrations ;$d26 cm 225 1 $aWorld Bank working paper ;$vno. 26 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a0-8213-5759-X 320 $aIncludes bibliographical references. 327 $aIntro -- TABLE OF CONTENTS -- Foreword -- Abstract -- Preface -- Executive Summary -- 1. Introduction to E-Security -- 2. Policy Framework -- 3. Legal and Regulatory Framework (Pillar 1) -- 4. External Monitoring of E-Security Practices (Pillar 2) -- 5. Certifications, Policies, Standards, and Procedures (Pillar 3) -- 6. Twelve Layers of Security (Pillar 4) -- Annexes: -- Annex A: Selected Public E-Security Incidents -- Annex B: Types of E-Fraud -- Annex C: Worldwide E-Security Industry -- Annex D: Risk Management: A Blueprint for Layered Security -- Annex E: Identity Management: Authentication and Non-Repudiation -- Annex F: Wireless Vulnerabilities -- Glossary -- References -- LIST OF BOXES: -- Box 1.1: Money Laundering -- Box 1.2: Selected Country Case Studies -- Box 2.1: G8 Principles for Protecting Critical Information Infrastructures 2003 -- Box 2.2: The Electronic Security Industry: Imperfect Competition -- Box 3.1: Money Transmitters and Internet Service Providers -- Box 4.1: Principles for Managing Risk in Online Banking -- Box 4.2: ISO/IEC 13335 Information Technology-Security Techniques-Guidelines for the Management of IT Security GMITS -- Box 6.1: Instant Messaging -- Box 6.2: Blended Threats -- Box 6.3: Survivable System Development -- Box B.1: Voice-over-IP (VOIP) -- Box B.2: Case Study: Bugbear.B -- Box B.3: Identity Theft: Abraham Abdallah -- Box C.1: Evolution of Technology and International Standards -- Box D.1: BITs Master Security Criteria -- Box D.2: The Future of Access Controls -- Box D.3: Next Generation Instruction Detection System -- Box D.4: SQL Vulnerability -- LIST OF FIGURES: -- Figure 1.1: E-Finance Penetration: 2000 and Projected Rates for 2005 and 2010 -- Figure 1.2: Number of Incidents Reported by CERT, Worldwide -- Figure 6.1: Five Layers of Data Flow -- Figure B.1: Computer Incidents 1990-2002. 327 $aFigure C.1: E-Security Industry and E-Finance -- Figure E.1: Biometric Iris Scan -- Figure E.2: Biometric Fingerprint Scan -- Figure E.3: Access Control Terminal -- Figure E.4: Biometric Facial Scan -- Figure E.5: Keystroking -- Figure E.6: Global Positioning Biometrics -- Figure E.7: Generation of Digital Signatures -- Figure E.8: Authentication Using Digital Certificates and Certificate Authorities -- Figure F.1: A GSM Hack -- Figure F.2: Diagram of a Virtual Private Network -- LIST OF TABLES: -- Table 1.1: Global Connectivity Trends -- Table B.1: Potential Losses from a Denial of Service Attack -- Table F.1: The Wide Range of Mobile Services. 410 0$aWorld Bank working paper ;$vno. 26. 606 $aElectronic funds transfers$xSecurity measures 606 $aElectronic security systems 615 0$aElectronic funds transfers$xSecurity measures. 615 0$aElectronic security systems. 676 $a332.1/78 700 $aGlaessner$b Thomas C$01180921 701 $aKellermann$b Tom$01715693 701 $aMcNevin$b Valerie$01715694 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910820872503321 996 $aElectronic safety and soundness$94110563 997 $aUNINA