Databases Reference
In-Depth Information
Chapter 54
Security
Management for the
World Wide Web
Lynda L. McGhie and Phillip Q. Maier
C
I
in ever-increasing
numbers, despite the fact that the overall and underlying environment is
not secure. To further complicate the matter, vendors, standards bodies,
security organizations, and practitioners cannot agree on a standard, com-
pliant, and technically available approach. As a group of investors con-
cerned with the success of the Internet for business purposes, it is critical
that we pull our collective resources and work together to quickly estab-
lish and support interoperable security standards; open security inter-
faces to existing security products and security control mechanisms within
other program products; and hardware and software solutions within het-
erogeneous operating systems which will facilitate smooth transitions.
OMPANIES
CONTINUE
TO
FLOCK
TO
THE
NTERNET
Interfaces and teaming relationships to further this goal include com-
puter and network security and information security professional associa-
tions (CSI, ISSA, NCSA), professional technical and engineering organiza-
tions (I/EEE, IETF), vendor and product user groups, government and
standards bodies, seminars and conferences, training companies/insti-
tutes (MIS), and informal networking among practitioners.
Having the tools and solutions available within the marketplace is a
beginning, but we also need strategies and migration paths to accommo-
date and integrate Internet, intranet, and World Wide Web (WWW) tech-
nologies into our existing IT infrastructure. While there are always emerg-
ing challenges, introduction of newer technologies, and customers with
challenging and perplexing problems to solve, this approach should
enable us to maximize the effectiveness of our existing security invest-
ments, while bridging the gap to the long awaited and always sought after
perfect solution!
Search WWH ::




Custom Search