Skip to main content

Security Considerations for Extranets

Increasingly extranets are being used by organizations to conduct e-business operations. However, an extranet must be properly planned, implemented and maintained to ensure that it does not pose an unacceptable risk to an organization's internal data and information systems. This paper identifies potential risks associated with extranets and the actions that can be taken to mitigate against them.

527 (PDF, 1.70MB)

18 Dec 2001
ByKaren Korow-Diks
Share
All papers are copyrighted

No re-posting of papers is permitted

Subscribe to GIAC’s Monthly Newsletter

Receive expert insights, priority access to certifications, essential updates on regulatory changes and industry developments.