REVIEW PROBLEMS WITH SOLUTIONS •
457
list (ACL), which contains the identification of authorized users and the extent of their authorization.
Accountability Changes made to the Web site and its contents must be documented. To establish responsibility for any modifications made, a Web server log should be maintained.
Data Transmission In order to maintain the confidentiality and integrity of data transmitted via the Web, encryption should be employed.
Disaster Contingency and Recovery Plan Proper backup procedures, including fault tolerance, should be in place to minimize unexpected interruptions. A recovery plan should also be devised to ensure the reconstruction of lost data.