E-Commerce Security Planning

E-Commerce Security Planning

Daniel L. Ruggles (Technology Consulting Associates, LLC, USA)
Copyright: © 2004 |Pages: 11
DOI: 10.4018/978-1-59140-241-1.ch010
OnDemand PDF Download:
$37.50

Abstract

Multiple levels of potential security risk affect all the elements of an e-commerce site. Truly complete security protects three areas: (1) internal network and application services, (2) perimeter network access and application services, and (3) external network and services. To minimize security risks in these areas as well as to raise overall confidence in the e-commerce service, businesses must address problems with practical solutions involving privacy and security. Establishing an e-commerce trust infrastructure encompasses confidentiality, data integrity, non-repudiation and authentication. Striking the right balance between functionality and accessibility in e-commerce demands technical security measures. It also requires management vigilance with non-technical measures such as routine assessments of vulnerabilities, policies, education and a focus on making processes and policies easy to understand and simple to implement and monitor compliance.

Complete Chapter List

Search this Book:
Reset
Table of Contents
Foreword
Lawrence Oliva
Preface
Mehdi Khosrow-Pour
Acknowledgement
Chapter 1
An Overview  (pages 1-9)
Mehdi Khosrow-Pour
During the past two decades, the business world has witnessed a technological revolution known today as electronic commerce or ecommerce. This... Sample PDF
An Overview
$37.50
Chapter 2
Learning from Practice  (pages 11-75)
Mehdi Khosrow-Pour
To learn more about the views and practices of industry practitioners, this chapter outlines the result of an interview with a panel of e-commerce... Sample PDF
Learning from Practice
$37.50
Chapter 3
Troy J. Strader, Daniel M. Norris, Philip A. Houle, Charles B. Shrader
This chapter examines an entrepreneurial effort to provide products in the Internet security marketplace. The specific focus is on a company named... Sample PDF
How One Niche Player in the Internet Security Field Fulfills an Important Role
$37.50
Chapter 4
Edward J. Szewczak
The issue of personal information privacy (PIP) and e-commerce (EC) continues to be debated within the community of Internet users. The concerns of... Sample PDF
Personal Information Privacy and EC: A Security Conundrum?
$37.50
Chapter 5
Michelle Fong
The Chinese government has been keen to develop electronic commerce (e-commerce) as a source of economic growth and modernization. While B2B... Sample PDF
Developing Secure E-Commerce in China
$37.50
Chapter 6
Dieter Fink
Under the system of e-commerce, organisations leave themselves open to attack, which can have catastrophic consequences. This is because new risks... Sample PDF
Identifying and Managing New Forms of Commerce Risk and Security
$37.50
Chapter 7
Assafa Endeshaw
The nature of the Internet as an open network means that it is devoid of central control and regulation. That in turn has exposed the Internet to... Sample PDF
E-Commerce Security and the Law
$37.50
Chapter 8
Mahesh S. Raisinghani
The worldwide market for information security services will nearly triple to $21 billion by 2005, up from about $6.7 billion in 2000, according to... Sample PDF
Rethinking E-Commerce Security in the Digital Economy: A Pragmatic and Strategic Perspective
$37.50
Chapter 9
Pauline Ratnasingam
E-commerce–which is the sharing of business information, maintaining business relationships, and conducting business transactions by means of... Sample PDF
Security and the Importance of Trust in the Australian Automotive Industry
$37.50
Chapter 10
Daniel L. Ruggles
Multiple levels of potential security risk affect all the elements of an e-commerce site. Truly complete security protects three areas: (1) internal... Sample PDF
E-Commerce Security Planning
$37.50
Glossary of Terms