Information Security Standards for E-businesses
نویسندگان
چکیده
The process of buying, selling or interacting with customers via Internet, Tele-sale, Smart card or other computer network is referred to as Electronics Commerce. Whereas online trade has been touting its flexibility, convenience and cost savings, the newest entrant is wireless e-commerce. This form of business offers many attractions; including 24 hours seven days’ open shop–business, vastly reduced fixed cost, and increased profitability. Amazon.com is an example of a successful venture, in e-business. Internet Service providers (ISP/ASP) have a significant influence on the feasibility, security and cost competitiveness of an e-business venture. In the ISP model of services, multiple users and their databases are normally offered on a single hardware, platform sharing the same IP address and Domain name. Clients will require a mechanism, which allows them to update their Web contents and databases frequently even many times daily without intervention of local system Administrator (ISP Admin). The paper overviews few steps to enable corporate clients to update their web content more securely. Keywords-E-Commerce, E-business, Information Security, ISP/ASP, Satti, Nagrial, Garner,
منابع مشابه
The Adoption of Information Security Management Standards A Literature Review
This chapter introduces major information security management methods and standards, and particularly ISO/IEC 27001 and 27002 standards. A literature review was conducted in order to understand the reasons for the low level of adoption of information security standards by companies, and to identify the drivers and the success factors in implementation of these standards. Based on the findings o...
متن کاملInformation Protection Management Structures in Australian E-courts
This issues paper is concerned with ensuring the integrity of Australia’s e-court processes through the development of information protection standards and protocols. The integrity of the court process is important to the national interest because businesses and citizens depend on the certainty of court decisions, naturally assuming that their information and privacy is protected. This paper is...
متن کاملA Model for Information Security Governance in Developing Countries
The proliferation of e-business, e-services and e-governance in developing countries has resulted in businesses and governments becoming highly dependent on business information and related information technologies. Such information is, however, constantly exposed to real threats that could result in security breaches. If these are realised, the prevailing economic structure of a developing cou...
متن کاملDetermining the appropriate methodology for the security evaluation of equipment related to information and communication technology in the power industry
Providing security in the vital infrastructures of the country, is one of the essential operations that must be taken in order to improve the security of the country. Resistant security strategies need to be regularly implemented as a dynamic process to improve security, and security evaluation is one of the most important steps in this process. Methodology in the field of evaluation in both te...
متن کاملInformation Security Compliances and Knowledge Management Capabilities in International Diversification
Information security compliance has become one of the top priorities for firms to remain competitive in this era. It is even more challenging to comply with foreign standards and laws, when a firm aims to internationalize its operations and remain competitive. This paper discusses the role of information security compliances in international diversification phenomena. Specifically, drawing from...
متن کاملTowards an Ontology-Driven Approach for the Interoperability Problem in Security Compliance
In today’s IT-centric, regulated and competitive environment, businesses rely more heavily on IT technologies. Organizations are often challenged by customers, business partners and legal entities to demonstrate their compliance to different IT security and performance standards. The existence of heterogeneous standards and regulations raises the interoperability problem for organizations havin...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2002