z-logo
open-access-imgOpen Access
E-Commerce/Network Security Considerations
Author(s) -
Carl S. Guynes,
Yu Wu,
John C. Windsor
Publication year - 2011
Publication title -
international journal of management and information systems
Language(s) - English
Resource type - Journals
eISSN - 1546-5748
pISSN - 2157-9628
DOI - 10.19030/ijmis.v15i2.4147
Subject(s) - computer security , computer science , security service , security through obscurity , security information and event management , security testing , network security , computer security model , cloud computing security , host (biology) , data integrity , network security policy , internet privacy , information security , cloud computing , ecology , biology , operating system
E-Commerce security issues can be grouped under the categories of system availability, data integrity, and data privacy. System availability means that all necessary components are available to support a given users transmission requirements. Data integrity means that all valid messages that are sent are received, messages are not altered in such as way as to make them invalid, and unauthorized messages are not introduced and transmitted over the network. Data privacy means that transmitted messages contain only 'need to know' information and are seen only by their intended audience. Enterprise network security is typically reactive, and relies heavily on host security. This approach creates complicated interactions between protocols and systems that can cause incorrect behavior and slow response to attacks. Network security at both the e-commerce and customer sites must be constantly reviewed and suitable countermeasures must be planned. The security of a site depends on the security of the internal systems and the security of external networks.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here