E-business, recent threats and security countermeasures

被引:1
|
作者
Pournouri, Sina [1 ]
Craven, Matthew [2 ]
机构
[1] Sheffield Hallam Univ, Sheffield S1 1WB, S Yorkshire, England
[2] Univ Plymouth, SoCM, Plymouth PL4 8AA, Devon, England
关键词
e-business; security; electronic documents; cyberattacks; profiling; customers; cybercriminals; threats; risk; counter-measures; digital forensics;
D O I
10.1504/IJESDF.2014.064402
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Today, computers play a prominent role in human life and e-business makes the lives of people easier. Online shopping and electronic trade benefit both customers and companies. Although the concept of e-business has many advantages, it also furnishes cybercriminals opportunities to access, steal and manipulate data. Thus, security requirements ought to be considered by managers who run their businesses via computers and the internet. One of the first steps to defining security requirements is threat and risk assessment, which may be done by cyberattack profiling. This paper aims to profile recent cyberattacks, investigate trends and relationships between distinct factors and based on those, give security policies as security countermeasures. The work described was presented at the 9th ICGSSS Conference in December 2013.
引用
下载
收藏
页码:169 / 184
页数:16
相关论文
共 50 条
  • [1] Network viruses: challenges and threats to E-business
    Zuo, Yanjun
    Panda, Brajendra
    Sixth Wuhan International Conference on E-Business, Vols 1-4: MANAGEMENT CHALLENGES IN A GLOBAL WORLD, 2007, : 1275 - 1283
  • [2] The Security, Privacy, and Solutions of E-Business
    Huang, Hao
    Ma, Yuan
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON MANAGEMENT AND ENGINEERING (CME 2014), 2014, : 441 - 446
  • [3] Relationship of the properties in the e-business security
    Shen Yan-guang
    Si Chun-jing
    PROCEEDINGS OF THE 2007 INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE AND ENGINEERING - MANAGEMENT AND ORGANIZATION STUDIES SECTION, 2007, : 1128 - 1131
  • [4] E-business security: Methodological considerations
    Informatics Research Group, Sheffield Hallam University, Howard Street, S1 1WB, Sheffield, United Kingdom
    World Acad. Sci. Eng. Technol., 2009, (624-631):
  • [5] Algorithm aids e-business security
    不详
    IEEE MICRO, 2001, 21 (01) : 7 - 7
  • [6] The Countermeasures of E-Business Development for Chinese Travel Companies
    Zhang, Qinghua
    COMPONENTS, PACKAGING AND MANUFACTURING TECHNOLOGY, 2011, 460-461 : 288 - 291
  • [7] Security Design for E-Business Applications
    Vasilyevna, Nadejda Belbus
    INTERNATIONAL SYMPOSIUM ON UBIQUITOUS MULTIMEDIA COMPUTING, PROCEEDINGS, 2008, : 248 - 251
  • [8] Security requirements of E-business processes
    Knorr, K
    Röhrig, S
    TOWARDS THE E-SOCIETY: E-COMMERCE, E-BUSINESS, AND E-GOVERNMENT, 2001, 74 : 73 - 86
  • [9] E-business security in international perspective
    Karmakar, NL
    HUMAN PERSPECTIVES IN THE INTERNET SOCIETY: CULTURE, PSYCHOLOGY AND GENDER, 2004, 4 : 523 - 534
  • [10] The Structure of E-business Transaction Costs And The Control Countermeasures
    Zhao, Weishuang
    Wang, Na
    NINTH WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS, VOLS I-III, 2010, : 659 - 663