𝔖 Bobbio Scriptorium
✦   LIBER   ✦

A management view of internet electronic commerce security

✍ Scribed by Charles Cresson Wood


Publisher
Elsevier Science
Year
1997
Tongue
English
Weight
586 KB
Volume
16
Category
Article
ISSN
0167-4048

No coin nor oath required. For personal study only.

✦ Synopsis


The Role of Risk Assessment

Although some have attempted it, one cannot simply read a brochure, go and buy an Internet electronic commerce product, and thereby achieve an adequate level of security. Although it's now possible to achieve adequate security with a variety of commercial off-the-shelf products, merchant organizations in most instances must provide considerable systems integration effort. A number of vendors are making this integration process easier when they provide suites of products cobbled together from various vendors.

For each merchant there are many risk factors to consider, and many relationships between these factors. It would be attractive if there were a one-size-fits-all approach, but in reality each merchant needs to perform its own risk assessment. This risk assessment should identify the unique risks related to the proposed Internet business activity, suitable controls that address these risks, and the inter-relationships between these controls. For example, if one control fails, will there be another one to prevent serious harm to the organization? This new and complex environment 0 Baseline Software, Inc.


πŸ“œ SIMILAR VOLUMES


Managing X-commerce: The importance of a
✍ Richard Barber πŸ“‚ Article πŸ“… 2001 πŸ› Elsevier Science 🌐 English βš– 181 KB

This means an organization needs to be able to have a single overall view of its security so that one clear security strategy drives everything. This guards against unwarranted revenue threats. The centre of this strategy needs to be a security 'architecture' upon which all sales channels operate.

Jikzi β€” a new framework for security pol
✍ R. Anderson; J.-H. Lee πŸ“‚ Article πŸ“… 2000 πŸ› Elsevier Science 🌐 English βš– 200 KB

In this paper, we will describe a thread of research, which we have followed off and on at Cambridge for about three years. Our topic is the security of electronic documents, in the broad sense: how can we be sure of the authenticity of things that are published electronically? This started off as