E-business, recent threats and security countermeasures

被引:1
|
作者
Pournouri, Sina [1 ]
Craven, Matthew [2 ]
机构
[1] Sheffield Hallam Univ, Sheffield S1 1WB, S Yorkshire, England
[2] Univ Plymouth, SoCM, Plymouth PL4 8AA, Devon, England
关键词
e-business; security; electronic documents; cyberattacks; profiling; customers; cybercriminals; threats; risk; counter-measures; digital forensics;
D O I
10.1504/IJESDF.2014.064402
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Today, computers play a prominent role in human life and e-business makes the lives of people easier. Online shopping and electronic trade benefit both customers and companies. Although the concept of e-business has many advantages, it also furnishes cybercriminals opportunities to access, steal and manipulate data. Thus, security requirements ought to be considered by managers who run their businesses via computers and the internet. One of the first steps to defining security requirements is threat and risk assessment, which may be done by cyberattack profiling. This paper aims to profile recent cyberattacks, investigate trends and relationships between distinct factors and based on those, give security policies as security countermeasures. The work described was presented at the 9th ICGSSS Conference in December 2013.
引用
收藏
页码:169 / 184
页数:16
相关论文
共 50 条
  • [21] SECURITY IN E-BUSINESS Understanding Customers Perceptions and Concerns
    Alqatawna, Ja'far
    Siddiqi, Jawed
    Btoush, Mohammed Hjouj
    WEBIST 2010: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS AND TECHNOLOGY, VOL 2, 2010, : 319 - 324
  • [22] E-business - Security lane added to the information highway
    D'Amico, E
    CHEMICAL WEEK, 2002, 164 (17) : 21 - 23
  • [23] Security features and technologies for E-business architecture design
    Chen, Hao
    Corriveau, Jean-Pierre
    IMECS 2007: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, VOLS I AND II, 2007, : 1150 - +
  • [24] Security and Privacy in IoT based E-Business and Retail
    Kaushik, Keshav
    Dahiya, Susheela
    PROCEEDINGS OF THE 2018 INTERNATIONAL CONFERENCE ON SYSTEM MODELING & ADVANCEMENT IN RESEARCH TRENDS (SMART), 2018, : 78 - 81
  • [25] Research on the status quo and problems in the development of E-business in China and the countermeasures
    Zhao, Yuexin
    Xu, Wei
    TWELFTH WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS, 2013, : 238 - 246
  • [26] A security architecture for E-business based on grid technology
    Zhou, Ning
    Zhang, Fangfang
    Yu, Xiaosheng
    FIFTH WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS, VOLS 1-3: INTEGRATION AND INNOVATION THROUGH MEASUREMENT AND MANAGEMENT, 2006, : 1352 - 1356
  • [27] Directions for security and privacy for Semantic E-business applications
    Thuraisingham, B
    COMMUNICATIONS OF THE ACM, 2005, 48 (12) : 71 - 73
  • [28] Public Key Infrastructure: managing the e-Business security
    Lai, XJ
    INFORMATION SECURITY FOR GLOBAL INFORMATION INFRASTRUCTURES, 2000, 47 : 505 - 505
  • [29] A METHOD TO ENSURE DATA SECURITY IN E-BUSINESS CLOUD
    Gong, Jingyi
    Han, Kaifeng
    2012 IEEE 2ND INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENT SYSTEMS (CCIS) VOLS 1-3, 2012, : 422 - 425
  • [30] If e-business is different, then so is research in e-business
    Clarke, R
    SEEKING SUCCESS IN E-BUSINESS: A MULTIDISCIPLINARY APPROACH, 2003, 123 : 3 - 19