E-business, recent threats and security countermeasures

被引:1
|
作者
Pournouri, Sina [1 ]
Craven, Matthew [2 ]
机构
[1] Sheffield Hallam Univ, Sheffield S1 1WB, S Yorkshire, England
[2] Univ Plymouth, SoCM, Plymouth PL4 8AA, Devon, England
关键词
e-business; security; electronic documents; cyberattacks; profiling; customers; cybercriminals; threats; risk; counter-measures; digital forensics;
D O I
10.1504/IJESDF.2014.064402
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Today, computers play a prominent role in human life and e-business makes the lives of people easier. Online shopping and electronic trade benefit both customers and companies. Although the concept of e-business has many advantages, it also furnishes cybercriminals opportunities to access, steal and manipulate data. Thus, security requirements ought to be considered by managers who run their businesses via computers and the internet. One of the first steps to defining security requirements is threat and risk assessment, which may be done by cyberattack profiling. This paper aims to profile recent cyberattacks, investigate trends and relationships between distinct factors and based on those, give security policies as security countermeasures. The work described was presented at the 9th ICGSSS Conference in December 2013.
引用
收藏
页码:169 / 184
页数:16
相关论文
共 50 条
  • [31] E-business security design using process security requirements septet
    Nachtigal, S.
    SECRYPT 2007: PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2007, : 408 - 413
  • [32] Accountancy for E-Business Enterprises Based on Cyber Security
    Yang, Yu
    Yin, Zecheng
    INTERNATIONAL JOURNAL OF DATA WAREHOUSING AND MINING, 2023, 19 (06)
  • [33] E-business Workflow Security Architecture based on UCON
    Wen, Haoyu
    Ji, Dongxing
    2009 IEEE 16TH INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT, VOLS 1 AND 2, PROCEEDINGS, 2009, : 338 - 340
  • [34] Research on the Security Model for E-business Process Management
    Yu Xin
    Xia MingPing
    Yu, Bai
    2009 IEEE 16TH INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT, VOLS 1 AND 2, PROCEEDINGS, 2009, : 369 - +
  • [35] Preserving Consistency and Security of Data in E-business Applications
    Boboila, Cristea
    Constantinescu, Nicolae
    Boldea, Costin-Radu
    RECENT ADVANCES IN MATHEMATICS AND COMPUTERS IN BUSINESS, ECONOMICS, BIOLOGY & CHEMISTRY, 2010, : 211 - +
  • [36] Smart cards and digital signatures for e-business security
    Patriciu, VV
    Podaru, V
    Bica, I
    6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL XVIII, PROCEEDINGS: INFORMATION SYSTEMS, CONCEPTS AND APPLICATIONS OF SYSTEMICS, CYBERNETICS AND INFORMATICS, 2002, : 124 - 129
  • [37] On a new approach for e-business security - Network forensics
    Wei, R
    THIRD WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS: GLOBAL BUSINESS INTERFACE, 2004, : 516 - 522
  • [38] Research of E-Business Security Based on SOAP Protocol
    Wang, Yiran
    MANUFACTURING PROCESS TECHNOLOGY, PTS 1-5, 2011, 189-193 : 4304 - 4307
  • [39] Trust, privacy and security in e-business: Requirements and solutions
    Katsikas, SK
    Lopez, J
    Pernul, G
    ADVANCES IN INFORMATICS, PROCEEDINGS, 2005, 3746 : 548 - 558
  • [40] Architecture environments for E-business agent based on security
    Shin, HJ
    Lee, SG
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2004, PT 1, 2004, 3043 : 625 - 634