E-Commerce Security: Advice from Experts (IT Solutions series)

 < Day Day Up > 


With the introduction of e-commerce, the Information Technology and Systems (ITS) environment has changed substantially and business is no longer conducted ‘as usual'. While some of the risks associated with e- commerce are not new (e.g., hacking, theft of intellectual property), new insecurities have arisen because of the far-reaching scope of e-commerce. To understand the new risk environment, it is necessary to contrast it with that of the previous ITS environment.

Compared to the RSM processes of older ITSs, those for e- commerce have become more complex and greater interdependencies have to be considered. Furthermore, the nature of assets to be protected has changed and business continuity has become critical. The changes are reflected in Figure 1.

click to expand Figure 1: The Processes of E-Commerce Risk and Security Management

Security responses to the e-commerce risks identified here have also changed, especially when compared to traditional approaches. They are reflected in Table 1.

Table 1: E-Commerce Security Issues and Responses

Security Domain

Traditional Approach

E-Commerce

Access

Locks and keys, fences and walls

Firewall software

Confidentiality

Limit physical access to documents

Encryption

Authentication

Letterheads, written signatures

Identification and passwords Digital signatures and certificates

Integrity

Clerical checking and managerial control

Organization controls Application controls

Attack

Theft of goods

Computer viruses Computer crime

Continuity

Manual processing and recovery

Electronic backup and recovery

As can be seen from the above table, a number of new technology- based security approaches are needed for e-commerce. They include firewall software which has the purpose of securing the internal 'trusted' network from the external 'untrusted' network through a highly monitored access point. The software provides essential protection against computer hackers. Other important technologies are encryption, where confidential and sensitive information is changed to protect content, and digital signatures and certificates which take the place of handwritten signatures and physical evidence of a person's credentials.


 < Day Day Up > 

Категории