E-business, recent threats and security countermeasures

被引:1
|
作者
Pournouri, Sina [1 ]
Craven, Matthew [2 ]
机构
[1] Sheffield Hallam Univ, Sheffield S1 1WB, S Yorkshire, England
[2] Univ Plymouth, SoCM, Plymouth PL4 8AA, Devon, England
关键词
e-business; security; electronic documents; cyberattacks; profiling; customers; cybercriminals; threats; risk; counter-measures; digital forensics;
D O I
10.1504/IJESDF.2014.064402
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Today, computers play a prominent role in human life and e-business makes the lives of people easier. Online shopping and electronic trade benefit both customers and companies. Although the concept of e-business has many advantages, it also furnishes cybercriminals opportunities to access, steal and manipulate data. Thus, security requirements ought to be considered by managers who run their businesses via computers and the internet. One of the first steps to defining security requirements is threat and risk assessment, which may be done by cyberattack profiling. This paper aims to profile recent cyberattacks, investigate trends and relationships between distinct factors and based on those, give security policies as security countermeasures. The work described was presented at the 9th ICGSSS Conference in December 2013.
引用
收藏
页码:169 / 184
页数:16
相关论文
共 50 条
  • [1] The Countermeasures of E-Business Development for Chinese Travel Companies
    Zhang, Qinghua
    COMPONENTS, PACKAGING AND MANUFACTURING TECHNOLOGY, 2011, 460-461 : 288 - 291
  • [2] Networking security and privacy strategies in e-business
    Tsai, N
    Ching, RKH
    Proceedings of the Second International Conference on Information and Management Sciences, 2002, 2 : 70 - 73
  • [3] Network viruses: challenges and threats to E-business
    Zuo, Yanjun
    Panda, Brajendra
    Sixth Wuhan International Conference on E-Business, Vols 1-4: MANAGEMENT CHALLENGES IN A GLOBAL WORLD, 2007, : 1275 - 1283
  • [4] Virtual network security: threats, countermeasures, and challenges
    Bays, Leonardo Richter
    Oliveira, Rodrigo Ruas
    Barcellos, Marinho Pilla
    Gaspary, Luciano Paschoal
    Mauro Madeira, Edmundo Roberto
    JOURNAL OF INTERNET SERVICES AND APPLICATIONS, 2015, 6
  • [5] Security and Privacy in IoT based E-Business and Retail
    Kaushik, Keshav
    Dahiya, Susheela
    PROCEEDINGS OF THE 2018 INTERNATIONAL CONFERENCE ON SYSTEM MODELING & ADVANCEMENT IN RESEARCH TRENDS (SMART), 2018, : 78 - 81
  • [6] The Structure of E-business Transaction Costs And The Control Countermeasures
    Zhao, Weishuang
    Wang, Na
    NINTH WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS, VOLS I-III, 2010, : 659 - 663
  • [7] Security Design for E-Business Applications
    Vasilyevna, Nadejda Belbus
    INTERNATIONAL SYMPOSIUM ON UBIQUITOUS MULTIMEDIA COMPUTING, PROCEEDINGS, 2008, : 248 - 251
  • [8] Research of E-Business Security Based on SOAP Protocol
    Wang, Yiran
    MANUFACTURING PROCESS TECHNOLOGY, PTS 1-5, 2011, 189-193 : 4304 - 4307
  • [9] Research on the Security Model for E-business Process Management
    Yu Xin
    Xia MingPing
    Yu, Bai
    2009 IEEE 16TH INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT, VOLS 1 AND 2, PROCEEDINGS, 2009, : 369 - +
  • [10] Modelling e-business security using business processes
    Nachtigal, S.
    Mitchell, C. J.
    SECRYPT 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2006, : 459 - +