E-business, recent threats and security countermeasures

被引:1
|
作者
Pournouri, Sina [1 ]
Craven, Matthew [2 ]
机构
[1] Sheffield Hallam Univ, Sheffield S1 1WB, S Yorkshire, England
[2] Univ Plymouth, SoCM, Plymouth PL4 8AA, Devon, England
关键词
e-business; security; electronic documents; cyberattacks; profiling; customers; cybercriminals; threats; risk; counter-measures; digital forensics;
D O I
10.1504/IJESDF.2014.064402
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Today, computers play a prominent role in human life and e-business makes the lives of people easier. Online shopping and electronic trade benefit both customers and companies. Although the concept of e-business has many advantages, it also furnishes cybercriminals opportunities to access, steal and manipulate data. Thus, security requirements ought to be considered by managers who run their businesses via computers and the internet. One of the first steps to defining security requirements is threat and risk assessment, which may be done by cyberattack profiling. This paper aims to profile recent cyberattacks, investigate trends and relationships between distinct factors and based on those, give security policies as security countermeasures. The work described was presented at the 9th ICGSSS Conference in December 2013.
引用
收藏
页码:169 / 184
页数:16
相关论文
共 50 条
  • [31] ASPIDA: An Observatory for Security and Privacy in the Greek e-Business Sector
    Vlachos, Vasileios
    Katevas, Gerasimos
    Katsidimas, Ioannis
    Kerimakis, Emmanouil
    Nikoletseas, Sotiris
    Panagiotou, Stefanos
    Spirakis, Paul
    25TH PAN-HELLENIC CONFERENCE ON INFORMATICS WITH INTERNATIONAL PARTICIPATION (PCI2021), 2021, : 362 - 368
  • [32] On the novel network forensics perspective of enhanced e-business security
    Ren, W
    SHAPING BUSINESS STRATEGY IN A NETWORKED WORLD, VOLS 1 AND 2, PROCEEDINGS, 2004, : 1355 - 1360
  • [33] A-MVC : A security architecture on the e-business presentation layer
    Xiao, Kun
    Chen, Shihong
    Wang, Leichun
    Xiao, Jian
    SIXTH WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS, VOLS 1-4: MANAGEMENT CHALLENGES IN A GLOBAL WORLD, 2007, : 957 - 962
  • [34] The Importance of Information Security Management System in Slovak E-business
    Korcek, Frantisek
    Kokles, Mojmir
    Romanova, Anita
    VISION 2020: SUSTAINABLE ECONOMIC DEVELOPMENT, INNOVATION MANAGEMENT, AND GLOBAL GROWTH, VOLS I-IX, 2017, 2017, : 1705 - 1716
  • [35] Model Based Security Policy Assessment for E-Business Environment
    Chu, Wang
    Feng, Yanli
    PROCEEDINGS OF INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY (ISCSCT 2009), 2009, : 88 - 93
  • [36] Physical Layer Security for the Smart Grid: Vulnerabilities, Threats, and Countermeasures
    Islam, Shama Naz
    Baig, Zubair
    Zeadally, Sherali
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2019, 15 (12) : 6522 - 6530
  • [37] E-business opportunities in financial services
    Gary Boyes
    Merlin Stone
    Journal of Financial Services Marketing, 2003, 8 (2) : 176 - 189
  • [38] SMEs and e-business
    Hu, QY
    Li, JX
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON E-BUSINESS (ICEB2002), 2002, : 544 - 548
  • [39] Digital Signature Modeling in e-Business
    Saha, Goutam
    Desai, Mina
    Ghosh, Arghya
    Saha, Niladri
    2014 IEEE 11TH INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING (ICEBE), 2014, : 350 - 354
  • [40] Machine Learning Security: Threats, Countermeasures, and Evaluations
    Xue, Mingfu
    Yuan, Chengxiang
    Wu, Heyi
    Zhang, Yushu
    Liu, Weiqiang
    IEEE ACCESS, 2020, 8 : 74720 - 74742