Redirigiendo al acceso original de articulo en 23 segundos...
ARTÍCULO
TITULO

E-Commerce/Network Security Considerations

Carl S. Guynes    
Yu Andy Wu    
John Windsor    

Resumen

E-Commerce security issues can be grouped under the categories of system availability, data integrity, and data privacy. System availability means that all necessary components are available to support a given users transmission requirements. Data integrity means that all valid messages that are sent are received, messages are not altered in such as way as to make them invalid, and unauthorized messages are not introduced and transmitted over the network. Data privacy means that transmitted messages contain only 'need to know' information and are seen only by their intended audience. Enterprise network security is typically reactive, and relies heavily on host security. This approach creates complicated interactions between protocols and systems that can cause incorrect behavior and slow response to attacks. Network security at both the e-commerce and customer sites must be constantly reviewed and suitable countermeasures must be planned. The security of a site depends on the security of the internal systems and the security of external networks.

 Artículos similares

       
 
Seonghyeon Gong, Abir EL Azzaoui, Jeonghun Cha and Jong Hyuk Park    
The service-based architecture of the Fifth Generation(5G) had combined the services and security architectures and enhanced the authentication process of services to expand the coverage of the network, including heterogeneous devices. This architecture ... ver más
Revista: Applied Sciences

 
Grzegorz Zimon and Dominik Zimon    
Working capital is designed to provide enterprises with financial security. Its level depends on the strategy of managing individual elements of working capital. An appropriate management strategy allows companies to obtain added working capital. Working... ver más

 
Gabriel Nyame and Zhiguang Qin    
Role-based access control (RBAC) continues to gain popularity in the management of authorization concerning access to knowledge assets in organizations. As a socio-technical concept, the notion of role in RBAC has been overemphasized, while very little a... ver más
Revista: Information

 
Khairunisa Sharif,Bastian Tenbergen     Pág. 15 - 30
Intelligent voice assistants are internet-connected devices, which listen to their environment and react to spoken user commands in order to retrieve information from the internet, control appliances in the household, or notify the user of incoming messa... ver más

 
Sara Larno,Ville Seppänen,Jarkko Nurmi     Pág. 57 - 71
Organizations need to consider many facets of information security in their daily operations ? among others, the rapidly increasing use of IT, emerging technologies and digitalization of organizations? core resources provoke new threats that can be diffi... ver más