AllFreePapers.com - All Free Papers and Essays for All Students
Search

Internet Security and Risk

Autor:   •  October 5, 2012  •  Case Study  •  1,052 Words (5 Pages)  •  1,066 Views

Page 1 of 5

Internet security and risk

Case study

1. Comment on the current tools and practices for ensuring e-business security in today’s organizations. What are some of the shortcomings in security addressed in the paper?

In today’s world, in any business security plays a vital role for its growth and development. They implement the practice of finding the threats in e-business and use the tools to resolve the problems that arise in the e-business. Customers who shop online or use e-business system may not feel secure about internal and external threats, mal functioning of the system etc, to use their credit cards while buying the products online. To minimize this threats e-business firms use the tools like firewall software, highly developed and secure servers, intrusion detection software and digital certificates. And to ensure these tools are working with minimum threats they develop a checklist which includes:-

a. Physical protection of computer g. antivirus software

b. Email control security h. digital certificates

c. Email control security I. strong authentication

d. Firewalls j. access control

e. Encryption k. audit and tracing software

f. PKI l. backup and disaster recovery

Though business firms implement many tools and practices to minimize the risk the customers still do not feel secure for buying products online. They fell there is still a threat in buying the products. Similarly the devices and tools they use are not 100% efficient all the times. This all makes the customers feel unsecure about tools and practices implemented by the e-business firms.

2. List and discuss the main steps for information security presented in the paper?

a. Develop a corporate risk consciousness and risk management orientation: - Strong organizational foundation is very essential for any security policy to be implemented. Both management and employees must have the sense to safeguard their information resources.

b. Performing risk assessment:-Risk assessment is based on identifying threats, vulnerabilities and cost. 100% system effectiveness will produce zero risk.

c. Devise a systematic risk management based e-business security policy:- organization must have comprehensive and coherent security policy. Those policies must contain system component, internal and external threats,

...

Download as:   txt (5.5 Kb)   pdf (85.9 Kb)   docx (12 Kb)  
Continue for 4 more pages »