e_security

e_security - The E-Commerce Security Environment 1...

Info iconThis preview shows pages 1–9. Sign up to view the full content.

View Full Document Right Arrow Icon
The E-Commerce Security Environment 1
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Dimensions of E-Commerce Security Integrity – ability to ensure that information being displayed on the Web site or transmitted/received over the Internet has not altered by an unauthorized party Non-repudiation – ability to ensure that e- commerce participants do not deny their online action Authenticity – the ability to identify the identity of a person or entity with whom you are dealing on the internet 2
Background image of page 2
Dimensions of E-Commerce Security (continue) Confidentiality – the ability to ensure that messages and data are available only to those who are authorize to view them Privacy – the ability to control the use of information about oneself Availability – the ability to ensure that an e- commerce site continue to function as intended 3
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Customer and Merchant Perspectives on the Different Dimensions of E-commerce Security 4
Background image of page 4
The Tension Between Security and Other Values Security vs. ease of use: the more security measures added, the more difficult a site is to use, and the slower it becomes Security vs. desire of individuals to act anonymously 5
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Security Threats in the E-commerce Environment Three key points of vulnerability: Client Server Communications channel 6
Background image of page 6
A Typical E-commerce Transaction 7 SOURCE: Boncella, 2000.
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Vulnerable Points in an E-commerce Environment 8 SOURCE: Boncella, 2000.
Background image of page 8
Image of page 9
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 17

e_security - The E-Commerce Security Environment 1...

This preview shows document pages 1 - 9. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online