Research Article

Ten-Stage Security Management Strategy Model for the Impacts of ëSecurity Threats on E ñBusinessí

by  Narendra Kumar Tyagi, Dr.S.Srinivasan
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 21 - Issue 5
Published: May 2011
Authors: Narendra Kumar Tyagi, Dr.S.Srinivasan
10.5120/2511-3400
PDF

Narendra Kumar Tyagi, Dr.S.Srinivasan . Ten-Stage Security Management Strategy Model for the Impacts of ëSecurity Threats on E ñBusinessí. International Journal of Computer Applications. 21, 5 (May 2011), 1-4. DOI=10.5120/2511-3400

                        @article{ 10.5120/2511-3400,
                        author  = { Narendra Kumar Tyagi,Dr.S.Srinivasan },
                        title   = { Ten-Stage Security Management Strategy Model for the Impacts of ëSecurity Threats on E ñBusinessí },
                        journal = { International Journal of Computer Applications },
                        year    = { 2011 },
                        volume  = { 21 },
                        number  = { 5 },
                        pages   = { 1-4 },
                        doi     = { 10.5120/2511-3400 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2011
                        %A Narendra Kumar Tyagi
                        %A Dr.S.Srinivasan
                        %T Ten-Stage Security Management Strategy Model for the Impacts of ëSecurity Threats on E ñBusinessí%T 
                        %J International Journal of Computer Applications
                        %V 21
                        %N 5
                        %P 1-4
                        %R 10.5120/2511-3400
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper is an attempt to give a high-level overview of security in the e-business world. e-Business includes informational websites that are being fielded on an almost daily basis by companies. This paper attempted to view security concerns as a problem to be solved with technology and main consideration is to which firewall or encryptography should use rather than formulating a security strategy. Technology is next to useless unless applied within a strategy, just as tanks are wasted without an overall battle plan. Some of the security threats areas, such as services advertising, require the implementation of only few, security controls, while others, like customer recruitment/registration, require more comprehensive controls, to ensure compliance with money and customer’s requirements. This paper throws light into the kinds of various concerns a person should be worrying and providing a look at some of the security technologies available.

References
  • Bajaj, k kamlesh, And Nag, debjani ‚ÄúE-commerce The cutting edge of Business‚Äù, Tata mcgraw hill, pp 197-200 (2002).
  • Bichler Martin ‚ÄúFuture of E-Markets Multi Dimensional Market Mechanism‚Äù Cambridge University Press, U.K., pp 17-20 (2001).
  • CISCO ‚ÄúTop five security issues for small and madiem sized business‚Äù, Cisco white paper http://www.cisco.com/en/US/ns643/networking_solutions_white_paper0900aecd804606fc.shtml (2005)
  • S. Jajodia, S. Noel, B. O‚ÄôBerry. ‚ÄúTopological analysis of network attack vulnerability‚Äù, in Managing Cyber Threats: Issues, Approaches and Challanges, V. Kumar, J. Srivastava, and A. Lazarevic (eds.), Springer, Germany, (2003).
  • Chopra, Anil and Roy Anindya ‚ÄúNew threats to online banking‚Äù. Pcquest, pp62-67 [ July, 2005]
  • Tervueren Avenue de, ‚ÄúSecurity guidelines for E- banking‚Äù (August, 2004).
  • Upfold C.T. and Sewry D.A.(2005), ‚ÄúAn Investigation of Information Security In Small And Medium Enterprises(SME‚Äôs)In Eastern Cape‚Äù http://icsa.cs.up.ac.za/issa/2005/Proceedings/Research/082Article.pdf
  • ‚ÄúLife on the Internet‚Äù, http://www.pbs.org/internet/timeline (2001).
  • S. J. Russell, P. Norvig, ‚ÄúArtificial Intelligence: A Modern Approach‚Äù, Prentice Hall, New Jersey, (1995).
  • Narendra Kumar Tyagi, research paper ‚Äúe-Bus : web services‚Äù in International Conference ‚Äúicsci-09‚Äù held in Hyderabad (7-10 Jan, 2009)
  • Narendra Kumar Tyagi, ‚ÄúData Security from Malicious Attack: Computer Virus‚Äù, BVIM Indiacom2010 (Track 2: Web Technologies, Computer Networks & Information Security (G -III)) National conference Proceedings at BVICAM, Paschim vihar, New Delhi (26-27th Feb 2010)
  • For a similar approach see US GAO (1999).
  • Narendra Kumar Tyagi, ‚ÄúEncountering with security Threats in e-Business using Agent Based Attack Simulator‚Äù International Conference at DIAS Rohini, Delhi on 3rd January 2011.
  • Narendra Kumar Tyagi, research paper, ‚ÄúDatabase Security from Malicious Attack: Multi Agent System Approach‚Äù in AICTE sponsored National Seminar on Artificial Intelligence NSAI-09 proceeding (17 july 2009).
  • Search Security.com, Firewal www.progress.com/webspeed/whitepapers/securing_firewall.htm
  • Narendra Kumar Tyagi, ‚ÄúSecurity Threats in e-Business with Safety and Dependability‚Äù, ‚ÄúGlobal Journal of Enterprise System (GJEIS)‚Äù July2010-Dec 2010 (pp 68-71) http://gjeis.academician.co.in/ ; www.ejournal.co.in/gjeis
  • Narendra Kumar Tyagi, ‚ÄúNullifying the Impacts of Security Threats on e-Business using Cryptography with e-BSP‚Äù (Track 2: Web Technologies, Computer Networks & Information Security) National conference INDIACOM-2011 at Bharati Vidyapeeth Institute of Computer Applications and Management, Paschim vihar, New Delhi , 10-11th March 2011.
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

e-business Internet Security phishing measurement survey method basic advanced technologies

Powered by PhDFocusTM