ESecurity

Written by Michelle Johnston


ESecurity

Current Situation

Up until recently, security was very much like teenage sex in that it was typified by lots of talk but no action. Companies declared their sites as secure simply becauserepparttar credit card payment page was protected by SSL (Secure Socket Layer). Even now, there is an overwhelming sense of complacency acrossrepparttar 118768 industry.

However, Etailers, are reportedly still finding that web shoppers are still very concerned about security. It is becoming increasingly essential that Etailers gainrepparttar 118769 trust and confidence of their customers in order to gain competitive advantage over their competition, but also, simply to stay in business.

Withrepparttar 118770 increasing use of Ebusiness for enabling business processes and operations acrossrepparttar 118771 internet, it is critical for organizations to recognize information as a valuable business asset and implement controls to secure it, to ensurerepparttar 118772 privacy of their customer’s data,repparttar 118773 integrity of that data and to ensure that they do not lose it!

General Security Issues

The aim of a good security strategy for an Ebusiness organization should be to combine maximum flexibility, performance, and scalability withrepparttar 118774 highest availability and security. The goal of a security strategy is to protect information assets through:

•Authentication – identifyingrepparttar 118775 parties involved in communications and transactions •Access – provide access to appropriate levels of information (with as little inconvenience as possible) to those who should have access, but prevent access to anyone who should not have access, and prevent access beyondrepparttar 118776 level of information that is appropriate torepparttar 118777 user’s ‘class’ •Confidentiality – ensuring that information is not accessed by unauthorized parties •Non-Repudiation – ensuring that transactions, once committed, are legally valid and irrevocable •Availability – ensuring that transactions or communications can be executed reliably upon demand.

Top management needs to understand that security is a hygiene factor: when it is there, and is effective and efficient, people hardly notice it at all; however, when it is not there it can meanrepparttar 118778 end of business overnight. It is essential to get it right, particularly for transactions placed overrepparttar 118779 Internet.

Further, management needs to understand that security is a never-ending process. Security policies and measures should be under constant review, network support teams should monitor newsgroups etc for information aboutrepparttar 118780 latest threats to security (e.g.repparttar 118781 latest virus attacks, hackers , security loopholes in software products, etc), security audits must take place to ensure procedures are working, logs of unauthorized access should be reviewed, and disaster recovery plans should be tested out regularly.

Many companies have now either been bitten byrepparttar 118782 problems inherent in having no real built in security policies, or have seen media reports about others who have been bitten.

MSNBC reported cases in which large numbers of credit card numbers and associated information had been stolen from sites in March 2000. Visa had earlier announced that around half its disputes concern internet based credit card transactions, despite these only making up 2% of its total revenue . The Melissa virus caused an estimated $80 million damage, andrepparttar 118783 Love Bug similarly wreaked havoc acrossrepparttar 118784 world. Denial of Service attacks have hit big names like Amazon.com, Ebay and Yahoo, causing loss in terms of revenue and public image.

There is much evidence to suggest that reported cases are simplyrepparttar 118785 tip of a very large iceberg as many security breaches go unreported due torepparttar 118786 embarrassment caused by admitting to them andrepparttar 118787 risks to future business of doing so.

Forrepparttar 118788 consumer, there is not onlyrepparttar 118789 worry that personal information such as credit card data could be stolen, but there is alsorepparttar 118790 worry that anyone they appear to be dealing with onrepparttar 118791 internet could be untrustworthy – and even when dealing with a company known and trusted there isrepparttar 118792 risk that in realityrepparttar 118793 consumer is dealing with an imposter. Thus, it is up to those with integrity who are running websites to find ways to reassurerepparttar 118794 consumer that it is safe to use their websites – for example, by providing Digital Certificates verified by a trusted third party such as Verisign .

It is very difficult for Governments andrepparttar 118795 Legislation systems to protectrepparttar 118796 consumer from internet fraudsters and conmen because national boundaries are very difficult to establish or enforce onrepparttar 118797 internet as content is accessible from everywhere. The US and UK, among others, are investigatingrepparttar 118798 possibility of policingrepparttar 118799 internet using national ‘cybercrime units’. Financial regulators such asrepparttar 118800 SEC inrepparttar 118801 US andrepparttar 118802 FSA inrepparttar 118803 UK are looking at measures to help them in controlling websites within their own jurisdictions. International bodies likerepparttar 118804 OECD andrepparttar 118805 European Union are working on standards for Ecommerce to be implemented and enforced at a national level by governments, but progress is very slow because industry opposesrepparttar 118806 idea of government intervention, preferring to rely on self-regulation.

Procedures

At last, many large organizations are now taking security fairly seriously. However there is still a great deal of misunderstanding about what security really means for an organization that uses Internet technologies to trade.

Organizations deploying internet technologies tend to focus onrepparttar 118807 technologies rather thanrepparttar 118808 procedures behindrepparttar 118809 technologies. Having solid security procedures in place is often much more important thanrepparttar 118810 technology which is used to implement security. The benefits of using SSL to gather credit card information from a consumer overrepparttar 118811 web could be nullified if it is common practice withinrepparttar 118812 organization to subsequently email them from one department to another. Putting virus scanning technology into place in an organization is only useful ifrepparttar 118813 virus scanner is updated regularly as new viruses are found. Procedures are required to ensure thatrepparttar 118814 technologies are being used effectively to meetrepparttar 118815 organizational security goals.

Such procedures should include clear divisions of responsibility forrepparttar 118816 different areas of security: backup procedures, disaster recovery procedures, physical security (security card control, building security, etc), password procedures, system access levels and authorization procedures, virus control procedures, firewall policies, and all other traditional areas of security which an organization should have under control.

Procedures should ensure that whenever not in use, server consoles should be locked using passwords, that all access attempts to all systems are logged and audited and that passwords are not easily guessed and are changed regularly. They should ensure that all network systems and web servers are kept in secure locations, and that redundancy systems exist for all key hardware – not onlyrepparttar 118817 network systems themselves (including servers, firewalls, hubs and routers) but also air conditioning and power systems.

A top European site enters Canada with Intoko.ca

Written by Janine Vanderhoeven


Intoko.ca provides Canada with a 24/7 easy-to-use advertising site which offers more advantages than an auction site. One ofrepparttar advantages is that Intoko is not only trading and dealing but offersrepparttar 118767 ability to make contacts, seek advice, search for work, and place or read thoughts and poems. Another advantage isrepparttar 118768 fact that wanted ads can be posted onrepparttar 118769 site.

Intoko.ca is a family site from and for everyone. Every ad is checked and regulated even though advertising currently is free.

Cont'd on page 2 ==>
 
ImproveHomeLife.com © 2005
Terms of Use