Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

E-Commerce Technology: Security, Threats, and Intellectual Property, Slides of Fundamentals of E-Commerce

An overview of e-commerce technology security, discussing various types of threats, security terminology, and the importance of a security policy. It also covers intellectual property protection and the impact of the internet on intellectual property threats.

Typology: Slides

2012/2013

Uploaded on 07/30/2013

asif.ali
asif.ali 🇮🇳

5

(3)

146 documents

1 / 10

Toggle sidebar

Related documents


Partial preview of the text

Download E-Commerce Technology: Security, Threats, and Intellectual Property and more Slides Fundamentals of E-Commerce in PDF only on Docsity! Survey of e-commerce technology Security Docsity.com Terminology • Computer security is the protection of assets from unauthorized access, use, alteration, or destruction. • There are two types of security: – Physical security including such devices as alarms, fireproof doors, security fences, vaults. – Logical security is non-physical protection. • A threat is an act or object that poses a danger to computer assets. • A countermeasure is a procedure, either physical or logical that recognizes, reduces, or eliminates a threat. Docsity.com Security terminology • Secrecy Protecting against unauthorized data disclosure, and ensuring the authenticity of the data source. Example: Use of stolen credit card numbers • Integrity Preventing unauthorized data modification. Example: Changing of an e-mail message • Necessity Preventing data delays or denials. Example: Delaying a purchase order for stock Docsity.com Security policy • Any organization concerned about protecting its e-commerce assets should have a security policy. • A security policy is a written statement describing what assets are to be protected, why they are to be protected, who is responsible for that protection, and which behaviors are acceptable and not. • The policy should address physical security, network security, access authorizations, virus protection, and disaster recovery. Docsity.com History • Early computer security measures: – Computers were kept in locked central rooms – Access was granted only to select individuals – No one could remotely access the machine • Modern systems are more complex: – Remote processing – Electronic transmission of information – Widespread use of the Internet Docsity.com
Docsity logo



Copyright © 2024 Ladybird Srl - Via Leonardo da Vinci 16, 10126, Torino, Italy - VAT 10816460017 - All rights reserved