Skip to main content
Top

2007 | Book

Online Business Security Systems

insite
SEARCH

About this book

Online Business Security Systems applies the concept of synchronization to security of global heterogeneous and hetero-standard systems by modeling the relationship of risk access spots (RAS) between advanced and developing economies network platforms. The proposed model is more effective in securing the electronic security gap between these economies with reference to real life applications, such as electronic fund transfer in electronic business. This process involves the identification of vulnerabilities on communication networks. This professional book also presents a model and simulation of an integrated approach to security and risk known as Service Server Transmission Model (SSTM).

Online Business Security Systems is designed for both a professional and an academic audience. This includes researchers and practitioners in industry, as well as graduate students studying network security and risk/security management.

Table of Contents

Frontmatter
Chapter 1. Overview of Commercial Activities and Processes in Online Business
This chapter presents an overview of commercial activities and processes that support online business. The chapter examines commercial activities associated with Internet, Cash points, Electronic Point of Sale (EPOS) cash registers, as well as Telephone Banking. There is review of payment systems, gateways as well as intelligent programs known as software agents that facilitate online business activities. The role of stakeholders is also highlighted.
Chapter 2. Legal and Socio-Ethical Issues in Online Business
This chapter reviews and discusses legal and socio-ethical requirements that affect Online Business activities. There is particular reference to Internet law with respect to interpretations of different aspects of the Law. Some of the laws covered in the chapter includes, Fraud and Abuse Act of 1986, Computer Misuse Act of 1990, Copyright, Electronic Communication Privacy Act 2000 and the data protection Act of UK 2000. Email and Privacy Laws usually covering email policy, email privacy, monitoring employees, Right of Privacy in Online applications, Crypto-systems, Online Games and Gambling, and most importantly the Telephone consumer Act of 1991.
Chapter 3. Online Business Systems
The author believes that Online Business Systems are both Heterogeneous and Hetero-standard. This means infrastructure of these systems are supported and serviced by different service providers operating with different security and quality standards. On the contrary, most expert and non expert end users and consumers of Online Business Systems view it as heterogeneous and homo-standard. Consumers view Online Business as services from different providers, however of equal security and quality standard. In a world where electronic commerce activities transcend the walls and boundaries of every country, this cannot be the case. Due to the conflicting demands of Online Business, there is no single technology that is capable of meeting the consumer’s demand. This causes the need to understand concepts underpinning heterogeneous and hetero-standard systems across global computer networks.
Chapter 4. Online Business Security Technologies
This chapter examines Online Business Security Technologies. The chapter examines security standards and protocols such as SET, SSL and IPSEC. The chapter explains the role of Virtual Private Networks in Online Business transactions. The role of crypto-systems in security is also explained. New trends in authentication are introduced, whiles common models such as PPP, CHAP, Kerberos and Biometrics are also re-examined.
Chapter 5. Risk Access Spots (RAS) Common to Communication Networks
This chapter discusses risk access spots and vulnerability areas common to communication networks. The risk access spots highlighted are primarily based on empirical studies conducted by Williams (2004) among ISPs and network users in Asia, Africa, Europe and North America. The details of the findings could be referenced from Williams (2004). Transmission media, Service Access Points, Electromagnetic Spectrum, Internet Service Providers (ISPs), IP addresses, Ports, Port numbers, MAC address, Computer or Device Server, Cyphertext and Human vulnerabilities due to poor skill set and know-how were among risk access spots identified in the study. The author explains why these elements should be strongly considered as RAS on communication networks. The author believes these areas should be top on the list when carrying out security risk assessment on Online Business systems.
Chapter 6. Methods of Attacks on Risk Access Spots: Online Information Warfare
This chapter presents a pedagogical view of the methods employed by attackers, hackers, electronic criminals in exploiting vulnerable systems as reviewed and discussed in chapter 5. The methods of attack also include a wide range of common techniques for penetration testing usually adopted to expose risk access spots on electronic and on-line business communication networks. The methods for attack centres on transmission media (Wired and Wireless spectrum, Service Access Points (SAP), Routing Table & IP address, Port and Port number, MAC address, Server, User Profiles, Cyphertext and Crypto-systems and Operating Systems highlighted in previous chapter. The defence and management strategies for handling these attacks on a communication network have been presented in chapters 4, 7, 8 and 9.
Chapter 7. Security Risk Modelling
Security and risk models generally map out security and risk requirements in an information system or the process of developing such a system. It is also used to determine and simulate the behaviour of such systems, as a means of understanding details of changes likely to occur when the system is functioning.
Chapter 8. Theoretical, Conceptual and Empirical Foundations of SSTM
This chapter presents the theoretical, philosophical and empirical foundations of a more robust and effective security risk model known as SSTM for managing security risk in Online Business. It also describes details of concepts and notations underpinning SSTM. The key concepts and notations described in this chapter comprise risk (r), RAS (Risk Access Spots), RIG (Risk Identification Grid), RISG (Risk Identification Solutions Grid), and Zones. This chapter provides the reader with justifications and reasoning behind SSTM of synchronising e-security methodology.
Chapter 9. Simulating SSTM Using Monte Carlo
This chapter provides a simulation of SSTM using case scenarios. The purpose of the simulations is to assess the reliability and trustworthiness of the model in assessing security risk in Online Business Security for heterogeneous and hetero-standard systems with respect to communication networks using Monte Carlo method.
Chapter 10. Discussions
Online Business is driven by different systems. The systems consist of commercial activities, legal frameworks, security technologies, information system standards and policies as well as risk management models for assessing and determining strategies for security risk assessment and mitigation.
Backmatter
Metadata
Title
Online Business Security Systems
Author
Godfried B. Williams
Copyright Year
2007
Publisher
Springer US
Electronic ISBN
978-0-387-68850-3
Print ISBN
978-0-387-35771-3
DOI
https://doi.org/10.1007/978-0-387-68850-3

Premium Partner