CFP last date
20 May 2024
Reseach Article

Ten-Stage Security Management Strategy Model for the Impacts of ëSecurity Threats on E ñBusinessí

by Narendra Kumar Tyagi, Dr.S.Srinivasan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 21 - Number 5
Year of Publication: 2011
Authors: Narendra Kumar Tyagi, Dr.S.Srinivasan
10.5120/2511-3400

Narendra Kumar Tyagi, Dr.S.Srinivasan . Ten-Stage Security Management Strategy Model for the Impacts of ëSecurity Threats on E ñBusinessí. International Journal of Computer Applications. 21, 5 ( May 2011), 1-4. DOI=10.5120/2511-3400

@article{ 10.5120/2511-3400,
author = { Narendra Kumar Tyagi, Dr.S.Srinivasan },
title = { Ten-Stage Security Management Strategy Model for the Impacts of ëSecurity Threats on E ñBusinessí },
journal = { International Journal of Computer Applications },
issue_date = { May 2011 },
volume = { 21 },
number = { 5 },
month = { May },
year = { 2011 },
issn = { 0975-8887 },
pages = { 1-4 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume21/number5/2511-3400/ },
doi = { 10.5120/2511-3400 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:07:41.163836+05:30
%A Narendra Kumar Tyagi
%A Dr.S.Srinivasan
%T Ten-Stage Security Management Strategy Model for the Impacts of ëSecurity Threats on E ñBusinessí
%J International Journal of Computer Applications
%@ 0975-8887
%V 21
%N 5
%P 1-4
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper is an attempt to give a high-level overview of security in the e-business world. e-Business includes informational websites that are being fielded on an almost daily basis by companies. This paper attempted to view security concerns as a problem to be solved with technology and main consideration is to which firewall or encryptography should use rather than formulating a security strategy. Technology is next to useless unless applied within a strategy, just as tanks are wasted without an overall battle plan. Some of the security threats areas, such as services advertising, require the implementation of only few, security controls, while others, like customer recruitment/registration, require more comprehensive controls, to ensure compliance with money and customer’s requirements. This paper throws light into the kinds of various concerns a person should be worrying and providing a look at some of the security technologies available.

References
  1. Bajaj, k kamlesh, And Nag, debjani “E-commerce The cutting edge of Business”, Tata mcgraw hill, pp 197-200 (2002).
  2. Bichler Martin “Future of E-Markets Multi Dimensional Market Mechanism” Cambridge University Press, U.K., pp 17-20 (2001).
  3. CISCO “Top five security issues for small and madiem sized business”, Cisco white paper http://www.cisco.com/en/US/ns643/networking_solutions_white_paper0900aecd804606fc.shtml (2005)
  4. S. Jajodia, S. Noel, B. O’Berry. “Topological analysis of network attack vulnerability”, in Managing Cyber Threats: Issues, Approaches and Challanges, V. Kumar, J. Srivastava, and A. Lazarevic (eds.), Springer, Germany, (2003).
  5. Chopra, Anil and Roy Anindya “New threats to online banking”. Pcquest, pp62-67 [ July, 2005]
  6. Tervueren Avenue de, “Security guidelines for E- banking” (August, 2004).
  7. Upfold C.T. and Sewry D.A.(2005), “An Investigation of Information Security In Small And Medium Enterprises(SME’s)In Eastern Cape” http://icsa.cs.up.ac.za/issa/2005/Proceedings/Research/082Article.pdf
  8. “Life on the Internet”, http://www.pbs.org/internet/timeline (2001).
  9. S. J. Russell, P. Norvig, “Artificial Intelligence: A Modern Approach”, Prentice Hall, New Jersey, (1995).
  10. Narendra Kumar Tyagi, research paper “e-Bus : web services” in International Conference “icsci-09” held in Hyderabad (7-10 Jan, 2009)
  11. Narendra Kumar Tyagi, “Data Security from Malicious Attack: Computer Virus”, BVIM Indiacom2010 (Track 2: Web Technologies, Computer Networks & Information Security (G -III)) National conference Proceedings at BVICAM, Paschim vihar, New Delhi (26-27th Feb 2010)
  12. For a similar approach see US GAO (1999).
  13. Narendra Kumar Tyagi, “Encountering with security Threats in e-Business using Agent Based Attack Simulator” International Conference at DIAS Rohini, Delhi on 3rd January 2011.
  14. Narendra Kumar Tyagi, research paper, “Database Security from Malicious Attack: Multi Agent System Approach” in AICTE sponsored National Seminar on Artificial Intelligence NSAI-09 proceeding (17 july 2009).
  15. Search Security.com, Firewal www.progress.com/webspeed/whitepapers/securing_firewall.htm
  16. Narendra Kumar Tyagi, “Security Threats in e-Business with Safety and Dependability”, “Global Journal of Enterprise System (GJEIS)” July2010-Dec 2010 (pp 68-71) http://gjeis.academician.co.in/ ; www.ejournal.co.in/gjeis
  17. Narendra Kumar Tyagi, “Nullifying the Impacts of Security Threats on e-Business using Cryptography with e-BSP” (Track 2: Web Technologies, Computer Networks & Information Security) National conference INDIACOM-2011 at Bharati Vidyapeeth Institute of Computer Applications and Management, Paschim vihar, New Delhi , 10-11th March 2011.
Index Terms

Computer Science
Information Sciences

Keywords

e-business Internet Security phishing measurement survey method basic advanced technologies