SlideShare ist ein Scribd-Unternehmen logo
1 von 31
E-Business & Online Security: A Technical Concern Or A Strategic Priority Monroe Myers   Sunny Joshi Global E-Business Marketing  (200232) Online Seminar E-Business & Online Security: A Technical Concern Or A Strategic Priority
Definitions Literature Review & Findings Discussion & Recommendations Video Questions & Answers E-Business & Online Security: A Technical Concern Or A Strategic Priority Agenda
[object Object],Online security Threat “ A threat that creates a circumstance, condition, or event with the potential to cause economic hardship to data or network resources in the form of destruction, disclosures, modification of data, denial of service, and/or fraud, waste and abuse” (Kalakota and Whinston, 1997). Information security “ The technical guarantees that ensure that the legal requirements and good practices with regard to privacy will be effectively met” (Flavian and Guinaliu, 2006). E-Business & Online Security: A Technical Concern Or A Strategic Priority
Definitions Information warfare “ The actions intended to protect, exploit, corrupt, deny, or destroy information or information resources in order to achieve a significant advantage, objective, or victory over an adversary” (Alger, 1996). Internet Security Risk (ISR) “ The degree of uncertainty and mistrust aroused from thoughts about providing personal and financial information over the internet” (Lynn  et al.,  2011). E-Business & Online Security: A Technical Concern Or A Strategic Priority
Definitions Trust “ The willingness to rely on another based on expectations of ability, benevolence, and integrity” (Lee and Turban, 2001; Bhattacherjee, 2002). “ The willingness of a trustor to be vulnerable to actions of a trustee due to an expectation the trustor will behave responsibly” (Mayer  et al.,  1995). Privacy “ The degree to which the online shopping web site is safe and protects the customers’ information” (Chiu  et al. , 2009). E-Business & Online Security: A Technical Concern Or A Strategic Priority
Literature Review & Findings In general, the need for trust is created in instances involving vulnerability and uncertainty (Bhattacherjee, 2002; Koufaris and Hampton-Sosa, 2004). Under online conditions, the need for trust is significantly enhanced. (Bart  et al. , 2005; Grabner-Krauter and Kaluscha, 2008). Lack of consumer trust is considered a major factor in impeding e-commerce (Casalo´, Flavia´n and Guinalı´u, 2007). E-Business & Online Security: A Technical Concern Or A Strategic Priority
Literature Review & Findings As new technologies enhance the complexity of information and its capacity to be processed, privacy is increasingly becoming an important issue, therefore, consumer distrust about gathering and processing personal information is on the rise (Flavia´n and Guinalı´u, 2006). E-Business & Online Security: A Technical Concern Or A Strategic Priority
Literature Review & Findings Consumers do hesitate when shopping online whenever they feel that their financial information is likely to be compromised (Collier and Bienstock, 2006). Consumers’ perceptions of privacy carry a positively significant effect on trusting online vendors (Chiu  et al. , 2009). E-Business & Online Security: A Technical Concern Or A Strategic Priority
Literature Review & Findings One of the most striking features of the fight for online 'supremacy' is connected with the fact that novel approaches to undermining personal and financial information follow in the steps of state-sponsored cyber-warfare practices. (Cronin, 2002; Hutchinson, 2002) E-Business & Online Security: A Technical Concern Or A Strategic Priority
Literature Review & Findings Around the world, many nations spend large sums on information warfare programs. Those include Russia, China, India, Taiwan, Israel, France, Brazil and Iran (Adams, 2001). China, for instance, has committed itself to improving information warfare capabilities (Rhem, 2005). Therefore, special attention needs to be paid to security concerns when considering outsourcing IT functions to foreign-country organisations, for example (Pruitt, 2004). E-Business & Online Security: A Technical Concern Or A Strategic Priority
Literature Review & Findings Internet-based, low cost cyber-threats target civilian information assets and threaten the economic stability of modern societies (Bush, 2003). Information warfare may become commonplace in four spheres: military, economic, social and personal (Cronin and Crawford, 1999) E-Business & Online Security: A Technical Concern Or A Strategic Priority
Literature Review & Findings Criminal activity is rapidly expanding into an underground economy specialising in identity theft, phishing and spam (Verton, 2004) as technical barriers to gaining access to valuable resources fall (Kenneth, Knapp and Boulton, 2006). E-Business & Online Security: A Technical Concern Or A Strategic Priority
Literature Review & Findings Cyber-technology is increasingly used in corporate espionage (Hansell, 2004). The rise of trusted malware exemplifies the harnessing of the very tools, designed by security firms for enhancing protection, for gaining unfettered access to valuable information and serve to infiltrate networks. 53,834 pieces of signed malware were detected in the first 5 months of 2011, a 300% increase on the previous year (AVG, 2011). E-Business & Online Security: A Technical Concern Or A Strategic Priority
Literature Review & Findings Recently, stolen digital certificates made headlines with the Stuxnet 'worm' and the RSA hack of Lockheed Martin network breach (AVG, 2011). Spyware and adware can take the form of legitimate applications with illegal intentions (Stafford and Urbaczewski, 2004). E-Business & Online Security: A Technical Concern Or A Strategic Priority
Around 7,000 spyware programs reportedly existed five years ago and are responsible for 50% of all PC crashes (Sipior, Ward and Roselli, 2005). 91 percent of home computers host spyware code (Richmond, 2004). Identity theft is another type of 'cyber-terrorism against individuals' (Sterling, 2004). Literature Review & Findings E-Business & Online Security: A Technical Concern Or A Strategic Priority
Literature Review & Findings As a result of the growing risk, demand for certifiably skilled cyber-security specialists is growing as organisations move to protect an increasingly valuable asset, information. In conjunction with senior management, qualified personnel facilitate programmes in security education, risk assessment and cultural change towards a better understanding of data security (Dutta and McCrohan, 2002). E-Business & Online Security: A Technical Concern Or A Strategic Priority
Literature Review & Findings Lately, cyber-criminals are turning their attention to Mac users as the Mac OS platform expands its market share (AVG, 2011). Unsurprisingly, cyber-crime has ventured into the mobile platforms as they increase their online presence with even greater promises of personal data to compromise. The rise of rogue smart-phone apps such as those relating to Google's Android Market and others is another worrying trend in the battle for online security (PC World, 2011). E-Business & Online Security: A Technical Concern Or A Strategic Priority
Literature Review & Findings MacAfee, through its five-year long “ Operation Shady RAT ”, identified 72 government and corporate parties that have been silently compromised, in some instances over years without being detected (Alperovitch, 2011). The list includes: International Olympic Committee (IOC), The United Nations, ASEAN, South Korean steel and construction companies, A US real estate firm, Four US defense contractors, US federal, state and county government agencies, and, ironically,  A computer network security company E-Business & Online Security: A Technical Concern Or A Strategic Priority
Literature Review & Findings Most of the victims of cyber-attacks chose not to inform the outside world about such breaches. In 2005, only 20% of intrusions were reported to law enforcement agencies in the US, primarily because of concerns with negative publicity (Gordon  et al ., 2005). Despite the escalation in the veracity of information technology threats, business managers often lack an adequate understanding of the risks, or are reluctant to take decisive action for providing appropriate levels of information security (Austin and Darby, 2003).  E-Business & Online Security: A Technical Concern Or A Strategic Priority
Literature Review & Findings Top management support was ranked as the most critical information security issue facing organisations today by 874 Certified Information System Security Professionals (CISSPs) (Kenneth, Knapp and Boulton, 2006). As a result of the recent wave of cyber-attacks and flowing from the perceived effects of potential liability, including leaks of corporate communications, negotiation contracts and other sensitive information influencing a firm's competitive-advantage in its industry and markets, demand for cyber-insurance is growing fast (Kolodzinski, 2002; Keating, 2003). E-Business & Online Security: A Technical Concern Or A Strategic Priority
Discussion &Recommendations Given current and projected growth of information technology, its use in e-commerce and the magnitude, spread and affordability of launching cyber-threats in their many forms, contemporary levels of complacency afforded by business organisations, individuals and governments are largely and alarmingly  inadequate .  E-Business & Online Security: A Technical Concern Or A Strategic Priority
Discussion &Recommendations As the stakes go higher for all concerned with maintaining a relatively safe and secure online environment, the lack of concerted action by those implicated is likely to prove detrimental to future prospects of growth for e-business should current attitudes to the seriousness of the matter continue to go under-checked.  E-Business & Online Security: A Technical Concern Or A Strategic Priority
Discussion &Recommendations Therefore, it is strongly recommended for all stakeholders to adopt appropriate cyber-strategies for effective information security management. A  multi-layered approach  to protecting online communications and data from prying eyes is needed in order to boost confidence in online services. Under the proposed scheme, governments, business organisations and individuals alike will need to collaborate in creating and maintaining an array of defense barriers in order to minimise chances for over-exposure to the rapidly sophisticated intrusions of the online world. E-Business & Online Security: A Technical Concern Or A Strategic Priority
Discussion &Recommendations For an effective strategy against the invisible threat, elements of technology, law and societal awareness are advised to be incorporated in management's strategy. Bush (2003), for instance, divided the complex cyber-challenge into five levels as part of the National Strategy to Secure Cyberspace. These levels are: home users and small businesses, large enterprises, critical infrastructure sectors, national vulnerabilities, and the global information grid of networked systems.  E-Business & Online Security: A Technical Concern Or A Strategic Priority
Discussion &Recommendations Issues of regulation of the Internet on an international basis might need to be further clarified and the responsibilities of those bodies charged with looking into the global dimension of the threat reassessed in light of recent developments. Corporations are recommended to collaborate with governments in designing appropriate mechanisms for dealing with the problem and reaching binding agreements with regard to their rights and obligations in the process. Individuals carry the ultimate responsibility for using the expanding medium while raising awareness of the dangers of venturing unprepared into the  'World Wild Web '. E-Business & Online Security: A Technical Concern Or A Strategic Priority
Discussion &Recommendations As superior cyber-attack technologies trickle down from state-sponsored labs to the increasingly sophisticated, financially-motivated cyber-criminals of late, businesses of all sizes are faced with the challenging task of managing the risks involved. As the cost of acquiring and effectively deploying the right tools for combating intrusive online behaviour rises, smaller enterprise is likely to attract greater attention by those on the wrong side of the law due to heightened levels of vulnerability. Therefore, it is of significance to help SMEs become better acquainted with their increasingly important role in securing B2B and B2C networks and data streams in an effort to foster a safer online environments. E-Business & Online Security: A Technical Concern Or A Strategic Priority
Discussion &Recommendations The rising trends of cloud computing and social networking, although promising in terms of attracting a larger audience and enhancing the efficiency of communications, are likely to increase the risks associated with cyber-attacks as the pool of stored data is significantly increased. Therefore, top management is advised to reconsider the risk/benefit scenarios of their online endeavours and adjust plans accordingly as restoring lost consumer trust, as a result of inaction, could prove a much more challenging task than securing corporate and consumers' communications. Think Vodafone Ausralia post-VodaFail campaign! E-Business & Online Security: A Technical Concern Or A Strategic Priority
Discussion &Recommendations Finally, a proactive approach to guarding sensitive information resources such as data encryption, backup and access authentication procedures are among the practices to enlist in the virtual war unfolding. E-marketers, in particular, due to their front-line positions need to enhance their security strategies especially those connected with website security design and secured cart and payment solutions in addition to compliance to stringent interface certification practices. E-Business & Online Security: A Technical Concern Or A Strategic Priority
Discussion &Recommendations Issues of regulation of the Internet on an international basis might need to be further clarified and the responsibilities of those bodies charged with looking into the global dimension of the threat reassessed in light of recent developments. Corporations are recommended to collaborate with governments in designing appropriate mechanisms for dealing with the problem and reaching binding agreements with regard to their rights and obligations in the process. Individuals carry the responsibility of using the expanding medium while raising awareness of the dangers of venturing unprepared into the  'World Wild Web '. E-Business & Online Security: A Technical Concern Or A Strategic Priority
Online security video http://www.youtube.com/watch?v=3S4qmfKNxv8 E-Business & Online Security: A Technical Concern Or A Strategic Priority
Thank You! Questions?? E-Business & Online Security: A Technical Concern Or A Strategic Priority

Weitere ähnliche Inhalte

Was ist angesagt?

Cybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityCybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityBooz Allen Hamilton
 
Best Practices to Protect Cardholder Data Environment and Achieve PCI Compliance
Best Practices to Protect Cardholder Data Environment and Achieve PCI ComplianceBest Practices to Protect Cardholder Data Environment and Achieve PCI Compliance
Best Practices to Protect Cardholder Data Environment and Achieve PCI ComplianceRapid7
 
WCIT 2014 Matt Stamper - Information Assurance in a Global Context
WCIT 2014 Matt Stamper - Information Assurance in a Global ContextWCIT 2014 Matt Stamper - Information Assurance in a Global Context
WCIT 2014 Matt Stamper - Information Assurance in a Global ContextWCIT 2014
 
IT Security in Higher Education
IT Security in Higher EducationIT Security in Higher Education
IT Security in Higher EducationRapid7
 
Final cyber risk report 24 feb
Final cyber risk report 24 febFinal cyber risk report 24 feb
Final cyber risk report 24 febmharbpavia
 
Rapid7 Report: Data Breaches in the Government Sector
Rapid7 Report: Data Breaches in the Government SectorRapid7 Report: Data Breaches in the Government Sector
Rapid7 Report: Data Breaches in the Government SectorRapid7
 
American Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standardsAmerican Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standardsDavid Sweigert
 
Omlis Data Breaches Report - An Inside Perspective
Omlis Data Breaches Report - An Inside Perspective Omlis Data Breaches Report - An Inside Perspective
Omlis Data Breaches Report - An Inside Perspective Omlis
 
DBryant-Cybersecurity Challenge
DBryant-Cybersecurity ChallengeDBryant-Cybersecurity Challenge
DBryant-Cybersecurity Challengemsdee3362
 
Contemporary Cyber Security Social Engineering Solutions, Measures, Policies,...
Contemporary Cyber Security Social Engineering Solutions, Measures, Policies,...Contemporary Cyber Security Social Engineering Solutions, Measures, Policies,...
Contemporary Cyber Security Social Engineering Solutions, Measures, Policies,...CSCJournals
 
You Are the Target
You Are the TargetYou Are the Target
You Are the TargetEMC
 
The digital economy and cybersecurity
The digital economy and cybersecurityThe digital economy and cybersecurity
The digital economy and cybersecurityMark Albala
 
Protecting Patient Health Information in the HITECH Era
Protecting Patient Health Information in the HITECH EraProtecting Patient Health Information in the HITECH Era
Protecting Patient Health Information in the HITECH EraRapid7
 
Sept 2012 data security & cyber liability
Sept 2012   data security & cyber liabilitySept 2012   data security & cyber liability
Sept 2012 data security & cyber liabilityDFickett
 
Network Security and Privacy in Medium Scale Businesses in Nigeria
Network Security and Privacy in Medium Scale Businesses in NigeriaNetwork Security and Privacy in Medium Scale Businesses in Nigeria
Network Security and Privacy in Medium Scale Businesses in NigeriaINFOGAIN PUBLICATION
 
Cybersecurity report
Cybersecurity reportCybersecurity report
Cybersecurity reportKevin Leffew
 

Was ist angesagt? (20)

Cybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityCybersecurity in the Age of Mobility
Cybersecurity in the Age of Mobility
 
Best Practices to Protect Cardholder Data Environment and Achieve PCI Compliance
Best Practices to Protect Cardholder Data Environment and Achieve PCI ComplianceBest Practices to Protect Cardholder Data Environment and Achieve PCI Compliance
Best Practices to Protect Cardholder Data Environment and Achieve PCI Compliance
 
WCIT 2014 Matt Stamper - Information Assurance in a Global Context
WCIT 2014 Matt Stamper - Information Assurance in a Global ContextWCIT 2014 Matt Stamper - Information Assurance in a Global Context
WCIT 2014 Matt Stamper - Information Assurance in a Global Context
 
IT Security in Higher Education
IT Security in Higher EducationIT Security in Higher Education
IT Security in Higher Education
 
Final cyber risk report 24 feb
Final cyber risk report 24 febFinal cyber risk report 24 feb
Final cyber risk report 24 feb
 
Rapid7 Report: Data Breaches in the Government Sector
Rapid7 Report: Data Breaches in the Government SectorRapid7 Report: Data Breaches in the Government Sector
Rapid7 Report: Data Breaches in the Government Sector
 
American Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standardsAmerican Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standards
 
Atos wp-cyberrisks
Atos wp-cyberrisksAtos wp-cyberrisks
Atos wp-cyberrisks
 
Volume2 chapter1 security
Volume2 chapter1 securityVolume2 chapter1 security
Volume2 chapter1 security
 
Omlis Data Breaches Report - An Inside Perspective
Omlis Data Breaches Report - An Inside Perspective Omlis Data Breaches Report - An Inside Perspective
Omlis Data Breaches Report - An Inside Perspective
 
DBryant-Cybersecurity Challenge
DBryant-Cybersecurity ChallengeDBryant-Cybersecurity Challenge
DBryant-Cybersecurity Challenge
 
Contemporary Cyber Security Social Engineering Solutions, Measures, Policies,...
Contemporary Cyber Security Social Engineering Solutions, Measures, Policies,...Contemporary Cyber Security Social Engineering Solutions, Measures, Policies,...
Contemporary Cyber Security Social Engineering Solutions, Measures, Policies,...
 
You Are the Target
You Are the TargetYou Are the Target
You Are the Target
 
The digital economy and cybersecurity
The digital economy and cybersecurityThe digital economy and cybersecurity
The digital economy and cybersecurity
 
Protecting Patient Health Information in the HITECH Era
Protecting Patient Health Information in the HITECH EraProtecting Patient Health Information in the HITECH Era
Protecting Patient Health Information in the HITECH Era
 
Sept 2012 data security & cyber liability
Sept 2012   data security & cyber liabilitySept 2012   data security & cyber liability
Sept 2012 data security & cyber liability
 
Network Security and Privacy in Medium Scale Businesses in Nigeria
Network Security and Privacy in Medium Scale Businesses in NigeriaNetwork Security and Privacy in Medium Scale Businesses in Nigeria
Network Security and Privacy in Medium Scale Businesses in Nigeria
 
Effects of IT Governance Measures on Cyber-attack Incidents
Effects of IT Governance Measures on Cyber-attack IncidentsEffects of IT Governance Measures on Cyber-attack Incidents
Effects of IT Governance Measures on Cyber-attack Incidents
 
IBM Security Services
IBM Security ServicesIBM Security Services
IBM Security Services
 
Cybersecurity report
Cybersecurity reportCybersecurity report
Cybersecurity report
 

Andere mochten auch

Gebm os presentation final
Gebm os presentation finalGebm os presentation final
Gebm os presentation finalsunnyjoshi88
 
How to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanHow to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanPost Planner
 
Learn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionLearn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionIn a Rocket
 
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika AldabaLightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldabaux singapore
 
SEO: Getting Personal
SEO: Getting PersonalSEO: Getting Personal
SEO: Getting PersonalKirsty Hulse
 

Andere mochten auch (7)

Gebm os presentation final
Gebm os presentation finalGebm os presentation final
Gebm os presentation final
 
Secura Security India Overview
Secura Security India OverviewSecura Security India Overview
Secura Security India Overview
 
How to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanHow to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media Plan
 
Learn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionLearn BEM: CSS Naming Convention
Learn BEM: CSS Naming Convention
 
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika AldabaLightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
 
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job? Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
 
SEO: Getting Personal
SEO: Getting PersonalSEO: Getting Personal
SEO: Getting Personal
 

Ähnlich wie Online security – an assessment of the new

OverseeCyberSecurityAsHackersSeekToInfiltrate
OverseeCyberSecurityAsHackersSeekToInfiltrateOverseeCyberSecurityAsHackersSeekToInfiltrate
OverseeCyberSecurityAsHackersSeekToInfiltrateKashif Ali
 
Running Head INFORMATION SECURITY VULNERABILITY 2.docx
Running Head INFORMATION SECURITY VULNERABILITY     2.docxRunning Head INFORMATION SECURITY VULNERABILITY     2.docx
Running Head INFORMATION SECURITY VULNERABILITY 2.docxcharisellington63520
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCybAnastaciaShadelb
 
Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020CBIZ, Inc.
 
Digital Forensics Market, Size, Global Forecast 2023-2028
Digital Forensics Market, Size, Global Forecast 2023-2028Digital Forensics Market, Size, Global Forecast 2023-2028
Digital Forensics Market, Size, Global Forecast 2023-2028Renub Research
 
ARTICLE IN PRESSContents lists available at ScienceDirect.docx
ARTICLE IN PRESSContents lists available at ScienceDirect.docxARTICLE IN PRESSContents lists available at ScienceDirect.docx
ARTICLE IN PRESSContents lists available at ScienceDirect.docxfestockton
 
Industry Trendsin Information Security
Industry Trendsin Information SecurityIndustry Trendsin Information Security
Industry Trendsin Information SecurityGary Bahadur
 
Dealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In TechnologyDealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In TechnologyCSCJournals
 
Team 3_Final Project.docx
Team 3_Final Project.docxTeam 3_Final Project.docx
Team 3_Final Project.docxMarcusBrown87
 
Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Vertex Holdings
 
Cyber Security – Indian Perspective.pptx
Cyber Security – Indian Perspective.pptxCyber Security – Indian Perspective.pptx
Cyber Security – Indian Perspective.pptxSharifulShishir
 
December ISSA Meeting Executive Security Presentation
December ISSA Meeting   Executive Security PresentationDecember ISSA Meeting   Executive Security Presentation
December ISSA Meeting Executive Security Presentationwhmillerjr
 
DSS @RIGA COMM2013 - The Value of an IT Security for Business People
DSS @RIGA COMM2013 - The Value of an IT Security for Business PeopleDSS @RIGA COMM2013 - The Value of an IT Security for Business People
DSS @RIGA COMM2013 - The Value of an IT Security for Business PeopleAndris Soroka
 

Ähnlich wie Online security – an assessment of the new (20)

OverseeCyberSecurityAsHackersSeekToInfiltrate
OverseeCyberSecurityAsHackersSeekToInfiltrateOverseeCyberSecurityAsHackersSeekToInfiltrate
OverseeCyberSecurityAsHackersSeekToInfiltrate
 
Running Head INFORMATION SECURITY VULNERABILITY 2.docx
Running Head INFORMATION SECURITY VULNERABILITY     2.docxRunning Head INFORMATION SECURITY VULNERABILITY     2.docx
Running Head INFORMATION SECURITY VULNERABILITY 2.docx
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020
 
Digital Forensics Market, Size, Global Forecast 2023-2028
Digital Forensics Market, Size, Global Forecast 2023-2028Digital Forensics Market, Size, Global Forecast 2023-2028
Digital Forensics Market, Size, Global Forecast 2023-2028
 
ARTICLE IN PRESSContents lists available at ScienceDirect.docx
ARTICLE IN PRESSContents lists available at ScienceDirect.docxARTICLE IN PRESSContents lists available at ScienceDirect.docx
ARTICLE IN PRESSContents lists available at ScienceDirect.docx
 
Industry Trendsin Information Security
Industry Trendsin Information SecurityIndustry Trendsin Information Security
Industry Trendsin Information Security
 
Dealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In TechnologyDealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In Technology
 
softwss
softwsssoftwss
softwss
 
Class activity 4
Class activity 4 Class activity 4
Class activity 4
 
Global Cybersecurity Market (2017 - 2022)
Global Cybersecurity Market (2017 -  2022) Global Cybersecurity Market (2017 -  2022)
Global Cybersecurity Market (2017 - 2022)
 
Team 3_Final Project.docx
Team 3_Final Project.docxTeam 3_Final Project.docx
Team 3_Final Project.docx
 
Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.
 
Cybersecurity - Sam Maccherola
Cybersecurity - Sam MaccherolaCybersecurity - Sam Maccherola
Cybersecurity - Sam Maccherola
 
The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017
 
Cyber Security – Indian Perspective.pptx
Cyber Security – Indian Perspective.pptxCyber Security – Indian Perspective.pptx
Cyber Security – Indian Perspective.pptx
 
December ISSA Meeting Executive Security Presentation
December ISSA Meeting   Executive Security PresentationDecember ISSA Meeting   Executive Security Presentation
December ISSA Meeting Executive Security Presentation
 
Ijsrp p5211
Ijsrp p5211Ijsrp p5211
Ijsrp p5211
 
DSS @RIGA COMM2013 - The Value of an IT Security for Business People
DSS @RIGA COMM2013 - The Value of an IT Security for Business PeopleDSS @RIGA COMM2013 - The Value of an IT Security for Business People
DSS @RIGA COMM2013 - The Value of an IT Security for Business People
 

Kürzlich hochgeladen

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 

Kürzlich hochgeladen (20)

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 

Online security – an assessment of the new

  • 1. E-Business & Online Security: A Technical Concern Or A Strategic Priority Monroe Myers   Sunny Joshi Global E-Business Marketing (200232) Online Seminar E-Business & Online Security: A Technical Concern Or A Strategic Priority
  • 2. Definitions Literature Review & Findings Discussion & Recommendations Video Questions & Answers E-Business & Online Security: A Technical Concern Or A Strategic Priority Agenda
  • 3.
  • 4. Definitions Information warfare “ The actions intended to protect, exploit, corrupt, deny, or destroy information or information resources in order to achieve a significant advantage, objective, or victory over an adversary” (Alger, 1996). Internet Security Risk (ISR) “ The degree of uncertainty and mistrust aroused from thoughts about providing personal and financial information over the internet” (Lynn et al., 2011). E-Business & Online Security: A Technical Concern Or A Strategic Priority
  • 5. Definitions Trust “ The willingness to rely on another based on expectations of ability, benevolence, and integrity” (Lee and Turban, 2001; Bhattacherjee, 2002). “ The willingness of a trustor to be vulnerable to actions of a trustee due to an expectation the trustor will behave responsibly” (Mayer et al., 1995). Privacy “ The degree to which the online shopping web site is safe and protects the customers’ information” (Chiu et al. , 2009). E-Business & Online Security: A Technical Concern Or A Strategic Priority
  • 6. Literature Review & Findings In general, the need for trust is created in instances involving vulnerability and uncertainty (Bhattacherjee, 2002; Koufaris and Hampton-Sosa, 2004). Under online conditions, the need for trust is significantly enhanced. (Bart et al. , 2005; Grabner-Krauter and Kaluscha, 2008). Lack of consumer trust is considered a major factor in impeding e-commerce (Casalo´, Flavia´n and Guinalı´u, 2007). E-Business & Online Security: A Technical Concern Or A Strategic Priority
  • 7. Literature Review & Findings As new technologies enhance the complexity of information and its capacity to be processed, privacy is increasingly becoming an important issue, therefore, consumer distrust about gathering and processing personal information is on the rise (Flavia´n and Guinalı´u, 2006). E-Business & Online Security: A Technical Concern Or A Strategic Priority
  • 8. Literature Review & Findings Consumers do hesitate when shopping online whenever they feel that their financial information is likely to be compromised (Collier and Bienstock, 2006). Consumers’ perceptions of privacy carry a positively significant effect on trusting online vendors (Chiu et al. , 2009). E-Business & Online Security: A Technical Concern Or A Strategic Priority
  • 9. Literature Review & Findings One of the most striking features of the fight for online 'supremacy' is connected with the fact that novel approaches to undermining personal and financial information follow in the steps of state-sponsored cyber-warfare practices. (Cronin, 2002; Hutchinson, 2002) E-Business & Online Security: A Technical Concern Or A Strategic Priority
  • 10. Literature Review & Findings Around the world, many nations spend large sums on information warfare programs. Those include Russia, China, India, Taiwan, Israel, France, Brazil and Iran (Adams, 2001). China, for instance, has committed itself to improving information warfare capabilities (Rhem, 2005). Therefore, special attention needs to be paid to security concerns when considering outsourcing IT functions to foreign-country organisations, for example (Pruitt, 2004). E-Business & Online Security: A Technical Concern Or A Strategic Priority
  • 11. Literature Review & Findings Internet-based, low cost cyber-threats target civilian information assets and threaten the economic stability of modern societies (Bush, 2003). Information warfare may become commonplace in four spheres: military, economic, social and personal (Cronin and Crawford, 1999) E-Business & Online Security: A Technical Concern Or A Strategic Priority
  • 12. Literature Review & Findings Criminal activity is rapidly expanding into an underground economy specialising in identity theft, phishing and spam (Verton, 2004) as technical barriers to gaining access to valuable resources fall (Kenneth, Knapp and Boulton, 2006). E-Business & Online Security: A Technical Concern Or A Strategic Priority
  • 13. Literature Review & Findings Cyber-technology is increasingly used in corporate espionage (Hansell, 2004). The rise of trusted malware exemplifies the harnessing of the very tools, designed by security firms for enhancing protection, for gaining unfettered access to valuable information and serve to infiltrate networks. 53,834 pieces of signed malware were detected in the first 5 months of 2011, a 300% increase on the previous year (AVG, 2011). E-Business & Online Security: A Technical Concern Or A Strategic Priority
  • 14. Literature Review & Findings Recently, stolen digital certificates made headlines with the Stuxnet 'worm' and the RSA hack of Lockheed Martin network breach (AVG, 2011). Spyware and adware can take the form of legitimate applications with illegal intentions (Stafford and Urbaczewski, 2004). E-Business & Online Security: A Technical Concern Or A Strategic Priority
  • 15. Around 7,000 spyware programs reportedly existed five years ago and are responsible for 50% of all PC crashes (Sipior, Ward and Roselli, 2005). 91 percent of home computers host spyware code (Richmond, 2004). Identity theft is another type of 'cyber-terrorism against individuals' (Sterling, 2004). Literature Review & Findings E-Business & Online Security: A Technical Concern Or A Strategic Priority
  • 16. Literature Review & Findings As a result of the growing risk, demand for certifiably skilled cyber-security specialists is growing as organisations move to protect an increasingly valuable asset, information. In conjunction with senior management, qualified personnel facilitate programmes in security education, risk assessment and cultural change towards a better understanding of data security (Dutta and McCrohan, 2002). E-Business & Online Security: A Technical Concern Or A Strategic Priority
  • 17. Literature Review & Findings Lately, cyber-criminals are turning their attention to Mac users as the Mac OS platform expands its market share (AVG, 2011). Unsurprisingly, cyber-crime has ventured into the mobile platforms as they increase their online presence with even greater promises of personal data to compromise. The rise of rogue smart-phone apps such as those relating to Google's Android Market and others is another worrying trend in the battle for online security (PC World, 2011). E-Business & Online Security: A Technical Concern Or A Strategic Priority
  • 18. Literature Review & Findings MacAfee, through its five-year long “ Operation Shady RAT ”, identified 72 government and corporate parties that have been silently compromised, in some instances over years without being detected (Alperovitch, 2011). The list includes: International Olympic Committee (IOC), The United Nations, ASEAN, South Korean steel and construction companies, A US real estate firm, Four US defense contractors, US federal, state and county government agencies, and, ironically, A computer network security company E-Business & Online Security: A Technical Concern Or A Strategic Priority
  • 19. Literature Review & Findings Most of the victims of cyber-attacks chose not to inform the outside world about such breaches. In 2005, only 20% of intrusions were reported to law enforcement agencies in the US, primarily because of concerns with negative publicity (Gordon et al ., 2005). Despite the escalation in the veracity of information technology threats, business managers often lack an adequate understanding of the risks, or are reluctant to take decisive action for providing appropriate levels of information security (Austin and Darby, 2003). E-Business & Online Security: A Technical Concern Or A Strategic Priority
  • 20. Literature Review & Findings Top management support was ranked as the most critical information security issue facing organisations today by 874 Certified Information System Security Professionals (CISSPs) (Kenneth, Knapp and Boulton, 2006). As a result of the recent wave of cyber-attacks and flowing from the perceived effects of potential liability, including leaks of corporate communications, negotiation contracts and other sensitive information influencing a firm's competitive-advantage in its industry and markets, demand for cyber-insurance is growing fast (Kolodzinski, 2002; Keating, 2003). E-Business & Online Security: A Technical Concern Or A Strategic Priority
  • 21. Discussion &Recommendations Given current and projected growth of information technology, its use in e-commerce and the magnitude, spread and affordability of launching cyber-threats in their many forms, contemporary levels of complacency afforded by business organisations, individuals and governments are largely and alarmingly inadequate . E-Business & Online Security: A Technical Concern Or A Strategic Priority
  • 22. Discussion &Recommendations As the stakes go higher for all concerned with maintaining a relatively safe and secure online environment, the lack of concerted action by those implicated is likely to prove detrimental to future prospects of growth for e-business should current attitudes to the seriousness of the matter continue to go under-checked. E-Business & Online Security: A Technical Concern Or A Strategic Priority
  • 23. Discussion &Recommendations Therefore, it is strongly recommended for all stakeholders to adopt appropriate cyber-strategies for effective information security management. A multi-layered approach to protecting online communications and data from prying eyes is needed in order to boost confidence in online services. Under the proposed scheme, governments, business organisations and individuals alike will need to collaborate in creating and maintaining an array of defense barriers in order to minimise chances for over-exposure to the rapidly sophisticated intrusions of the online world. E-Business & Online Security: A Technical Concern Or A Strategic Priority
  • 24. Discussion &Recommendations For an effective strategy against the invisible threat, elements of technology, law and societal awareness are advised to be incorporated in management's strategy. Bush (2003), for instance, divided the complex cyber-challenge into five levels as part of the National Strategy to Secure Cyberspace. These levels are: home users and small businesses, large enterprises, critical infrastructure sectors, national vulnerabilities, and the global information grid of networked systems. E-Business & Online Security: A Technical Concern Or A Strategic Priority
  • 25. Discussion &Recommendations Issues of regulation of the Internet on an international basis might need to be further clarified and the responsibilities of those bodies charged with looking into the global dimension of the threat reassessed in light of recent developments. Corporations are recommended to collaborate with governments in designing appropriate mechanisms for dealing with the problem and reaching binding agreements with regard to their rights and obligations in the process. Individuals carry the ultimate responsibility for using the expanding medium while raising awareness of the dangers of venturing unprepared into the 'World Wild Web '. E-Business & Online Security: A Technical Concern Or A Strategic Priority
  • 26. Discussion &Recommendations As superior cyber-attack technologies trickle down from state-sponsored labs to the increasingly sophisticated, financially-motivated cyber-criminals of late, businesses of all sizes are faced with the challenging task of managing the risks involved. As the cost of acquiring and effectively deploying the right tools for combating intrusive online behaviour rises, smaller enterprise is likely to attract greater attention by those on the wrong side of the law due to heightened levels of vulnerability. Therefore, it is of significance to help SMEs become better acquainted with their increasingly important role in securing B2B and B2C networks and data streams in an effort to foster a safer online environments. E-Business & Online Security: A Technical Concern Or A Strategic Priority
  • 27. Discussion &Recommendations The rising trends of cloud computing and social networking, although promising in terms of attracting a larger audience and enhancing the efficiency of communications, are likely to increase the risks associated with cyber-attacks as the pool of stored data is significantly increased. Therefore, top management is advised to reconsider the risk/benefit scenarios of their online endeavours and adjust plans accordingly as restoring lost consumer trust, as a result of inaction, could prove a much more challenging task than securing corporate and consumers' communications. Think Vodafone Ausralia post-VodaFail campaign! E-Business & Online Security: A Technical Concern Or A Strategic Priority
  • 28. Discussion &Recommendations Finally, a proactive approach to guarding sensitive information resources such as data encryption, backup and access authentication procedures are among the practices to enlist in the virtual war unfolding. E-marketers, in particular, due to their front-line positions need to enhance their security strategies especially those connected with website security design and secured cart and payment solutions in addition to compliance to stringent interface certification practices. E-Business & Online Security: A Technical Concern Or A Strategic Priority
  • 29. Discussion &Recommendations Issues of regulation of the Internet on an international basis might need to be further clarified and the responsibilities of those bodies charged with looking into the global dimension of the threat reassessed in light of recent developments. Corporations are recommended to collaborate with governments in designing appropriate mechanisms for dealing with the problem and reaching binding agreements with regard to their rights and obligations in the process. Individuals carry the responsibility of using the expanding medium while raising awareness of the dangers of venturing unprepared into the 'World Wild Web '. E-Business & Online Security: A Technical Concern Or A Strategic Priority
  • 30. Online security video http://www.youtube.com/watch?v=3S4qmfKNxv8 E-Business & Online Security: A Technical Concern Or A Strategic Priority
  • 31. Thank You! Questions?? E-Business & Online Security: A Technical Concern Or A Strategic Priority