Please enable JavaScript.
Coggle requires JavaScript to display documents.
Chapter 10 : Online Security, Electronic mail: shopping, all types of…
Chapter 10 : Online Security
Origins of security
Today higher stackes
most popular use : electronic mail
Early internet days
Common worry of web shoppers
There are 3 primary characterictis of a good security policy: Most important ,the policy must be enforceable and it must apply to everyone .
The policy must be capable of being implemented through system adminstartion and procedurs trough the publication of acceptable- use guidelines or other appropriate methods.
E- commerce security is at stake , the security breach will lead to information disclosures or other misuse of the information .
E- commerce security policy must be clear confidentialy,integrity, non-repudiation requirements
Origins of security
Interconnected computer system
Data security measures taken by Roman Empire and coded information to prevent enemies from reading secret wart and defense plan.
Modern electronic security techniques by Defense Department wartime use e- orange book rules for mandotory acces control
Business computer by initially adapted military's security methods.
Today computting by requiring comprehensive computer security plans .
Computer security and risk managment
Threat
Physical security
computer security
countermeasure
logical security
Electronic threats
Eavesdroppers
Crackers or hackers
Thieves
Impostors
Risk Managmet model
Applicable for protection internet and electronic commerce assets from physical and electronic threats
Four general organizational actions- impact (cost) and probility of physical threat
Element of computer security
Necessity
Integrity
Secrecy
Electronic mail: shopping, all types of financial transaction
more likely to be stolen from computer where stored