A Model and Framework for Online Security Benchmarking
نویسندگان
چکیده
The variety of threats and vulnerabilities within the online business environment are dynamic and thus constantly changing in how they impinge upon online functionality, compromise organizational or customer information, contravene security implementations and thereby undermine online customer confidence. To nullify such threats, online security management must become proactive, by reviewing and continuously improving online security to strengthen the enterprise’s online security measures and policies, as modelled. The benchmarking process utilises a proposed benchmarking framework to guide both the development and application of security benchmarks created in the first instance, from recognized information technology (IT) and information security standards (ISS) and then their application to the online security measures and policies utilized within online business. Furthermore, the benchmarking framework incorporates a continuous improvement review process to address the relevance of benchmark development over time and the changes in threat focus. Povzetek: Razvito je novo testno okolje za preizkušanje varnosti internetnega poslovanja.
منابع مشابه
Benchmarking E-business Security: A Model and Framework
The dynamic nature of threats and vulnerabilities within the E-business environment can impede online functionality, compromise organisational or customer information, contravene security implementations and thereby undermine online customer confidence. To negate these problems, E-business security has to become proactive, by reviewing and continuously improving security to strengthen E-busines...
متن کاملA centralized privacy-preserving framework for online social networks
There are some critical privacy concerns in the current online social networks (OSNs). Users' information is disclosed to different entities that they were not supposed to access. Furthermore, the notion of friendship is inadequate in OSNs since the degree of social relationships between users dynamically changes over the time. Additionally, users may define similar privacy settings for their f...
متن کاملEvaluating the Efficiency and Benchmarking of Regions in an Electricity Distribution Company Using a Public Lighting Asset Management Model
Public lighting networks are constructed and maintained to provide social security and traffic safety. Due to the expansion of cities, the development in public lighting is inevitable. In addition to new investment, the public lighting service and maintenance program imposes high costs on distribution companies. Since performance assessment methods focus on a combination of key performance indi...
متن کاملارزشیابی فناوری اطلاعات با رویکردی تلفیقی
The IT value measurement model proposed to evaluate the business value of IT. This model utilizes some different tools and techniques such as: Benchmarking, Balanced Scorecard, qualitative and quantitative measurement techniques. The basis of this model is a link between 3-layer IT classification and IT planning with a combinatorial approach. Connecting these three layers with effectiveness an...
متن کاملA NEW PROTOCOL MODEL FOR VERIFICATION OF PAYMENT ORDER INFORMATION INTEGRITY IN ONLINE E-PAYMENT SYSTEM USING ELLIPTIC CURVE DIFFIE-HELLMAN KEY AGREEMENT PROTOCOL
Two parties that conduct a business transaction through the internet do not see each other personally nor do they exchange any document neither any money hand-to-hand currency. Electronic payment is a way by which the two parties transfer the money through the internet. Therefore integrity of payment and order information of online purchase is an important concern. With online purchase the cust...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Informatica (Slovenia)
دوره 31 شماره
صفحات -
تاریخ انتشار 2007