/>
X

Securing your e-business

You can't have e-business without security. It goes beyond firewalls and virus protection. Its about developing the confidence of customers and businesses in engaging in business over the web.
zd-defaultauthor-lloyd-tanaka.jpg
Written by Lloyd Tanaka on
The eBusiness revolution that is sweeping the globe is changing the way companies make transactions, address their markets, and approach their customers. According to IDC, eBusiness in 1999 was worth some US$130 billion, and expected to explode. eBusiness gives companies the power to enter new markets and win new customers, reduce costs, and improve a greatly expanded number of services.

But while eBusiness opens the door to billions of dollars in

Studies show that some 12.5 percent of e-Commerce transactions are abandoned by customers due to security concerns.

revenues, it also opens the door to potentially crippling security hazards. Because eBusiness reaches out to millions of end users and invites them into Web sites, invaluable corporate information, mission-critical business applications, and consumers' private information are more at risk than ever before.

However, while security is one of the most critical risk factors for e-Business, it is often overlooked as integral to the e-Business infrastructure. Companies looking for quick solutions and even quicker results have taken security for granted or underestimated its importance to the ongoing stability of the e-Business itself.

This is a flawed approach. Even if companies disregard security as something unimportant, their customers do not. Studies show that some 12.5 percent of e-Commerce transactions are abandoned by customers due to security concerns. This translates to a substantial loss in potential revenues. The confidence of customers, suppliers and business partners cannot be won with a haphazard, reactive approach to security.

eBusiness security challenges

In an eBusiness environment, there are numerous points of potential attack: the Internet, company Intranets, LANs, WANs, customers, telecommuters, branch offices, and extranets with suppliers and partners. e-security threats such as viruses, Denial of Service attacks, the introduction of malicious code, and confidentiality and authentication issues, among others, are launched at any number of exploited attack points.

In a nutshell, complete eBusiness security management is about:
  • Protecting the e-Business
    includes not only anti-virus and firewall software, but also other protective solutions such as Web access control, content inspection (i.e. malicious java code), intrusion detection and encryption.

  • Extending the full potential of eBusiness
    is to enable by extending security to interact with an enterprise's partners, suppliers, customers and consumers. Digital signatures, identity verification, and auditing tools are among some of the more commonly deployed measures to provide a stronger authentication.


  • A complete and effective eSecurity solution should have the following qualities:
    • It should have an effective 'low tech' management component
      that is a combination of sound and comprehensive security policy, effective and consistent enforcement, and regular audit. Given that about two-thirds of security breaches originate from internal sources, this component should also address the 'non-tech' aspect. This includes passwords openly displayed in the office, social engineering, as well as the human factor that contributes to security lapses, such as a disgruntled employee who makes off with crucial documents.

    • It should be an integrated solution with security and system management components
      to seamlessly cover all the relevant points of vulnerability - from back-end systems to the extended enterprise such as customers and suppliers interacting from remote terminals.

    • It should be scalable,
      and be able to grow along with the eBusiness.

    • It should have an effective intelligence component
      that allows for 'big picture' governance of the e-Business security environment. This intelligence component can alert personnel to possible problems or possible impending attacks so that proactive measures can be taken.


    It's a Strategy, not a Product

    Security is the essential ingredient in every virtual business relationship. The focus among many companies has often been on point solutions that address just some components of the business environment. However, e-Security has expanded beyond virus protection and firewalls. e-Businesses need to take a strategic, end-to-end approach to integrated security planning, implementation and management.

    A complete and effective e-security solution not only defends against points of vulnerability to protect the business, it also allows the eBusiness to extend, grow and become successful in the long term.

    The Cost of Computer Crime
    The following statistics are derived from the 1999 research conducted by the Computer Security Institute and the FBI. A total of 521 companies, organizations and educational institutions were surveyed. While 51 percent of respondents had experienced financial losses, this data represents the experience of the 31 percent who could quantify losses.
    Type of Crime

    Victimized

    Average loss

    Unauthorized insider access

     55%

    $143,000

    Theft of proprietary information

     26%

    $1,848,000

    Telecom fraud

     17%

    $27,000

    Financial fraud

     14%

    $1,471,000

    System penetration by an outsider

     31%

    $103,000

    Sabotage of data or networks

     19%

    $164,000

    Denial of service

     32%

    $116,000

    Insider abuse of Net access

     97%

    $93,500

    Telecom eavesdropping

     13%

    $76,500

    Virus Infection

     90%

    $45,500

    Active wiretapping

     2%

    $20,000

    Laptop theft

    69% 

    $87,000

    The fact is, effectively protecting businesses from electronic attack, and providing safe and secure ways to conduct e-Business, are efforts that will positively impact a company's bottom line. Successful management of e-Security issues will help protect the eBusiness from potentially destructive cyber attacks and security breaches. This helps build the necessary trust and confidence from customers and business partners to drive them to actively participate in eBusiness.

    Lloyd Tanaka is Senior Business Manager of eTrust at Computer Associates




Related

This stuff is better than compressed air for cleaning your dirty tech
img-6864

This stuff is better than compressed air for cleaning your dirty tech

Office Hardware & Appliances
Google looks to reduce pushback bias in developers' software code review
close up programmer man hand typing on keyboard at computer desktop for input coding language to software for fix bug and defect of system in operation room , technology concept

Google looks to reduce pushback bias in developers' software code review

Developer
Are you ready for the worst Economy Class airline seats in the world?
airline-seats.jpg

Are you ready for the worst Economy Class airline seats in the world?

Business