Running Head: SECURITY ISSUES OF SMALL E-COMMERCE WEBSITES
E-commerce Website Security Issues
March 26, 2008
Abstract
The research topic I have chosen for this CIS666 final paper is focused on recognition and evaluation of e-commerce website security issues for a small company that lacks the technical and human resources to fully cover all aspects of running a website. How can a small company protect its e-commerce website against all the security threats endangering company’s assets and operations? With the list of security issues I covered in this paper, my recommendation is, that a small company with limited resources should outsource running of its e-commerce website to a credible web-hosting company with enough IT resources
…show more content…
That might require additional staffing, extra training and also opening access to the systems to more people and that creates additional security issues. A critical hardware must be duplicated, periodically tested and updated to insure continuous operations. The best practice is to have at least two geographical locations to prevent a disruption of operations due to a local disaster. The same applies for data. There must be a sufficient data backup that is occasionally tested for consistency and there should be several geographical locations for back-up data storage, but easy and fast access in case of emergency. And that in turn creates again some additional security issues, because the back-up data must be as secure as the original data to insure full data security. Successful security plans include evaluation of data sensitivity, integrity, confidentiality, and date availability. System confidentiality assures that all data in the system is protected from disclosure to unauthorized processes, people, or devices. System integrity insures that company’s data is protected from unanticipated/unauthorized, or unintentional destruction (or modification). System availability provides assurance that data, services, and IT system resources are accessible to all system-related processes and authorized users on a reliable and timely basis, while protected from denial of service (Assessing the Security of Federal IT Systems, 2007).
During SDLC phase one, the initiation phase, “the need for a system is expressed and the purpose of the system is documented” (NIST, 2008). Some of the expected outcomes from this phase would be a project plan and schedule; system performance specifications outlining the operational requirements, system design documents, and a document that defines roles and responsibilities. The corresponding RMF step, security categorization, establishes the foundation for security standardization among information systems and provides a vital step towards integrating security into the information system (NIST, 2008). During this step, the type(s) of information processed by the information system are identified and the information system is categorized to determine the level of protection requirements to put in place. Some of the expected outputs of this step include a security project plan and schedule, documented system boundary, the system categorization, and the security roles and responsibilities. These two process steps are very similar except the focus of RMF is on information security related functions. In some cases, SDLC produces the expected outputs that RMF requires, and the security professionals only require a copy of the documentation for their records. For example, the system design document often depicts the system boundary. The reason this step is so critical is that it
Other security elements are in reference to data recovery, database administration, handling a breach in security and administrative security policies such as access procedure, employee transfer and excessive user access. As I assume the role of the chief security officer, database designer, database administrator, and chief applications designer this project is very important to the armed services and the Virgin Islands National Guard as we strive to provide global security.
Information will only have value if customers can access it at the right times. Availability can be affected by system errors, and malicious attacks as well as infrastructure problems. Availability is ensured by maintaining hardware as well as repairing hardware immediately when need arise. A correct functioning operating system should also be maintained in the environment free of software conflicts. Adequate communication bandwidth should also be addressed as well as preventing bottlenecks from occurrence.
A successful IT system is something that is composed of several different functional components to make it a whole. It takes each component to efficiently work so that the entire system runs smoothly. When one or more parts of the system are not properly working it can affect the entire IT system as a whole and render it completely vulnerable to people with malicious intentions. In this paper I will discuss the role of each component in it and shed some light as to why each is needed.
Miller Inc. which is in the business of providing data collection and analytics services relies majorly on network security to keep its competitive advantage. This is because the customers that rely on the company's system trust that since there are sufficient security measures that have been ensured, they can store their data securely. Each of the functional models of the system should have sufficient security measures to ensure that complete security of the whole system architecture is achieved. The three functional modules are the backend module, services or operation module and customer access module. The major relationship between infrastructure and security comes in the role they play to ensure that the end user gets the data that they need when they need it and in the best way possible. Therefore for the three modules, there is a need to balance security with the right infrastructure.
Assessments are used to determine if sufficient security is being utilized to protect federal data. These requirements are put in place to identify vulnerabilities within the information security infrastructure. It rates potential weak points that may be caused if vulnerability was found and a plan of action must be developed and executed to elevate found vulnerabilities to meet desire security standards. System administrators are obligated to assist their higher levels with found assessment and suggestions on how to improve the information system infrastructure. Scanning the system infrastructure is one of many modes used to assess the strength of information security. Several software, such as QualysGuard, have been designed to scan system architecture. QualysGuard is an automated suite that simplifies information security measures by rendering critical security intelligence. The suite offers full protection of all information security systems, auditing, and compliance assessments. Accrediting and
An effective information security program should include, periodic assessments of risk, including the magnitude of harm that could result from the unauthorized access, use, disclosure, disruption, modification, or destruction of information and information systems that support the operations and assets of the organization. Policies and procedures should be based on risk assessments, cost effective reduced information security risk, and it should ensure that the information security is addressed throughout the entire life cycle of each and every organizational information system. Subordinate plans for providing sufficient information security for groups of the information system, facilities, networks, or information systems.
In cutting edge business situations that depend vigorously on data innovation, the system security review or evaluation is a crucial part of system support and repair. A system security advisor will regularly play out a review as the primary stage in giving counseling administrations to a business. Notwithstanding, these establishment building reviews, organizations should likewise perform system security reviews or appraisals all the time to guarantee ideal execution.
He/she must perform a risk assessment of common applications to identify potential security problems. The preliminary analysis will also answer questions such as who requires internet access, email, or VPN which might implicate the need for firewalls on the network to protect against unauthorized access to and from the outside of the network. Finally, the impact of any downtime whether planned or unexpected needs to be addressed. How critical is it to the business to have near 100% uptime? This determination effects how protective measures such as redundancy, clustered servers, disk arrays with RAID techniques, or multiple links between sites are built into the network.
Cincom Systems is a global provider of enterprise software for many of the world's largest manufacturers and defense contractors. Their approach to defining an IT Security Plan is defined in this document as is the definition of their Disaster Recovery Plan (DRP). As Cincom is a global leader in the development and implementation of enterprise software, the focus of this IT Security Plan details how to best secure and protect not only their core intellectual property (IP) but that of their customers as well, many of which are government agencies headquartered both in the U.S. and throughout the world. The most effective IT Security Plans and Policies both support and streamline the attainment of corporate objectives over time (Johnson, 2011). Information security is crucial for the overall development of an effective strategic plan as well, concentrating on how enterprise systems can be extended, enhanced while also better aligned to the specific needs of global expansion in a business (Merkow, Breithaupt, 2006). As Cincom operates in 17 different nations and continually invests in new application development to support many foreign governments' information systems and defense-related needs, there is a corresponding increase in the level of security its systems must also deliver. The intent of this analysis is to define how Cincom can become more effective in managing potential threats, and also how it can use a
In the last decade, more and more companies have started to look into e-commerce to connect them to the infinite world of global suppliers, partners, consumers and much more. This boom in technology has placed multiple assets are risk from a security stand point allowing hackers/crakers and anyone on the internet to gain access to these network and gain information or try to jeopardize business to a point where it stand stills.
This paper will describe a nine-point mission statement for the company from the new corporate CIO. It will address the new strategy in a three-phase rollout plan. It will then speculate why the fifth point, “Meet information requirements of management”, is in the CIO’s list of nine points. It will then imagine only three points are to be rolled out in the first phase and evaluate each point to determine the most important three for the initial rollout phase. Finally, it will recommend one additional point the CIO should include in order to ensure the topic of security is addressed in the mission statement with an explanation.
We hear of IT security, Information Security and Enterprise Security, these are three areas that any company needs to have a plan to safeguard since these are three areas of accountability. While all ares need safeguarding they are not all one in the same. There are three elements to information security, preservation of confidentiality, maintaining integrity, and ensuring availability. (Gelbstein, 2013, p. 27)
Financial institutions in particular must maintain an ongoing information security risk assessment program that effectively gathers data regarding the information and technology assets of the organization, threats to those assets, vulnerabilities, existing security controls and processes, and the current security standards and requirements, analyses the probability and impact associated with the known threats and
As we discussed in our steering committee last week, you raised two concerns – security and data confidentiality – about hosting our corporate’s website outside our datacenter – in particular, on the cloud. I’m writing to you to convince you that hosting the corporate’s website on the cloud is the best option for the following reasons: it reduces operating cost, frees our staff to do other tasks, and provides better security. This report gives an overview of the current status of our website, explores available hosting options, and shows overall risks. In addition, you will find the team’s recommendations on this subject.