Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

Security challenges and solutions for e-business

Security challenges and solutions for e-business

For access to this article, please select a purchase option:

Buy chapter PDF
£10.00
(plus tax if applicable)
Buy Knowledge Pack
10 chapters for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
Information Security: Foundations, Technologies and Applications — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

The advantages of economic growth and increasing ease of operation afforded by e-business and e-commerce developments are unfortunately matched by growth in cyberattacks. This chapter outlines the common attacks faced by e-business and describes the defenses that can be used against them. It also reviews the development of newer security defense methods. These are (1) biometrics for authentication, (2) parallel processing to increase power and speed of defenses, (3) data mining and machine learning to identify attacks, (4) peer-to-peer security using blockchains, (5) enterprise security modeling and security as a service, and (6) user education and engagement. The review finds overall that one of the most prevalent dangers is social engineering in the form of phishing attacks. Recommended counteractions include education and training, and the development of new machine learning and data sharing approaches so that attacks can be quickly discovered and mitigated.

Chapter Contents:

  • Abstract
  • 6.1 Introduction
  • 6.2 Current security threats in e-commerce
  • 6.2.1 Denial of service
  • 6.2.2 Unauthorized access
  • 6.2.3 Spying attacks
  • 6.2.4 Summary of attacks and methods
  • 6.3 Current security solutions
  • 6.4 New developments in security for e-business
  • 6.4.1 Biometrics for authentication
  • 6.4.2 Parallelism to increase power and speed of defenses
  • 6.4.3 Data mining and machine learning to identify attacks
  • 6.4.4 Peer-to-peer security using blockchains
  • 6.4.5 Enterprise security modeling and security as a service
  • 6.4.6 User education and engagement
  • 6.5 Conclusion
  • References

Inspec keywords: electronic commerce; data mining; learning (artificial intelligence); Internet; computer crime; telecommunication security; security of data

Other keywords: peer-to-peer security using blockchains; economic growth; defenses; e-commerce developments; phishing attacks; cyberattacks; (5) enterprise security modeling; (3) data mining; data sharing approaches; engagement; solutions; (6) user education; speed; chapter; common attacks; power; machine learning; newer security defense methods

Subjects: Cryptography; Knowledge engineering techniques; Computer communications; Data security; Other computer networks

Preview this chapter:
Zoom in
Zoomout

Security challenges and solutions for e-business, Page 1 of 2

| /docserver/preview/fulltext/books/sc/pbse001e/PBSE001E_ch6-1.gif /docserver/preview/fulltext/books/sc/pbse001e/PBSE001E_ch6-2.gif

Related content

content/books/10.1049/pbse001e_ch6
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address