Online Business Security Systems (eBook)

eBook Download: PDF
2007 | 2007
XVIII, 220 Seiten
Springer US (Verlag)
978-0-387-68850-3 (ISBN)

Lese- und Medienproben

Online Business Security Systems - Godfried B. Williams
Systemvoraussetzungen
53,49 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

This book applies the concept of synchronization to security of global heterogeneous and hetero-standard systems by modeling the relationship of risk access spots (RAS) between advanced and developing economies network platforms. The proposed model is more effective in securing the electronic security gap between these economies with reference to real life applications, such as electronic fund transfer in electronic business. This process involves the identification of vulnerabilities on communication networks. This book also presents a model and simulation of an integrated approach to security and risk known as Service Server Transmission Model (SSTM).


Online Business Security Systems applies the concept of synchronization to security of global heterogeneous and hetero-standard systems by modeling the relationship of risk access spots (RAS) between advanced and developing economies network platforms. The proposed model is more effective in securing the electronic security gap between these economies with reference to real life applications, such as electronic fund transfer in electronic business. This process involves the identification of vulnerabilities on communication networks. This professional book also presents a model and simulation of an integrated approach to security and risk known as Service Server Transmission Model (SSTM).Online Business Security Systems is designed for both a professional and an academic audience. This includes researchers and practitioners in industry, as well as graduate students studying network security and risk/security management. 

Contents 6
List of Figures 8
List of Tables 9
Foreword 10
Preface 12
Acknowledgements 14
Chapter 1 Overview of Commercial Activities and Processes in Online Business 16
1.1 Introduction 16
1.2 Commercial Activities and Processes 16
1.3 Payments Systems and Gateways 20
1.4 What is Trust? 23
1.5 Role of Stakeholders in Online Business 26
1.6 Summary 29
Chapter 2 Legal and Socio-Ethical Issues in Online Business 30
2.1 Introduction 30
2.2 Legislation and Law 30
2.3 Social and Ethical Issues 49
2.4 Summary 50
Chapter 3 Online Business Systems 51
3.1 Introduction 51
3.2 Heterogeneous and Hetero-Standard Systems 51
3.3 Infrastructure 52
3.4 Integrated Services Digital Network (ISDN) 53
3.5 Local Area Network (LAN) 54
3.6 Wide Area Networks (WAN) 54
3.7 Internet and Voice over IP (VoIP) 55
3.8 VoIP 56
3.9 Supporting Protocols and Standards 60
3.10 Wireless and Mobile Communication Systems 63
3.11 Summary 68
Chapter 4 Online Business Security Technologies 69
4.1 Introduction 69
4.2 Security Standards and Protocols 69
4.3 Managing the Implementation of Standards 71
4.4 Security Systems and Technologies 78
4.5 Encryption and Online Security 81
4.6 Summary 100
Chapter 5 to Communication Networks Risk Access Spots (RAS) Common 101
5.1 Introduction 101
5.2 Risk Access Spots (RAS) 101
5.3 Summary 127
Chapter 6 Methods of Attacks on Risk Access Spots: Online Information Warfare 128
6.1 Introduction 128
6.2 Overview of Attacks 128
6.3 Summary 143
Chapter 7 Security Risk Modelling 144
7.1 Introduction 144
7.2 Overview of Existing Methods and Approaches 144
7.3 Overview of CRAMM 148
7.4 ASSET (Automatic Security Self Evaluation Tool) – 151
7.5 JAVA Security Model 151
7.6 Current Approaches and Trends in Security Management 152
7.7 Summary 154
Chapter 8 Theoretical, Conceptual and Empirical Foundations of SSTM ( SERVICE SERVER TRANSMISSION MODEL) 155
8.1 Introduction 155
8.2 Theoretical Concepts 155
8.3 SSTM 158
8.4 Reasons for SSTM 158
8.5 Descriptions of SSTM of Synchronizing E-Security Methodology 162
8.6 Pictorial Representation of SSTM 164
8.7 Guidelines for Using the Model 170
8.8 General Concepts 172
8.9 Symbolic and Mathematical Notations 178
8.10 Graphical Notations 179
8.11 Summary 180
Chapter 9 Simulating SSTM Using Monte Carlo 181
9.1 Introduction 181
9.2 General Problem Scenario 181
9.3 Overview of Monte Carlo 182
9.4 Methodology for Testing SSTM 183
9.5 Application of SSTM in Case Studies 184
9.6 SSTM Results and Analysis 212
9.7 Findings 212
9.8 Recommendations Made to Stakeholders from the Study 213
9.9 Summary 215
Chapter 10 Discussions 216
10.1 Bibliography and References 220
Index 228

Erscheint lt. Verlag 24.8.2007
Zusatzinfo XVIII, 220 p.
Verlagsort New York
Sprache englisch
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Office Programme Outlook
Informatik Theorie / Studium Algorithmen
Informatik Theorie / Studium Kryptologie
Naturwissenschaften
Wirtschaft Betriebswirtschaft / Management Marketing / Vertrieb
Schlagworte ACCESS • Communication • Computer Science • Electronic Business • Information • Modeling • Networks • Network Security • Online • security • Security Systems • Simulation • Systems • Williams
ISBN-10 0-387-68850-1 / 0387688501
ISBN-13 978-0-387-68850-3 / 9780387688503
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 3,2 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Umfassendes Sicherheits-, Kontinuitäts- und Risikomanagement mit …

von Klaus-Rainer Müller

eBook Download (2023)
Springer Fachmedien Wiesbaden (Verlag)
79,99
Methodische Kombination von IT-Strategie und IT-Reifegradmodell

von Markus Mangiapane; Roman P. Büchler

eBook Download (2024)
Springer Vieweg (Verlag)
42,99