E-commerce is proceeding at a furious pace and continued growth is expected. Where is E-commerce being implemented? On the Internet – a network that was designed for openness, not security. E-commerce, an application that demands high security, is occurring on a network with no inherent security.
Despite these security risks, few organizations are taking sufficient measures to protect their networks and applications. CTR’s report identifies the security vulnerabilities that E-commerce sites face and examines technologies and procedures that can systematically address those vulnerabilities.
Security issues have not intersected the bottom line as significantly as it does E-commerce. Fortunately, the threats – both internal and external – can be addressed through a powerful combination of security technologies, including encryption, authentication, firewalls, and intrusion detection systems. CTR’s report examines the effectiveness of these technologies and discusses the products available for implementing virtual private networks (VPNs) and secure E-mail.
The report explores effective security architectures for extranets and details extranet information systems design and the risks of competitive intelligence.
This report from CTR will help information technology (IT) professionals** – Identify the security risks of E-commerce sites – Develop an effective enterprise security policy – Implement E-commerce security technologies – Minimize the damage if security breaches occur.