SlideShare a Scribd company logo
1 of 32
E-Business & Online Security: A Technical Concern Or A Strategic Priority Monroe Myers   Sunny Joshi Global E-Business Marketing (200232) Online Seminar E-Business & Online Security: A Technical Concern Or A Strategic Priority
Definitions Literature Review & Findings Specific Topic Related Examples Discussion & Recommendations Video Futuristic Scenario Questions & Answers E-Business & Online Security: A Technical Concern Or A Strategic Priority Agenda
[object Object],Online security Threat “ A threat that creates a circumstance, condition, or event with the potential to cause economic hardship to data or network resources in the form of destruction, disclosures, modification of data, denial of service, and/or fraud, waste and abuse” (Kalakota and Whinston, 1997). Information security “ The technical guarantees that ensure that the legal requirements and good practices with regard to privacy will be effectively met” (Flavian and Guinaliu, 2006). E-Business & Online Security: A Technical Concern Or A Strategic Priority
Definitions Information warfare “ The actions intended to protect, exploit, corrupt, deny, or destroy information or information resources in order to achieve a significant advantage, objective, or victory over an adversary” (Alger, 1996). Internet Security Risk (ISR) “ The degree of uncertainty and mistrust aroused from thoughts about providing personal and financial information over the internet” (Lynn  et al.,  2011). E-Business & Online Security: A Technical Concern Or A Strategic Priority
Definitions Trust “ The willingness to rely on another based on expectations of ability, benevolence, and integrity” (Lee and Turban, 2001; Bhattacherjee, 2002). “ The willingness of a trustor to be vulnerable to actions of a trustee due to an expectation the trustor will behave responsibly” (Mayer  et al.,  1995). Privacy “ The degree to which the online shopping web site is safe and protects the customers’ information” (Chiu  et al. , 2009). E-Business & Online Security: A Technical Concern Or A Strategic Priority
Literature Review & Findings In general, the need for trust is created in instances involving vulnerability and uncertainty (Bhattacherjee, 2002; Koufaris and Hampton-Sosa, 2004). Under online conditions, the need for trust is significantly enhanced. (Bart  et al. , 2005; Grabner-Krauter and Kaluscha, 2008). Lack of consumer trust is considered a major factor in impeding e-commerce (Casalo´, Flavia´n and Guinalı´u, 2007). E-Business & Online Security: A Technical Concern Or A Strategic Priority
Literature Review & Findings As new technologies enhance the complexity of information and its capacity to be processed, privacy is increasingly becoming an important issue, therefore, consumer distrust about gathering and processing personal information is on the rise (Flavia´n and Guinalı´u, 2006). E-Business & Online Security: A Technical Concern Or A Strategic Priority
Literature Review & Findings Consumers do hesitate when shopping online whenever they feel that their financial information is likely to be compromised (Collier and Bienstock, 2006). Consumers’ perceptions of privacy carry a positively significant effect on trusting online vendors (Chiu  et al. , 2009). E-Business & Online Security: A Technical Concern Or A Strategic Priority
Literature Review & Findings One of the most striking features of the fight for online 'supremacy' is connected with the fact that novel approaches to undermining personal and financial information follow in the steps of state-sponsored cyber-warfare practices. (Cronin, 2002; Hutchinson, 2002) E-Business & Online Security: A Technical Concern Or A Strategic Priority
Literature Review & Findings Around the world, many nations spend large sums on information warfare programs. Those include Russia, China, India, Taiwan, Israel, France, Brazil and Iran (Adams, 2001). China, for instance, has committed itself to improving information warfare capabilities (Rhem, 2005). Therefore, special attention needs to be paid to security concerns when considering outsourcing IT functions to foreign-country organisations, for example (Pruitt, 2004). E-Business & Online Security: A Technical Concern Or A Strategic Priority
Literature Review & Findings Internet-based, low cost cyber-threats target civilian information assets and threaten the economic stability of modern societies (Bush, 2003). Information warfare may become commonplace in four spheres: military, economic, social and personal (Cronin and Crawford, 1999) E-Business & Online Security: A Technical Concern Or A Strategic Priority
Literature Review & Findings Criminal activity is rapidly expanding into an underground economy specialising in identity theft, phishing and spam (Verton, 2004) as technical barriers to gaining access to valuable resources fall (Kenneth, Knapp and Boulton, 2006). E-Business & Online Security: A Technical Concern Or A Strategic Priority
Literature Review & Findings Cyber-technology is increasingly used in corporate espionage (Hansell, 2004). The rise of trusted malware exemplifies the harnessing of the very tools, designed by security firms for enhancing protection, for gaining unfettered access to valuable information and serve to infiltrate networks. 53,834 pieces of signed malware were detected in the first 5 months of 2011, a 300% increase on the previous year (AVG, 2011). E-Business & Online Security: A Technical Concern Or A Strategic Priority
Literature Review & Findings Recently, stolen digital certificates made headlines with the Stuxnet 'worm' and the RSA hack of Lockheed Martin network breach (AVG, 2011). Spyware and adware can take the form of legitimate applications with illegal intentions (Stafford and Urbaczewski, 2004). E-Business & Online Security: A Technical Concern Or A Strategic Priority
Around 7,000 spyware programs reportedly existed five years ago and are responsible for 50% of all PC crashes (Sipior, Ward and Roselli, 2005). 91 percent of home computers host spyware code (Richmond, 2004). Identity theft is another type of 'cyber-terrorism against individuals' (Sterling, 2004). Literature Review & Findings E-Business & Online Security: A Technical Concern Or A Strategic Priority
Literature Review & Findings As a result of the growing risk, demand for certifiably skilled cyber-security specialists is growing as organisations move to protect an increasingly valuable asset, information. In conjunction with senior management, qualified personnel facilitate programmes in security education, risk assessment and cultural change towards a better understanding of data security (Dutta and McCrohan, 2002). E-Business & Online Security: A Technical Concern Or A Strategic Priority
Literature Review & Findings Lately, cyber-criminals are turning their attention to Mac users as the Mac OS platform expands its market share (AVG, 2011). Cyber-crime has ventured into the mobile platforms as they increase their online presence with even greater promises of personal data to compromise. The rise of rogue smart-phone apps such as those relating to Google's Android Market and others is another worrying trend in the battle for online security (PC World, 2011). E-Business & Online Security: A Technical Concern Or A Strategic Priority
Literature Review & Findings Most of the victims of cyber-attacks choose not to inform the outside world about such breaches. In 2005, only 20% of intrusions were reported to law enforcement agencies in the US, primarily because of concerns with negative publicity (Gordon  et al ., 2005). Despite the escalation in the veracity of information technology threats, business managers often lack an adequate understanding of the risks, or are reluctant to take decisive action for providing appropriate levels of information security (Austin and Darby, 2003).  E-Business & Online Security: A Technical Concern Or A Strategic Priority
Literature Review & Findings Top management support was ranked as the most critical information security issue facing organisations by 874 Certified Information System Security Professionals (CISSPs) (Kenneth, Knapp and Boulton, 2006). As a result of the recent wave of cyber-attacks and flowing from the perceived effects of potential liability, including leaks of corporate communications, negotiation contracts and other sensitive information influencing a firm's competitive-advantage in its industry and markets, demand for cyber-insurance is growing fast (Kolodzinski, 2002; Keating, 2003). E-Business & Online Security: A Technical Concern Or A Strategic Priority
Specific Topic Related Examples  McAfee, through its five-year long “ Operation Shady RAT ”, identified 72 government and corporate parties that have been silently compromised, in some instances over years without being detected (Alperovitch, 2011). The list includes: International Olympic Committee (IOC), The United Nations, ASEAN, South Korean steel and construction companies, A US real estate firm, Four US defense contractors, US federal, state and county government agencies, and, ironically,  A computer network security company E-Business & Online Security: A Technical Concern Or A Strategic Priority
Discussion &Recommendations Given current and projected growth of information technology, its use in e-commerce and the magnitude, spread and affordability of launching cyber-threats in their many forms, contemporary levels of complacency afforded by business organisations, individuals and governments are largely and alarmingly  inadequate .  E-Business & Online Security: A Technical Concern Or A Strategic Priority
Discussion &Recommendations As the stakes go higher for all concerned with maintaining a relatively safe and secure online environment, the lack of concerted action by those implicated is likely to prove detrimental to future prospects of growth for e-business should current attitudes to the seriousness of the matter continue to go under-checked.  E-Business & Online Security: A Technical Concern Or A Strategic Priority
Discussion &Recommendations Therefore, it is strongly recommended for all stakeholders to adopt appropriate cyber-strategies for effective information security management. A  multi-layered approach  to protecting online communications and data from prying eyes is needed in order to boost confidence in online services. Under the proposed scheme, governments, business organisations and individuals alike will need to collaborate in creating and maintaining an array of defense barriers in order to minimise chances for over-exposure to the rapidly sophisticated intrusions of the online world. E-Business & Online Security: A Technical Concern Or A Strategic Priority
Discussion &Recommendations For an effective strategy against the invisible threat, elements of technology, law and societal awareness are advised to be incorporated in management's strategy. Bush (2003), for instance, divided the complex cyber-challenge into five levels as part of the National Strategy to Secure Cyberspace. These levels are: home users and small businesses, large enterprises, critical infrastructure sectors, national vulnerabilities, and the global information grid of networked systems.  E-Business & Online Security: A Technical Concern Or A Strategic Priority
Discussion &Recommendations Issues of regulation of the Internet on an international basis might need to be further clarified and the responsibilities of those bodies charged with looking into the global dimension of the threat reassessed in light of recent developments. Corporations are recommended to collaborate with governments in designing appropriate mechanisms for dealing with the problem and reaching binding agreements with regard to their rights and obligations in the process. Individuals carry the ultimate responsibility for using the expanding medium while raising awareness of the dangers of venturing unprepared into the  'World Wild Web '. E-Business & Online Security: A Technical Concern Or A Strategic Priority
Discussion &Recommendations As superior cyber-attack technologies trickle down from state-sponsored labs to the increasingly sophisticated, financially-motivated cyber-criminals of late, businesses of all sizes are faced with the challenging task of managing the risks involved. As the cost of acquiring and effectively deploying the right tools for combating intrusive online behaviour rises, smaller enterprise is likely to attract greater attention by those on the wrong side of the law due to heightened levels of vulnerability. Therefore, it is of significance to help SMEs become better acquainted with their increasingly important role in securing B2B and B2C networks and data streams in an effort to foster a safer online environments. E-Business & Online Security: A Technical Concern Or A Strategic Priority
Discussion &Recommendations The rising trends of cloud computing and social networking, although promising in terms of attracting a larger audience and enhancing the efficiency of communications, are likely to increase the risks associated with cyber-attacks as the pool of stored data is significantly increased. Therefore, top management is advised to reconsider the risk/benefit scenarios of their online endeavours and adjust plans accordingly as restoring lost consumer trust, as a result of inaction, could prove a much more challenging task than securing corporate and consumers' communications. Think Vodafone Ausralia post-VodaFail campaign! E-Business & Online Security: A Technical Concern Or A Strategic Priority
Discussion &Recommendations Finally, a proactive approach to guarding sensitive information resources such as data encryption, backup and access authentication procedures are among the practices to enlist in the virtual war unfolding. E-marketers, in particular, due to their front-line positions need to enhance their security strategies especially those connected with website security design and secured cart and payment solutions in addition to compliance to stringent interface certification practices. E-Business & Online Security: A Technical Concern Or A Strategic Priority
Online security video (Citi Bank) http://www.youtube.com/watch?v=3S4qmfKNxv8 E-Business & Online Security: A Technical Concern Or A Strategic Priority
Futuristic Scenario Its 22 nd  of August, 2015. Armageddon has arrived in its electronic form facilitated by lax online security, the irrational exuberance of e-business growth of late, the proliferation of cyber-warfare tools in the hands of financially- motivated criminals in many advanced and emerging nations. Firms with compromised information infrastructure are faced with a barrage of attacks on a daily basis for which there appears to be no quick remedy. Skyrocketing demand for cyber-insurance has rendered the costs of moderately- effective detection and elimination code unaffordable to most SMEs. E-Business & Online Security: A Technical Concern Or A Strategic Priority
Futuristic Scenario Consumers’ electronic confidence is plummeting faster than anyone thought possible. Online shoppers are turning away from the increasingly unsecure environment in favour of the traditional way of buying goods and services. Social networking and Cloud computing  have been identified by some online security firms as the biggest sources of information leaks used in identity theft incidents. Corporate information databases have been regularly compromised with unspecified sums paid out as a result of victims’ legal actions… Discuss! E-Business & Online Security: A Technical Concern Or A Strategic Priority
Thank You! Questions?? E-Business & Online Security: A Technical Concern Or A Strategic Priority

More Related Content

What's hot

CII Whitepaper India Cyber Risk & Resilience Review 2018
CII Whitepaper India Cyber Risk & Resilience Review 2018CII Whitepaper India Cyber Risk & Resilience Review 2018
CII Whitepaper India Cyber Risk & Resilience Review 2018
Confederation of Indian Industry
 
Sept 2012 data security & cyber liability
Sept 2012   data security & cyber liabilitySept 2012   data security & cyber liability
Sept 2012 data security & cyber liability
DFickett
 
Cyber Security Threats | IIA Boise Chapter
Cyber Security Threats | IIA Boise ChapterCyber Security Threats | IIA Boise Chapter
Cyber Security Threats | IIA Boise Chapter
Patricia M Watson
 

What's hot (20)

FDseminar IT Risk - Yuri Bobbert - Antwerp Management School
FDseminar IT Risk - Yuri Bobbert - Antwerp Management School	FDseminar IT Risk - Yuri Bobbert - Antwerp Management School
FDseminar IT Risk - Yuri Bobbert - Antwerp Management School
 
Cybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityCybersecurity in the Age of Mobility
Cybersecurity in the Age of Mobility
 
Best Practices to Protect Cardholder Data Environment and Achieve PCI Compliance
Best Practices to Protect Cardholder Data Environment and Achieve PCI ComplianceBest Practices to Protect Cardholder Data Environment and Achieve PCI Compliance
Best Practices to Protect Cardholder Data Environment and Achieve PCI Compliance
 
IT Security in Higher Education
IT Security in Higher EducationIT Security in Higher Education
IT Security in Higher Education
 
CII Whitepaper India Cyber Risk & Resilience Review 2018
CII Whitepaper India Cyber Risk & Resilience Review 2018CII Whitepaper India Cyber Risk & Resilience Review 2018
CII Whitepaper India Cyber Risk & Resilience Review 2018
 
Rapid7 Report: Data Breaches in the Government Sector
Rapid7 Report: Data Breaches in the Government SectorRapid7 Report: Data Breaches in the Government Sector
Rapid7 Report: Data Breaches in the Government Sector
 
Contemporary Cyber Security Social Engineering Solutions, Measures, Policies,...
Contemporary Cyber Security Social Engineering Solutions, Measures, Policies,...Contemporary Cyber Security Social Engineering Solutions, Measures, Policies,...
Contemporary Cyber Security Social Engineering Solutions, Measures, Policies,...
 
Sept 2012 data security & cyber liability
Sept 2012   data security & cyber liabilitySept 2012   data security & cyber liability
Sept 2012 data security & cyber liability
 
American Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standardsAmerican Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standards
 
Effects of IT Governance Measures on Cyber-attack Incidents
Effects of IT Governance Measures on Cyber-attack IncidentsEffects of IT Governance Measures on Cyber-attack Incidents
Effects of IT Governance Measures on Cyber-attack Incidents
 
The digital economy and cybersecurity
The digital economy and cybersecurityThe digital economy and cybersecurity
The digital economy and cybersecurity
 
Volume2 chapter1 security
Volume2 chapter1 securityVolume2 chapter1 security
Volume2 chapter1 security
 
Omlis Data Breaches Report - An Inside Perspective
Omlis Data Breaches Report - An Inside Perspective Omlis Data Breaches Report - An Inside Perspective
Omlis Data Breaches Report - An Inside Perspective
 
WCIT 2014 Matt Stamper - Information Assurance in a Global Context
WCIT 2014 Matt Stamper - Information Assurance in a Global ContextWCIT 2014 Matt Stamper - Information Assurance in a Global Context
WCIT 2014 Matt Stamper - Information Assurance in a Global Context
 
IBM Security Services
IBM Security ServicesIBM Security Services
IBM Security Services
 
Protecting Patient Health Information in the HITECH Era
Protecting Patient Health Information in the HITECH EraProtecting Patient Health Information in the HITECH Era
Protecting Patient Health Information in the HITECH Era
 
IBM 2015 Cyber Security Intelligence Index
IBM 2015 Cyber Security Intelligence IndexIBM 2015 Cyber Security Intelligence Index
IBM 2015 Cyber Security Intelligence Index
 
Cyber Security Threats | IIA Boise Chapter
Cyber Security Threats | IIA Boise ChapterCyber Security Threats | IIA Boise Chapter
Cyber Security Threats | IIA Boise Chapter
 
You Are the Target
You Are the TargetYou Are the Target
You Are the Target
 
Atos wp-cyberrisks
Atos wp-cyberrisksAtos wp-cyberrisks
Atos wp-cyberrisks
 

Viewers also liked

Viewers also liked (7)

Gebm os presentation final
Gebm os presentation finalGebm os presentation final
Gebm os presentation final
 
Secura Security India Overview
Secura Security India OverviewSecura Security India Overview
Secura Security India Overview
 
How to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanHow to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media Plan
 
Learn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionLearn BEM: CSS Naming Convention
Learn BEM: CSS Naming Convention
 
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika AldabaLightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
 
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job? Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
 
SEO: Getting Personal
SEO: Getting PersonalSEO: Getting Personal
SEO: Getting Personal
 

Similar to Gebm os presentation final

OverseeCyberSecurityAsHackersSeekToInfiltrate
OverseeCyberSecurityAsHackersSeekToInfiltrateOverseeCyberSecurityAsHackersSeekToInfiltrate
OverseeCyberSecurityAsHackersSeekToInfiltrate
Kashif Ali
 
ARTICLE IN PRESSContents lists available at ScienceDirect.docx
ARTICLE IN PRESSContents lists available at ScienceDirect.docxARTICLE IN PRESSContents lists available at ScienceDirect.docx
ARTICLE IN PRESSContents lists available at ScienceDirect.docx
festockton
 
DBryant-Cybersecurity Challenge
DBryant-Cybersecurity ChallengeDBryant-Cybersecurity Challenge
DBryant-Cybersecurity Challenge
msdee3362
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
AnastaciaShadelb
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
ChantellPantoja184
 
Running Head INFORMATION SECURITY VULNERABILITY 2.docx
Running Head INFORMATION SECURITY VULNERABILITY     2.docxRunning Head INFORMATION SECURITY VULNERABILITY     2.docx
Running Head INFORMATION SECURITY VULNERABILITY 2.docx
charisellington63520
 

Similar to Gebm os presentation final (20)

OverseeCyberSecurityAsHackersSeekToInfiltrate
OverseeCyberSecurityAsHackersSeekToInfiltrateOverseeCyberSecurityAsHackersSeekToInfiltrate
OverseeCyberSecurityAsHackersSeekToInfiltrate
 
ARTICLE IN PRESSContents lists available at ScienceDirect.docx
ARTICLE IN PRESSContents lists available at ScienceDirect.docxARTICLE IN PRESSContents lists available at ScienceDirect.docx
ARTICLE IN PRESSContents lists available at ScienceDirect.docx
 
DBryant-Cybersecurity Challenge
DBryant-Cybersecurity ChallengeDBryant-Cybersecurity Challenge
DBryant-Cybersecurity Challenge
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
Running Head INFORMATION SECURITY VULNERABILITY 2.docx
Running Head INFORMATION SECURITY VULNERABILITY     2.docxRunning Head INFORMATION SECURITY VULNERABILITY     2.docx
Running Head INFORMATION SECURITY VULNERABILITY 2.docx
 
Industry Trendsin Information Security
Industry Trendsin Information SecurityIndustry Trendsin Information Security
Industry Trendsin Information Security
 
December ISSA Meeting Executive Security Presentation
December ISSA Meeting   Executive Security PresentationDecember ISSA Meeting   Executive Security Presentation
December ISSA Meeting Executive Security Presentation
 
Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.
 
softwss
softwsssoftwss
softwss
 
Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020
 
The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017
 
Digital Forensics Market, Size, Global Forecast 2023-2028
Digital Forensics Market, Size, Global Forecast 2023-2028Digital Forensics Market, Size, Global Forecast 2023-2028
Digital Forensics Market, Size, Global Forecast 2023-2028
 
Team 3_Final Project.docx
Team 3_Final Project.docxTeam 3_Final Project.docx
Team 3_Final Project.docx
 
Cyber Security – Indian Perspective.pptx
Cyber Security – Indian Perspective.pptxCyber Security – Indian Perspective.pptx
Cyber Security – Indian Perspective.pptx
 
DSS @RIGA COMM2013 - The Value of an IT Security for Business People
DSS @RIGA COMM2013 - The Value of an IT Security for Business PeopleDSS @RIGA COMM2013 - The Value of an IT Security for Business People
DSS @RIGA COMM2013 - The Value of an IT Security for Business People
 
Class activity 4
Class activity 4 Class activity 4
Class activity 4
 
Get Prepared
Get PreparedGet Prepared
Get Prepared
 
Ecommerce security
Ecommerce securityEcommerce security
Ecommerce security
 
SPEEDA INSIGHTS_Market Prospects for the Security Industry
SPEEDA INSIGHTS_Market Prospects for the Security IndustrySPEEDA INSIGHTS_Market Prospects for the Security Industry
SPEEDA INSIGHTS_Market Prospects for the Security Industry
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

Gebm os presentation final

  • 1. E-Business & Online Security: A Technical Concern Or A Strategic Priority Monroe Myers   Sunny Joshi Global E-Business Marketing (200232) Online Seminar E-Business & Online Security: A Technical Concern Or A Strategic Priority
  • 2. Definitions Literature Review & Findings Specific Topic Related Examples Discussion & Recommendations Video Futuristic Scenario Questions & Answers E-Business & Online Security: A Technical Concern Or A Strategic Priority Agenda
  • 3.
  • 4. Definitions Information warfare “ The actions intended to protect, exploit, corrupt, deny, or destroy information or information resources in order to achieve a significant advantage, objective, or victory over an adversary” (Alger, 1996). Internet Security Risk (ISR) “ The degree of uncertainty and mistrust aroused from thoughts about providing personal and financial information over the internet” (Lynn et al., 2011). E-Business & Online Security: A Technical Concern Or A Strategic Priority
  • 5. Definitions Trust “ The willingness to rely on another based on expectations of ability, benevolence, and integrity” (Lee and Turban, 2001; Bhattacherjee, 2002). “ The willingness of a trustor to be vulnerable to actions of a trustee due to an expectation the trustor will behave responsibly” (Mayer et al., 1995). Privacy “ The degree to which the online shopping web site is safe and protects the customers’ information” (Chiu et al. , 2009). E-Business & Online Security: A Technical Concern Or A Strategic Priority
  • 6. Literature Review & Findings In general, the need for trust is created in instances involving vulnerability and uncertainty (Bhattacherjee, 2002; Koufaris and Hampton-Sosa, 2004). Under online conditions, the need for trust is significantly enhanced. (Bart et al. , 2005; Grabner-Krauter and Kaluscha, 2008). Lack of consumer trust is considered a major factor in impeding e-commerce (Casalo´, Flavia´n and Guinalı´u, 2007). E-Business & Online Security: A Technical Concern Or A Strategic Priority
  • 7. Literature Review & Findings As new technologies enhance the complexity of information and its capacity to be processed, privacy is increasingly becoming an important issue, therefore, consumer distrust about gathering and processing personal information is on the rise (Flavia´n and Guinalı´u, 2006). E-Business & Online Security: A Technical Concern Or A Strategic Priority
  • 8. Literature Review & Findings Consumers do hesitate when shopping online whenever they feel that their financial information is likely to be compromised (Collier and Bienstock, 2006). Consumers’ perceptions of privacy carry a positively significant effect on trusting online vendors (Chiu et al. , 2009). E-Business & Online Security: A Technical Concern Or A Strategic Priority
  • 9. Literature Review & Findings One of the most striking features of the fight for online 'supremacy' is connected with the fact that novel approaches to undermining personal and financial information follow in the steps of state-sponsored cyber-warfare practices. (Cronin, 2002; Hutchinson, 2002) E-Business & Online Security: A Technical Concern Or A Strategic Priority
  • 10. Literature Review & Findings Around the world, many nations spend large sums on information warfare programs. Those include Russia, China, India, Taiwan, Israel, France, Brazil and Iran (Adams, 2001). China, for instance, has committed itself to improving information warfare capabilities (Rhem, 2005). Therefore, special attention needs to be paid to security concerns when considering outsourcing IT functions to foreign-country organisations, for example (Pruitt, 2004). E-Business & Online Security: A Technical Concern Or A Strategic Priority
  • 11. Literature Review & Findings Internet-based, low cost cyber-threats target civilian information assets and threaten the economic stability of modern societies (Bush, 2003). Information warfare may become commonplace in four spheres: military, economic, social and personal (Cronin and Crawford, 1999) E-Business & Online Security: A Technical Concern Or A Strategic Priority
  • 12. Literature Review & Findings Criminal activity is rapidly expanding into an underground economy specialising in identity theft, phishing and spam (Verton, 2004) as technical barriers to gaining access to valuable resources fall (Kenneth, Knapp and Boulton, 2006). E-Business & Online Security: A Technical Concern Or A Strategic Priority
  • 13. Literature Review & Findings Cyber-technology is increasingly used in corporate espionage (Hansell, 2004). The rise of trusted malware exemplifies the harnessing of the very tools, designed by security firms for enhancing protection, for gaining unfettered access to valuable information and serve to infiltrate networks. 53,834 pieces of signed malware were detected in the first 5 months of 2011, a 300% increase on the previous year (AVG, 2011). E-Business & Online Security: A Technical Concern Or A Strategic Priority
  • 14. Literature Review & Findings Recently, stolen digital certificates made headlines with the Stuxnet 'worm' and the RSA hack of Lockheed Martin network breach (AVG, 2011). Spyware and adware can take the form of legitimate applications with illegal intentions (Stafford and Urbaczewski, 2004). E-Business & Online Security: A Technical Concern Or A Strategic Priority
  • 15. Around 7,000 spyware programs reportedly existed five years ago and are responsible for 50% of all PC crashes (Sipior, Ward and Roselli, 2005). 91 percent of home computers host spyware code (Richmond, 2004). Identity theft is another type of 'cyber-terrorism against individuals' (Sterling, 2004). Literature Review & Findings E-Business & Online Security: A Technical Concern Or A Strategic Priority
  • 16. Literature Review & Findings As a result of the growing risk, demand for certifiably skilled cyber-security specialists is growing as organisations move to protect an increasingly valuable asset, information. In conjunction with senior management, qualified personnel facilitate programmes in security education, risk assessment and cultural change towards a better understanding of data security (Dutta and McCrohan, 2002). E-Business & Online Security: A Technical Concern Or A Strategic Priority
  • 17. Literature Review & Findings Lately, cyber-criminals are turning their attention to Mac users as the Mac OS platform expands its market share (AVG, 2011). Cyber-crime has ventured into the mobile platforms as they increase their online presence with even greater promises of personal data to compromise. The rise of rogue smart-phone apps such as those relating to Google's Android Market and others is another worrying trend in the battle for online security (PC World, 2011). E-Business & Online Security: A Technical Concern Or A Strategic Priority
  • 18. Literature Review & Findings Most of the victims of cyber-attacks choose not to inform the outside world about such breaches. In 2005, only 20% of intrusions were reported to law enforcement agencies in the US, primarily because of concerns with negative publicity (Gordon et al ., 2005). Despite the escalation in the veracity of information technology threats, business managers often lack an adequate understanding of the risks, or are reluctant to take decisive action for providing appropriate levels of information security (Austin and Darby, 2003). E-Business & Online Security: A Technical Concern Or A Strategic Priority
  • 19. Literature Review & Findings Top management support was ranked as the most critical information security issue facing organisations by 874 Certified Information System Security Professionals (CISSPs) (Kenneth, Knapp and Boulton, 2006). As a result of the recent wave of cyber-attacks and flowing from the perceived effects of potential liability, including leaks of corporate communications, negotiation contracts and other sensitive information influencing a firm's competitive-advantage in its industry and markets, demand for cyber-insurance is growing fast (Kolodzinski, 2002; Keating, 2003). E-Business & Online Security: A Technical Concern Or A Strategic Priority
  • 20. Specific Topic Related Examples McAfee, through its five-year long “ Operation Shady RAT ”, identified 72 government and corporate parties that have been silently compromised, in some instances over years without being detected (Alperovitch, 2011). The list includes: International Olympic Committee (IOC), The United Nations, ASEAN, South Korean steel and construction companies, A US real estate firm, Four US defense contractors, US federal, state and county government agencies, and, ironically, A computer network security company E-Business & Online Security: A Technical Concern Or A Strategic Priority
  • 21. Discussion &Recommendations Given current and projected growth of information technology, its use in e-commerce and the magnitude, spread and affordability of launching cyber-threats in their many forms, contemporary levels of complacency afforded by business organisations, individuals and governments are largely and alarmingly inadequate . E-Business & Online Security: A Technical Concern Or A Strategic Priority
  • 22. Discussion &Recommendations As the stakes go higher for all concerned with maintaining a relatively safe and secure online environment, the lack of concerted action by those implicated is likely to prove detrimental to future prospects of growth for e-business should current attitudes to the seriousness of the matter continue to go under-checked. E-Business & Online Security: A Technical Concern Or A Strategic Priority
  • 23. Discussion &Recommendations Therefore, it is strongly recommended for all stakeholders to adopt appropriate cyber-strategies for effective information security management. A multi-layered approach to protecting online communications and data from prying eyes is needed in order to boost confidence in online services. Under the proposed scheme, governments, business organisations and individuals alike will need to collaborate in creating and maintaining an array of defense barriers in order to minimise chances for over-exposure to the rapidly sophisticated intrusions of the online world. E-Business & Online Security: A Technical Concern Or A Strategic Priority
  • 24. Discussion &Recommendations For an effective strategy against the invisible threat, elements of technology, law and societal awareness are advised to be incorporated in management's strategy. Bush (2003), for instance, divided the complex cyber-challenge into five levels as part of the National Strategy to Secure Cyberspace. These levels are: home users and small businesses, large enterprises, critical infrastructure sectors, national vulnerabilities, and the global information grid of networked systems. E-Business & Online Security: A Technical Concern Or A Strategic Priority
  • 25. Discussion &Recommendations Issues of regulation of the Internet on an international basis might need to be further clarified and the responsibilities of those bodies charged with looking into the global dimension of the threat reassessed in light of recent developments. Corporations are recommended to collaborate with governments in designing appropriate mechanisms for dealing with the problem and reaching binding agreements with regard to their rights and obligations in the process. Individuals carry the ultimate responsibility for using the expanding medium while raising awareness of the dangers of venturing unprepared into the 'World Wild Web '. E-Business & Online Security: A Technical Concern Or A Strategic Priority
  • 26. Discussion &Recommendations As superior cyber-attack technologies trickle down from state-sponsored labs to the increasingly sophisticated, financially-motivated cyber-criminals of late, businesses of all sizes are faced with the challenging task of managing the risks involved. As the cost of acquiring and effectively deploying the right tools for combating intrusive online behaviour rises, smaller enterprise is likely to attract greater attention by those on the wrong side of the law due to heightened levels of vulnerability. Therefore, it is of significance to help SMEs become better acquainted with their increasingly important role in securing B2B and B2C networks and data streams in an effort to foster a safer online environments. E-Business & Online Security: A Technical Concern Or A Strategic Priority
  • 27. Discussion &Recommendations The rising trends of cloud computing and social networking, although promising in terms of attracting a larger audience and enhancing the efficiency of communications, are likely to increase the risks associated with cyber-attacks as the pool of stored data is significantly increased. Therefore, top management is advised to reconsider the risk/benefit scenarios of their online endeavours and adjust plans accordingly as restoring lost consumer trust, as a result of inaction, could prove a much more challenging task than securing corporate and consumers' communications. Think Vodafone Ausralia post-VodaFail campaign! E-Business & Online Security: A Technical Concern Or A Strategic Priority
  • 28. Discussion &Recommendations Finally, a proactive approach to guarding sensitive information resources such as data encryption, backup and access authentication procedures are among the practices to enlist in the virtual war unfolding. E-marketers, in particular, due to their front-line positions need to enhance their security strategies especially those connected with website security design and secured cart and payment solutions in addition to compliance to stringent interface certification practices. E-Business & Online Security: A Technical Concern Or A Strategic Priority
  • 29. Online security video (Citi Bank) http://www.youtube.com/watch?v=3S4qmfKNxv8 E-Business & Online Security: A Technical Concern Or A Strategic Priority
  • 30. Futuristic Scenario Its 22 nd of August, 2015. Armageddon has arrived in its electronic form facilitated by lax online security, the irrational exuberance of e-business growth of late, the proliferation of cyber-warfare tools in the hands of financially- motivated criminals in many advanced and emerging nations. Firms with compromised information infrastructure are faced with a barrage of attacks on a daily basis for which there appears to be no quick remedy. Skyrocketing demand for cyber-insurance has rendered the costs of moderately- effective detection and elimination code unaffordable to most SMEs. E-Business & Online Security: A Technical Concern Or A Strategic Priority
  • 31. Futuristic Scenario Consumers’ electronic confidence is plummeting faster than anyone thought possible. Online shoppers are turning away from the increasingly unsecure environment in favour of the traditional way of buying goods and services. Social networking and Cloud computing have been identified by some online security firms as the biggest sources of information leaks used in identity theft incidents. Corporate information databases have been regularly compromised with unspecified sums paid out as a result of victims’ legal actions… Discuss! E-Business & Online Security: A Technical Concern Or A Strategic Priority
  • 32. Thank You! Questions?? E-Business & Online Security: A Technical Concern Or A Strategic Priority