IT Governance, Risk, and Compliance

May 15 2009   6:48PM GMT

Electronic Commerce – Part I

Robert Davis Robert Davis Profile: Robert Davis

With an ever-increasing number of organizations and individuals relying on the Internet to exchange confidential and sensitive information, adequate message security continues to be a technological management concern. Serviceable standard electronic commerce (E-commerce) models include Business-to-Business (B2B), Business-to-Consumer (B2C), Business-to-Employee (B2E), and Business-to-Government (B2G) architectures. In order to programmatically manage E-commerce related IT security risks, management must designate an information assets protection perimeter. Axiomatically, the primary purpose of establishing a security perimeter is to provide a defined ambit for entity-centric policies and safeguards. However, with the advent of E-commerce, erecting layered protective barriers that preserve IT configurations can introduce a tactical security quagmire.

 Comment on this Post

There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when other members comment.

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

Share this item with your network: