Question

John wants to create a security policy in order to protect his organisation's electronic commerce assets....

John wants to create a security policy in order to protect his organisation's electronic commerce assets. He needs to follow a five-step process when creating this policy. Briefly describe this process?

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Protect Electronic commerce Assets:

The process to protect the Electronic Commerce assets is necessary in commerce is to grow strong. The elctronic world will always have to deal with the virus destructive programs etc. Whose goals are to delay in the communications and information flow between the consumers and the producers. Thus the organisation concerned about protecting the electonic commerce assets should ave the protecting policies.

The security policy primarily address physical security, networking securiy, access authorization, virus protection and disaster recovery.

The security policy is a living written document which is reviewed and also updated at regularly.

In order to ensure the minimum level of acceptable security for the electronic operations , the security policy were to fulfil the basic requirements.

Secrecy

The secrecy refers to prevent the unauthorized person from reading the messages , business plans, to obtain the credit card numbers or also deriving the any other confidential informations.

Integrity

The integrity refers to ensure that the communication received has not been altered or tampered with for the type of enclose information in a digital envelope so that the computer can detect the messages automatically.

Key management

Key management provides the secure distribution and the management of keys which is needed to provide the secure communications.

Non-repudiation

The non-repudiation refers to ensure that none of the parties involved can be deny an operation at a later date. it provides end to end proof of each messages origin and recipient.

Authentication

Authentication were securely identifies the clients and the servers with digital signatures and the certifications etc.

Thus the organisation must protect assets from unauthorized disclosure and modification or destructions.

Add a comment
Know the answer?
Add Answer to:
John wants to create a security policy in order to protect his organisation's electronic commerce assets....
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • INSTRUCTION: Answer All questions 1. A science teacher wants to show his students the digestive system...

    INSTRUCTION: Answer All questions 1. A science teacher wants to show his students the digestive system of a goat, a Mathematics teacher wants to show his students how to construct an angle using a compass, and a Home Economics teacher wants to show her students how to bake a cake. Which teach method will you recommend should be used by all these teachers. Describe the teaching method and explain four (4) reasons for your answer. 2. A teacher who wants...

  • 1. Which step of the personal selling process did Sam engage in when, early in his...

    1. Which step of the personal selling process did Sam engage in when, early in his career, he made in-person cold calls with professors on various campuses? Sales presentation Preapproach Closing the sale Generating and qualifying leads Follow-up 2. Why is Sam most likely to have a long-term relationship with his customers? He lets professors initiate sales visits. He guarantees the cheapest prices. He earns customers’ trust and loyalty through one-on-one interactions. He closes sales as soon as possible. His...

  • The discussion: 150 -200 words. Auditing We know that computer security audits are important in business....

    The discussion: 150 -200 words. Auditing We know that computer security audits are important in business. However, let’s think about the types of audits that need to be performed and the frequency of these audits. Create a timeline that occurs during the fiscal year of audits that should occur and “who” should conduct the audits? Are they internal individuals, system administrators, internal accountants, external accountants, or others? Let me start you: (my timeline is wrong but you should use some...

  • WHEN 19-YEAR-OLD MICHAEL Dell began selling personal computers out of his college dorm room in 1984,...

    WHEN 19-YEAR-OLD MICHAEL Dell began selling personal computers out of his college dorm room in 1984, few would have bet on his chances for success. In those days, most computer makers sold their PCs through an extensive network of all-powerful distributors and resellers. Even as the fledgling Dell Computer Corporation began to grow, competitors and industry insiders scoffed at the concept of mail-order computer marketing. PC buyers, they contended, needed the kind of advice and hand-holding that only full-service channels...

  • Ravi is an experienced mechanic who has worked for many years at major automotive dealerships and...

    Ravi is an experienced mechanic who has worked for many years at major automotive dealerships and garages servicing a wide range of vehicles and has been certified by multiple automotive brands in the servicing of their respective vehicle ranges. He has now saved enough money to start a business of his own, which has been his dream for several years. Rather than start a business from the ground up, Ravi found a reputable garage that was put up for sale...

  • DISSONANCE BETWEEN EMPLOYEES Matt created his T-shirt business, T’d up, 30 years ago, building the company...

    DISSONANCE BETWEEN EMPLOYEES Matt created his T-shirt business, T’d up, 30 years ago, building the company up from a small, no-name brand that he ran out of his parents’ garage while he was in school into a well-known local company that supplies custom T-shirts and other clothing and accessories for a wide variety of customers, both local and national. T’d up’s big break came 20 years ago when a local band became famous and sourced all of their concert clothing...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

  • Background Spyglass is the 10th largest company in the security services industry.  Spyglass is a publicly traded...

    Background Spyglass is the 10th largest company in the security services industry.  Spyglass is a publicly traded company. The company's current annual revenues are $150 million.  Elvis McGraw became the company's Chief Executive Officer (CEO) eight years ago.  Mr. McGraw is a "hands-on" executive who was eventually given the additional title of Chairman of the Board. Branch operations are conducted in all states east of the Mississippi.   The company’s philosophy is primarily one of decentralization.  However, corporate accounting, accounts payable and payroll systems represent...

  • please I need this, step by step with formulas, avoid using excel. CASE 33 Security Software,...

    please I need this, step by step with formulas, avoid using excel. CASE 33 Security Software, Inc. communication in a highly secure and efficient process. The Market Security Software, Inc. (SSI) was a major provider of application software. The firm was proud to be the number two company in the enterprise firewall market. Firewalls ensure network Security for businesses by determining whether to approve or deny access to corporate networks and applications. They have security software that inspects com- munication...

  • 1) UMGC Industries capital-asset procurement policy requires the board of directors (BOD) approve any single acquisition...

    1) UMGC Industries capital-asset procurement policy requires the board of directors (BOD) approve any single acquisition over $500,000. If the BOD approves a project, then the treasurer will transfer the funds to the respective plant. Within one year, the internal auditing function is charged with reviewing each acquisition to check the propriety of the purchase and disbursal of funds. UMGC Industries plant controller prepared the first proposal for a DEK cutting machine. Other plants were told to wait until internal...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT