Saturday, 15 September 2012

eCommerce security - some notes

The following study notes are related to the topic of eCommerce Security:


Study notes
Note 1


Note 2


Related resource: on perimeter security: http://www.ehow.com/about_6862556_primary-purpose-perimeter-security.html
[Quote: " A perimeter is the boundary that separates your assets from the outside world. The purpose of perimeter security is to deter, detect, delay and deny unauthorized access to the assets within the perimeter by persons bent on theft, vandalism, diversion, sabotage and other criminal acts."]


Note 3:

Related links:


Note 4:

Note 5



Related resource:






Readings:
  1. Thomson, K.L., Solms, R.v. and Technikon, P.E. (2006) "Towards an Information Security Competence Model" Computer Fraud & Security, May, pp. 11-15
  2. Zuccato, A. (2007) "Holistic security management applied in electronic commerce" Computers & Security 26, pp. 256-265
  3. Axelrod, W. (2006) "Cybersecurity and the Critical Infrastructure: Look Beyong the Perimeter", Information Systems Control Journal Vol. 3, pp. 24-28

No comments:

Post a Comment