Retrieved from https://studentshare.org/miscellaneous/1562924-e-commerce-insider-threats
https://studentshare.org/miscellaneous/1562924-e-commerce-insider-threats.
In addition, a major element of the problem appears from poor systems engineering of networks and software. However, to effectively deal with these imprecision and ambiguities in the business information system there is need to minimize the system loop holes and problems regarding the effective management and operational handling. Furthermore, the management of the business information security and operations has turned out to be a main task in business. This paper presents a detailed analysis of the current state of insider threats to computer systems and infrastructure in terms of numbers, costs and potential problems.
The main intention of this research is offer a comprehensive overview of the different insider threats to computer systems for E-Commerce. Shaw, Ruby, & M. (1998) outlined that the ideal business information systems protection besides all outer and inner threats is not possible. The main difficulty of monitoring against the business information security threats has been an important aspect of the literature, and business information system development (Shaw, Ruby, & M., 1998). However, the main problem is the inherent complexity of the business systems.
Thus, here are problems in terms of some recognized techniques offering business impressions that are not practical solutions. In this case more and more challenges are coming out in form of virus and worms (Graham, 2005). Cho, Chang, Kim, & Choi (2003) stated that in this new age of information corporations are completely dependent upon the complex information systems. In addition, these systems are in a greater danger in terms of vulnerability of systems to computer information security and crime attacks.
Thus, the high-tech environment and technological experts are needed to develop, manage, and maintain these business information systems (Cho, Chang, Kim, & Choi, 2003). According to (Shaw,
...Download file to see next pages Read More