Identify and discuss the five steps in developing an e-commerce security plan.
The five steps in developing an e-commerce security plan are:
1. Perform a risk assessment:
First, an inventory of the information and knowledge assets of a company is taken, and a dollar value amount is placed on each asset. Then, this amount is multiplied by the estimated probability that the information could be compromised. This computation is used to produce a ranked list of the information assets of the firm prioritized by their value.
2. Develop a security policy:
A set of statements should be developed that prioritizes the information risks, identifies acceptable risk targets, and sets out the goals for achieving these targets. Included in the security policy should be a list of the personnel who are or will be entrusted with the information assets. It should also include a description of the security policies that presently exist for these assets and suggestions for improvements. Finally, it should outline the level of risk the firm is willing to accept for each asset, and the estimated cost to achieve this level of acceptable risk.
3. Develop an implementation plan:
The actions that must be taken to achieve the security plan goals must be set out. The tools, technologies, policies, and procedures needed to achieve acceptable levels of risk must be developed.
4. Create a security organization:
A security organization must be established that will train users and keep management apprised of the security threats and breakdowns. The access controls that will determine who can gain legitimate access to the firm’s networks and the authentication procedures that will be used to protect data from intruders must be determined. Authorization policies must also be established for the differing levels of access to information assets for different users.
5. Perform a security audit:
A security audit must be conducted to identify how outsiders are using the site and how insiders are accessing the site’s assets. A monthly report should be generated that will establish the routine and nonroutine accesses to the system and identify any unusual patterns.
Comments
Post a Comment