Internet and E-Business Security

Author(s):  
Violeta Tomaševic ◽  
Goran Pantelic ◽  
Slobodan Bojanic

Originally developed for research and education purposes as Arpanet in 1970s, the Internet has become a worldwide network that offers numerous services to the immense community of users. An everyday progress of the network technology brings also new security risks regarding a lot of sensitive data transferred over the network, especially in banking, commercial, and medical applications. Therefore the Internet security could be in general defined as a set of measures that should prevent vulnerabilities and misuse of data transmitted and used through the network.

Author(s):  
Keng Siau ◽  
Kent Whitacre

The Internet is one of the miracles happening in this century. Starting from a project known to a few hundred people, the Internet is now a global network and the hottest hype in the world. Its growth, however, has been slowed by the concern over Internet security. Internet security has been blamed as the stumbling block preventing the widespread acceptance of electronic business. Is Internet security really a problem? If so, what are the technologies available to alleviate this problem? How should management evaluate the existing technologies? This chapter looks at the issues surrounding e-business security. The chapter first discusses Internet security and then proposes a framework to help management evaluate existing security technologies.


2020 ◽  
Vol 23 (1) ◽  
pp. e9484
Author(s):  
Yigliana Alvarez Mendoza ◽  
Tania J. Londoño Gomez ◽  
Miguel Angel Leguizamón Páez

The technological advance of the new era has led to the interconnection of devices, applications, people and data, giving way to the generation of the Internet of Things (IoT). The multiple data collected is so voluminous and variable that it must be stored in Big Data architectures. This evolution has provided the opportunity to have better access, quality and analysis of information, but at the same time, there is a challenge to prevent and mitigate the security risks associated with the relationship between IoT and Big Data, endangering the information collected and the user’ sensitive data, among others. The purpose of this document is to carry out a literature review to collect the security risks found between the relationship of Big Data and IoT, as well as evaluate the current solutions implemented and conclude if they cover the needs for prevention and mitigation of the risk.


Author(s):  
Tena Velki ◽  
Ksenija Romstein

In the last decade, the Internet has become a crucial part of human life. Everyday usage of the Internet has enabled rapid development of social engineering. The weakest link in this chain are naive users with their risky online behavior who are unaware of Internet security risks. As knowledge, awareness and behavior depend on human characteristics, such as maturity, age and education, the main goal of this study was to investigate trendlines of user risky behavior and security awareness through the lifespan. Results have shown the growth of online risky behavior through the lifespan and the growth of knowledge and security awareness in middle adulthood. In general, we can conclude that people who are more knowledgeable about and more aware of potential security risks are at the same time more prone to risky behavior when using information systems.


The data of medical applications over the internet contains sensitive data. There exist several methods that provide privacy for these data. Most of the privacy-preserving data mining methods make the assumption of the separation of quasi-identifiers (QID) from multiple sensitive attributes. But in reality, the attributes in a dataset possess both the features of QIDs and sensitive data. In this paper privacy model namely (vi…vj)-diversity is proposed. The proposed anonymization algorithm works for databases containing numerous sensitive QIDs. The real dataset is used for performance evaluation. Our system reduced the information loss for even huge number of attributes and the values of sensitive QID’s are protected.


2021 ◽  
Vol 336 ◽  
pp. 08009
Author(s):  
Yili Lu

This article introduces the security risks of the commonly used MQTT protocol in the Internet of Things and the security risks caused by smart door lock vulnerabilities, aiming to solve the problem of public MQTT agent leaking smart lock data, causing attackers to use the sensitive data to physically locate and remotely control the connection to the smart door lock supplier Any lock issues in the cloud infrastructure. This paper presents a wireless sensor network authentication encryption method based on SM9 algorithm. By implementing and deploying sensor network authentication encryption in practical applications, it avoids the leakage of sensitive information from public data exposed on the Internet.


Author(s):  
Ronald Deibert ◽  
Rafal Rohozinski

The internet is commonly defined as “a worldwide network of computer networks that use the TCP/IP network protocols to facilitate data transmission and exchange.” A related term is “cyberspace,” which has a broader connotation suggestive of the virtual worlds that emerge from the internet, including chat rooms, three-dimension game environments, and online forums. A primary feature of internet governance is self-regulation. From content to protocols to addressing schemes, numerous networked forms of self-regulation have helped govern the internet. One of the issues of significance to internet governance has to do with the governance processes associated with the Internet Corporation for Assigned Names and Numbers (ICANN) and the politics associated with the World Summit of the Information Society (WSIS). Other questions arising from internet governance include those relating to cybercrime, internet security, surveillance and privacy, and the idea of network neutrality. One problem that needs to be addressed with regard to internet governance is that there is no single regime for internet governance inasmuch as there are several multiple and overlapping governance domains—what W. H. Dutton calls the “mosaic” of internet governance. Future research should focus on whether to consolidate around a single regime with a single global governing body, as well as how to control the “arms race” on the internet.


2006 ◽  
Vol 88 (6) ◽  
pp. 550-553 ◽  
Author(s):  
Damian J Mole ◽  
Colin Fox ◽  
Giulio Napolitano

INTRODUCTION The objective of this work was to evaluate the safeguards implemented by surgical trainees to protect the confidentiality of electronic patient data through a structured questionnaire sent to Northern Ireland surgical trainees. PARTICIPANTS AND METHODS A group of 32 basic and higher surgical trainees attending a meeting of the Northern Ireland Association of Surgeons-in-Training were invited to complete a questionnaire regarding their computer use, UK Data Protection Act, 1988 registration and electronic data confidentiality practices. RESULTS Of these 32 trainees, 29 returned completed questionnaires of whom 26 trainees regularly stored sensitive patient data for audit or research purposes on a computer. Only one person was registered under the Data Protection Act, 1988. Of the computers used to store and analyse sensitive data, only 3 of 14 desktops, 8 of 19 laptops and 3 of 14 hand-held computers forced a password logon. Of the 29 trainees, 16 used the same password for all machines, and 25 of 27 passwords were less than 8 characters long. Two respondents declined to reveal details of their secure passwords. Half of all trainees had never adjusted their internet security settings, despite all 14 desktops, 16 of 19 laptops and 5 of 14 hand-helds being routinely connected to the internet. Of the 29 trainees, 28 never encrypted their sensitive data files. Ten trainees had sent unencrypted sensitive patient data over the internet, using a non-secure server. CONCLUSIONS Electronic data confidentiality practices amongst Northern Ireland surgical trainees are unsafe. Simple practical measures to safeguard confidentiality are recommended.


2014 ◽  
Vol 484-485 ◽  
pp. 833-836
Author(s):  
Meng Hua Song

With the acceleration of process of modernization as well as continuous development of computer network technology, the Internet application field and category are expanded. As the Internet has the characteristics of richness, high update speed and innovation, it makes people's daily life more convenient, enriches people's material and cultural life and creates a free and open social environment. However, the network is a double-edged sword that brings people both convenience and many security problems, so it is an important issue to improve network environment. This paper combines the author's work experience to analyze the security problems existing in the computer network at present, and explores specific emergency response technology to solve these problems so as to provide fellows or everybody some theoretical suggestions and basis.


2017 ◽  
Vol 3 (2) ◽  
pp. 76
Author(s):  
Octarina Nur Samijayani ◽  
Ibnu Fauzi

<p><em>Abstrak</em> - <strong>Keamanan rumah menjadi hal yang sangat penting ketika pemilik rumah meninggalkan rumah dalam keadaan kosong. Selain pencurian, kebakaran juga merupakan masalah yang sering kali terjadi ketika rumah ditinggal pemiliknya. Sebagai alternatif solusi untuk menjaga dan mengawasi rumah yang diajukan pada penelitian ini ialah menggunakan teknologi Jaringan Sensor Nirkabel yang terintegrasi dengan jaringan internet, sehingga pemilik rumah tetap dapat mengawasi keadaan rumah dari jarak jauh. Pada penelitian ini dirancang prototype sistem rumah pintar atau Smart Home yang memanfaatkan teknologi Jaringan Sensor Nirkabel menggunakan standard Zigbee. Beberapa node sensor ditempatkan pada peralatan rumah, dimana setiap node dapat saling berkomunikasi secara wireless dan terpusat di node kordinator. Selanjutnya node kordinatior akan terhubung ke jaringan internet sehingga pemilik rumah dapat membuka aplikasi smart home kapan saja dan dimana saja. Rancangan sistem <em>Smart Home</em> disimulasikan menggunakan rumah model untuk menguji kinerja perangkat <em>Smart Home</em>. Pengujian kinerja Smart Home dimulai dengan pengujian keakurasian masing masing data sensor hingga waktu respon komunikasi dari sensor ke pusat monitoring. Tingkat error pembacaan suhu disetiap ruangan ialah 1 - 4.27%. Sensor PIR berhasil mendeteksi keberadaan orang di suatu ruangan dengan waktu delay </strong><strong>adalah 2.8 detik dengan jarak maksimal 5 meter</strong><strong>. Fungsi kendali dan monitoring (<em>on/off</em>) perangkat elektronik bekerja dengan baik, dengan waktu respon kurang dari 1 detik. Dari hasil pengujian komunikasi nirkabel antar node, diperoleh bahwa jarak maksimal antar node ialah sekitar 20 m, dengan rata-rata waktu respon pengiriman data ialah 1-2 detik. Adapun waktu respon mengalami delay mencapai 2 detik apabila beberapa perintah kendali dilakukan pada waktu yang bersamaan.</strong></p><p> </p><p><strong><em>Kata Kunci - </em></strong><em>Smart Home</em>, Jaringan Sensor Nirkabel, Zigbee.</p><p> </p><p><em>Abstrak</em><strong> - Home security becomes very important when homeowners leave the house empty. In addition to theft, fire is also a problem that often occurs when the house left the owner. As an alternative solution to maintain and supervise the homes submitted in this study is to use Wireless Sensor Network technology integrated with the Internet network, so that homeowners can still monitor the state of the house remotely. In this study designed prototype smart home system or Smart Home which utilizes Wireless Sensor Network technology using Zigbee standard. Some sensor nodes are placed in the home equipment, where each node can communicate wirelessly and centrally at the coordinator node. Next node coordinate will be connected to the internet network so that homeowners can open smart home application anytime and anywhere. The Smart Home system design is simulated using a home model to test the performance of Smart Home devices. Smart Home performance testing begins with testing the accuracy of each sensor data until the communication response time from the sensor to the monitoring center. The error rate of temperature readings in each room is 1 - 4.27%. PIR sensor successfully detects the presence of people in a room with a delay time is 2.8 seconds with a maximum distance of 5 meters. The control and monitoring functions (on / off) of electronic devices work well, with a response time of less than 1 second. From the results of testing wireless communication between nodes, obtained that the maximum distance between nodes is about 20 m, with the average response time of data transmission is 1-2 seconds. The response time has a delay of 2 seconds if some control commands are done at the same time.</strong><strong></strong></p><p><strong> </strong></p><p><strong><em>Keywords - </em></strong> <em>Smart Home</em>, Jaringan Sensor Nirkabel, Zigbee.</p>


Sign in / Sign up

Export Citation Format

Share Document