Hacker risk in e-commerce systems with specific reference to the disclosure of confidential information

dc.contributor.authorLamprecht, C.
dc.date.accessioned2012-02-01T13:32:18Z
dc.date.available2012-02-01T13:32:18Z
dc.date.issued2004-12
dc.descriptionThe original publication is available at http://www.sajim.co.za/en_ZA
dc.description.abstractIn a Web-centric environment, transactions between various parties, such as the e-commerce company, its client and a bank, are done electronically. Merging the business processes of this extended enterprise with the supporting technological processes adds to the complexity of the Web-centric environment. One of the intrinsic building blocks and security requirements in such an environment is the confidentiality between parties who exchange value electronically across open, and sometimes insecure, channels via the Internet. Consumers need to feel secure and have assurance regarding the safety of private information that is captured and managed in the other party’s database, which has become the heart of a company in this information age (Fogie and Peikari 2002). Moscove, Simkin and Bagranoff (2003:195) emphasize the fact that such private and sensitive information normally held in a database, must be protected from those not authorized to have access to it. Databases and the information stored in them sometimes represent the most important asset and are irreplaceable. A credit bureau’s database files, for example, are its business. Databases are also critical components for corporate Web systems (Moscove, Simkin and Bagranoff 2003:195). Although companies seem to have security policies and procedures in place to control access to database information, unauthorized intrusion still occurs. The objective of this study was to identify the main hacker risks and to address them by identifying the components of control that should be in place to prevent such risks, as well as unauthorized access to confidential information. Microsoft’s SQL Server was employed as an example of a database system that is used to manage confidential information. Hacker-specific risks pertaining to the MS SQL Server were therefore identified.en_ZA
dc.description.versionPublishers' Versionen_ZA
dc.format.extent10 p.
dc.identifier.citationLamprecht, C. 2004. Hacker risk in e-commerce systems with specific reference to the disclosure of confidential information. South African Journal of Information Management, 6(4),:1:10.doi:10.4102/sajim.v6i4.356.en_ZA
dc.identifier.issn1560-683X (online)
dc.identifier.issn2078-1865 (print)
dc.identifier.otherdoi:10.4102/sajim.v6i4.356
dc.identifier.urihttp://hdl.handle.net/10019.1/19465
dc.language.isoen_ZAen_ZA
dc.publisherAOSIS OpenJournalsen_ZA
dc.rights.holderCopyright is retained by the author(s)en_ZA
dc.subjectElectronic commerce -- Security measuresen_ZA
dc.subjectComputer securityen_ZA
dc.subjectConfidential communicationsen_ZA
dc.subjectDisclosure of informationen_ZA
dc.titleHacker risk in e-commerce systems with specific reference to the disclosure of confidential informationen_ZA
dc.typeArticleen_ZA
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
lamprecht_hacker_2004.pdf
Size:
86.36 KB
Format:
Adobe Portable Document Format
Description:
Publishers' Version
License bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.95 KB
Format:
Item-specific license agreed upon to submission
Description: