a ‘Business that performs its supply chain ac-
tivities by means of Internet-based Information
Technologies through integration, cooperation
and interaction of its and others supply chain par-
ticipants’ webs, and by doing that actually cre-
ates a Portals Value Network (PVN).’
(It should be emphasised that the research de-
scribed below distinguishes between the terms ‘e-
business’ and ‘e-commerce’. Since we have al-
ready defined the term ‘e-business’, the distinction
should be clear: the term ‘e-commerce’ refers only
to the activities of buying /selling products. Hence e-
commerce is just a part of e-business. The subject of
concern here is ‘e-business’).
Based on our definition, from a business point
of view, e-business is the integration of processes,
systems and enterprises, while from a technological
point of view, e-business is the collection and inte-
gration of IT concepts and tools. E-business means
that the entire enterprise becomes an e-enabled or-
ganisation. The e-biz approach to performing busi-
ness transactions implies using information technolo-
gies (especially communication technology) through-
out the business supply chain. In fact the electronic
supply chain might be different for each organisation
that practices e-business — depending on the num-
ber and type of organisations that the company has
business relationships with. New threats and prob-
lems arise while using Internet technology in gen-
eral, and especially when a company adopts the e-
biz mode. E-biz involves performing business inter-
actions (in other words, transmitting documents, i.e.
data flow) between organisation portals by means of
Internet technology.
Academic research, while interacting with the busi-
ness world, contributes to mutual efforts to solve field
problems. In the case of e-biz, both business and
academia are challenged to provide solutions, since
e-biz is relatively new, and also very beneficial for
various aspects of modern life. As an integration of
business and technology, e-biz faces significant diffi-
culties and problems. This paper describes ongoing
research related to probably the most significant of
these problems, namely security.
2 THE MAIN PROBLEM OF
E-BIZ ORGANISATIONS
The uniqueness, and the danger, in e-biz is its ‘open-
ness’ to the environment, and the various connections
and communication channels with the external world.
As a result of that ‘openness’, an enterprise that prac-
tices e-biz is exposed to a wide range of threats, i.e.
factors that expose the enterprise to a danger of suffer-
ing from loss, both tangible (e.g. monetary loss) and
non-tangible (e.g. reputation).
An e-biz process is subject to all the benefits
and disadvantages that the technologies imply. The
vast majority of the technology-related disadvantages
are information security related — while perform-
ing a process by means of IT, threats such as sensi-
tive (business and private) information disclosure and
theft, industrial espionage, electronic fraud, business
failures due to technological (hardware, software or
communication) failures, viruses, spyware, adware,
phishing, DDoS, impersonation should be considered.
The harm to an enterprise may come from different
sources and by different means— the attacks could
include technology-based tools and methods as well
as social engineering methods.
As IT becomes more and more user-friendly, it also
becomes much more accessible by a wider popula-
tion. The potential sources of security threat sources
are becoming more technology-literate and sophisti-
cated. Although the threats are growing, countermea-
sures are being constantly improved, and new tech-
niques are being applied to secure corporate busi-
ness information; currently, security countermeasures
include hardware and software-based tools and also
powerful cryptographic mechanisms. So, there are in-
creases both in the technological sophistication of the
attackers and in protection methods and power.
However, attackers continue to look for alternative
methods of accessing corporate information. This has
given rise to different kind of threats, based on so-
cial engineering methods, that in the vast majority of
cases have nothing to do with information technology
abuse.
Corporate information systems security has been
dominated by ‘traditional’ security considerations for
many years. According to the traditional information
security model, security is achieved by providing a
security perimeter, designed to protect the company’s
boundaries from the external world (Kis, 2002). The
vast majority of existing business information sys-
tems have been, and are still being, designed and built
according to the perimeter security paradigm. The
goal is to prevent malicious/non-authorised users and
applications from accessing the company and its var-
ious business functions. A wide variety of tools and
mechanisms have been (and are still being) developed
to support corporate security based on this perimeter
security approach.
In this approach, information systems security is
provided on the basis of a trust hierarchy, by which
the internal users (i.e. the company’s employees) are
automatically assigned a maximal level of trust, while
everyone trying to enter the business from the exter-
nal world is assigned a minimal level of trust, if at
all. This approach has a number of shortcomings, in-
cluding the basic assumption that employees can be
trusted (according to CSI’s 2004 statistics, at least
SECRYPT 2006 - INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY
460