Abstract

In order to keep up with the trend and satisfy the Internet users, it is crucial for the online businesses to adapt to new technologies and offer the right services (shop, bank online, etc.) to their customers. To anticipate customer needs, the online businesses use customer behaviour analysis and process customer data. Even if companies handle customer information (e.g. PII is considered highly confidential and must be protected accordingly) to anticipate and meet customers’ expectations, the management often struggles finding the right approach in making informed decisions when talking about information security of such data. This can threaten the sustainability of the business and put its customers at major risks (e.g. identity theft), risks that decision makers of companies do not see, or do not understand, the results being they do not invest properly to secure the data they handle. This paper gives a parallel overview between: a) the management priorities of an online business that handles customer data and b) the implicit information technology and security threats that those priorities generate. Once we have a view around point a) and point b), the paper will also show potential ways of finding a right balance between business needs, regulatory requirements and security of customer data so that the business can take risks to achieve their goals in an informed manner, using a customised risk assessment methodology, based on COBIT5 framework, industry leading standards and potential internal customised processes.

Highlights

  • An online business (e-business) can be considered as any type of business activity that runs online, using the Internet.With the advent of the Internet, online businesses started to develop and grow

  • The results show that according to the 10 vulnerability scenarios defined by COBIT 5 mapping and the threats, the a) Big Data and Advanced Analysis goal has the biggest Risk and Impact, followed consecutively by b) Digital Engagement, c) Availability and d) Automation

  • Ugroup formed by experts in Information Security and the authors of this paper

Read more

Summary

Introduction

An online business (e-business) can be considered as any type of business activity that runs online, using the Internet. People become busier and busier, so they try to be smart when spending their time They use Internet to shop online, to bank online, to pay their debts, etc. Identify the latest top priorities of an online business and the associated information security threats and risks. 2. Map the priorities and threats identified using different methodologies in order to be able to prioritise the business goals from an information security point of view. Conducting a focus group formed by experts in information security field and authors of this article, the above business categories have been structured based on the number of transactions they handle every day, the amount of sensitive data they handle and average number of customers. Industry and Manufacturing Skills and Learning Free Business Listing Property and Accommodation

The most common threats of an online business
ISO 27005 Threats mapping
Map the ISO 27005 General threats with the four business priorities
Map the ISO 27005 Origin of threats with the four business priorities
Map the Legal and Compliance requirements with the four business priorities
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call