Web Sites Information Security Management Based on B/S Pattern

Article Preview

Abstract:

This paper summarizes the development of electronic records management, and due to current defects and shortcomings, discusses the more effective and reasonable information security management program. For the system security issues, the paper has done an overall security analysis of system from the application layer, network layer, and database layer to physical and management levels, and has made a system’s security strategy.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

3141-3144

Citation:

Online since:

December 2012

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Basu, A., & Muylle, S. (2003). Authentication in E-Commerce. Communications of the ACM, 46(12), p.159

Google Scholar

[2] Burmester, M., & Desmedt, Y.G. (2004). Is Hierarchical Public-Key Certification the Next Target for Hackers? Communications of the ACM, 47(8), p.69

DOI: 10.1145/1012037.1012038

Google Scholar

[3] Cam-Winget, N., Housley, R., Wagner, D., & Walker, J. (2003). Security Flaws in 802.11 Data Link Protocols. Communications of the ACM, 46(5), p.35

DOI: 10.1145/769800.769823

Google Scholar

[4] Cavusoglu, H., Mishra, B., & Raghunathan, S. (2004). A Model for Evaluating IT Security Investments. Communications of the ACM, 47(7), p.87

DOI: 10.1145/1005817.1005828

Google Scholar

[5] Di Pietro, R., & Mancini, L.V. (2003). Security and Privacy Issues of Handheld and Wearable Wireless Devices. Communications of the ACM, 46(9), p.75

DOI: 10.1145/903893.903897

Google Scholar

[6] Earp, J.B., & Baumer, D. (2003). Innovative Web Use to Learn about Consumer Behavior and Online Privacy. Communications of the ACM, 46(4), p.81

DOI: 10.1145/641205.641209

Google Scholar

[7] Frolick, Mark N. (2003). A New Webmaster's Guide to Firewalls and Security. Information Systems Management, 20(1), p.29

Google Scholar

[8] Gordon, L.A., Loeb, M.P., & Sohail, T. (2003). A Framework for Using Insurance for Cyber-Risk Management. Communications of the ACM, 46(3), p.81

DOI: 10.1145/636772.636774

Google Scholar