Electronic business systems certainly have better security risks than old-style business systems. Therefore it is essential for e-business systems to be completely protected against these risks. There are large numbers of people who have access to e-business over the internet than would have access to a traditional business. Employees, suppliers, customers and numerous other people use any specific electronic business system every day and expect their private information to stay secure. One of the great threats to the security of electronic business are the hackers. Security concerns in e-business includes the keeping of confidential and private information of customer and business, data integrity as well as the authenticity of data. Some of the methods in keeping secure information and protecting e-business security includes the physical measures, data transmission, data storage, firewalls, encryption and anti-virus software.
• Privacy and confidentiality – With any business, private information must stay secure and only be available to the internet recipient. Hence, this becomes harder when dealing with e-business. To keep such secured information means protecting any electronic files and records from unauthorized access, then guaranteeing safe transmission and data storage of information. Firewalls and encryption are tools in managing specific concerns with e-business.
• Authenticity – Electronic business transactions pose better challenges for creating authenticity because of the comfort with which electronic information may be copied and altered. Both parties in an e-business transaction want to guarantee that they can prove what they claim to be, especially when a customer gets an order and then make a payment electronically. One way of ensuring this is to limit the network access by using a virtual private network (VPN) technology. Maintaining the authenticity is even greater when a group of techniques are used.
• Data integrity – This would answer the question “are there any possibilities in changing or corrupting information?” this will guarantee and give assurance that the message received is similar to the message sent. Business needs to be more confident that the data remains unchanged in transit, whether intentionally or by accident. In helping with the data integrity, firewalls guard and protect data stored while simply backing up data allows recovery when the data are damaged.
• Access control – when electronic resources are limited to only few authorized persons, the customer and the business itself must guarantee that no one else can access the information system. Luckily, there is a selection of techniques to address this concern along with user identification, access privileges, firewalls and authentication techniques as well as digital certificates and passwords.
• Availability – This is pertinent to the customer’s information that must be available when customers need it. Information must be restored and retrieved as required as well as the messages must be delivered on time ensuring reliability. Steps or measures must be taken because availability of the service is important for all e-business websites. This is to prevent disruption of service by events such as physical damages and power outages.
• Non-repudiation – It deals with the existence of evidence in a transaction. The business company must give the assurance that the recipient or purchaser cannot deny that a transaction happened, which means that having sufficient evidence is a proof of transaction.