18.04.2013 Views

B2B Integration : A Practical Guide to Collaborative E-commerce

B2B Integration : A Practical Guide to Collaborative E-commerce

B2B Integration : A Practical Guide to Collaborative E-commerce

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Internet Security 289<br />

10.2. <strong>B2B</strong>i — Makes a Company Highly Vulnerable<br />

<strong>to</strong> Security Risks<br />

At the core of <strong>B2B</strong>i is communication — the real-time exchange of<br />

sensitive corporate data among trading partners. If the security within a<br />

company is not good enough, it not only risks exposure of its data but<br />

also that of its trading partners.<br />

Below are some key reasons that make <strong>B2B</strong>i considerably vulnerable<br />

<strong>to</strong> security risks:<br />

10.2.1. Complex nature of applications<br />

<strong>B2B</strong>i involves a variety of applications and software components. A<br />

typical system consists of cus<strong>to</strong>m-developed applications, off-the-shelf<br />

components and vendor- provided components, all integrated <strong>to</strong>gether.<br />

It is very difficult <strong>to</strong> evaluate each component's robustness from a<br />

security point of view and there may be potential weak points that go<br />

unnoticed.<br />

10.2.2. Anonymous relationships in<br />

<strong>B2B</strong> e-<strong>commerce</strong><br />

Anonymity, a key characteristic of <strong>B2B</strong> e-<strong>commerce</strong>, poses a high<br />

security threat <strong>to</strong> online transactions. Given the dynamic nature of<br />

relationships in <strong>B2B</strong> e-<strong>commerce</strong>, a company may deal with several<br />

kinds of trading partners, and some of them will not even be known<br />

beforehand. This greatly increases the risk of impos<strong>to</strong>rs, posing as<br />

trading partners, trying <strong>to</strong> sneak in<strong>to</strong> the company's corporate networks.<br />

10.2.3. Software undergoing frequent change<br />

Due <strong>to</strong> the large number of applications involved in a typical <strong>B2B</strong>i<br />

environment, the amount and frequency of adjustments that have <strong>to</strong> be<br />

made <strong>to</strong> the whole system is considerably high. This increases the risk<br />

of potential bugs introduced in<strong>to</strong> the system.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!