18.04.2013 Views

B2B Integration : A Practical Guide to Collaborative E-commerce

B2B Integration : A Practical Guide to Collaborative E-commerce

B2B Integration : A Practical Guide to Collaborative E-commerce

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

290 <strong>B2B</strong> <strong>Integration</strong> — A <strong>Practical</strong> <strong>Guide</strong> <strong>to</strong> <strong>Collaborative</strong> E-<strong>commerce</strong><br />

10.2.4. Human fac<strong>to</strong>r involved<br />

Applications supporting <strong>B2B</strong>i are accessible <strong>to</strong> many people, from the<br />

cus<strong>to</strong>mer service representatives at the call center <strong>to</strong> sales executives<br />

equipped with wireless lap<strong>to</strong>ps and, hence, chances of someone<br />

accidentally or intentionally creating a security breach are higher.<br />

10.3. Employees and Other Insiders Pose the<br />

Biggest Threat<br />

Companies do not have <strong>to</strong> look <strong>to</strong>o far <strong>to</strong> identify the biggest threat <strong>to</strong><br />

their e-security. It is right within their organization, in front of their<br />

% of respondents experiencing<br />

these breaches in the past 12 months<br />

0% 10% 20% 30% 40% 50% 60% 70% 80%<br />

Installation/use of unauthorised S/W<br />

Infection of company equipment via viruses/<br />

malicious code/executables<br />

(deliberate or accidental)<br />

•••••••••^••••••i 63%<br />

Use of company computing resources for<br />

illegal or illicit communi cation or activities<br />

(Porn surfing, e-mail harassment)<br />

•lllliMllfMtiPI¥TffWIP"«'«"'' 58%<br />

Abuse of computer access control<br />

l^^MM^BMMMMIilMllMiiM— 54%<br />

Installation/use of unauthorized<br />

hardware peripherals<br />

Use of company computing resources for<br />

personal profit (gamblling, spam, managing<br />

personal e-<strong>commerce</strong> site, online investing)<br />

3aHHRHWttK 42%<br />

Physical theft, sabotage or Intentional<br />

destruction of computing equipment Unsure<br />

24% 35%<br />

Electronic theft, sabotage or intentional<br />

destruction/disclosure of proprietary<br />

data or information<br />

13%<br />

Fraud<br />

Were these breaches<br />

deliberate or accidental?<br />

70%<br />

Deliberate<br />

17%<br />

Accidental<br />

48%<br />

Source: Information Security, September 2000 Issue, Survey 2000<br />

Figure 10.1. — Insider breaches<br />

76%

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!