Abstract
“The wise hear in silence, the wise see in the invisible”, which illustrates the importance of e-commerce enterprises to prevent information security risks. This chapter presents the information security risk management process, participants, and their responsibilities, and explains what is information security risk assessment. This paper introduces the form of information security risk assessment, the process of information security risk assessment, as well as the process and method of information security risk disposal, and analyzes the information security risk control measures, mainly including technical measures and normative measures. Among them, technical measures include cryptography, key management technology, network encryption and information protection technology, emerging encryption technology, digital signature technology, authentication technology, digital certificates, and public key infrastructure, while normative measures include information security management measures, information security management organizations, information security standards, information security laws and regulations, etc.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Wang C (2016) Information security management and engineering. Tsinghua University Press, Beijing
Zhang J (ed) (2016) Information security risk management. Universitv of Electronic Science and Technology of China Press, Chengdu
Liu J (2020) Introduction to cyberspace security. Tsinghua University Press, Beijing
Wang L (2015) Security technology of electronic commerce. Electronic Publishing House of Electronics Industry, Beijing
Whitman ME, Mattord HJ (2004) Management of information security. Thomson Learning, New York. Chinese edition: Whitman ME, Mattord HJ (2005) Management of information security (trans: Xiang H, Fu L). Chongqing University Press, Chongqing
Yan Q, Hu T, Lu Y (2007) E-commerce security management. China Machine Press, Beijing
Tang S (ed) (2013) E-commerce security. Tsinghua University Press, Beijing
Chen X, Yang L, Luo Y (2017) Big data security protection technology. Adv Eng Sci 5:1–12.https://doi.org/10.15961/j.jsuese.201700726
Chen Z (ed) (2017) Information security standards and laws and regulations, 3rd edn. Wuhan University Press, Wuhan
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Zhang, R., Fang, L., He, X., Wei, C. (2023). Controlling Information Risk in E-commerce. In: The Whole Process of E-commerce Security Management System . Advanced Studies in E-Commerce. Springer, Singapore. https://doi.org/10.1007/978-981-19-9458-6_4
Download citation
DOI: https://doi.org/10.1007/978-981-19-9458-6_4
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-9457-9
Online ISBN: 978-981-19-9458-6
eBook Packages: Business and ManagementBusiness and Management (R0)