|
eBusiness User Requirements
As an integral part of the ebusiness environment, the
security solution must be constantly available. In addition, because the
solution handles each user’s access to the ebusiness environment, performance
must be carefully considered. Other key user requirements are assuring the
integrity of the transactions and assuring the privacy of the information. Both
of these requirements are essential to building trust in the electronic
relationship.
Availability:
Often, the availability requirements for ebusiness applications are greater than those for the human relationships
that they replace. It’s commonly acknowledged that e-commerce and other Customer-facing Web sites are available day
and night. Clearly, the same requirements apply to the e-business security infrastructure.
|
|
Performance:
Users have a low tolerance for unresponsive ebusiness systems. If users don’t find
the system responsive enough for their needs, they will rapidly lose faith in
it and look to use other methods or other business partners.
|
|
Integrity:
In order to place their trust in the system, users need to have confidence that
transactions will be secure. It is the job of the security infrastructure to
underpin user confidence by ensuring appropriate levels of authorization and
authentication.
|
|
Privacy:
Users must be confident that their privacy will be protected against unauthorized
access both from outside an organization and from unauthorized people within an
organization.
|
|
|
Back |
|
|
|