Skip to Main Content
Cyber Security in Parallel and Distributed Computing
book

Cyber Security in Parallel and Distributed Computing

by Dac-Nhuong Le, Raghvendra Kumar, Brojo Kishore Mishra, Jyotir Moy Chatterjee, Manju Khari
April 2019
Intermediate to advanced content levelIntermediate to advanced
294 pages
9h 31m
English
Wiley-Scrivener
Content preview from Cyber Security in Parallel and Distributed Computing

Chapter 3Security Threats and Vulnerabilities in E-business

Satya Narayan Tripathy, Sisira Kumar Kapat, Susanta Kumar Das

Department of Computer Science, Berhampur University, Odisha, India

Email: snt.cs@buodisha.edu.in, skk.rs.cs@buodisha.edu.in, skd.cs@buodisha.edu.in

Abstract

The explosive growth of business, science and other areas has lead to abundant data. We are drowning in data, but starving for knowledge, which has brought about the concept known as data mining. Data mining is extraction of implicit, potentially useful and unknown knowledge from huge amount of data. Data mining techniques can be very effectively used used for security applications. The permission to access data may cause a threat to the privacy and security of user’s information. This chapter deeply focuses on the security aspects of data mining and possible solution techniques. Moreover, we also highlight some privacy issues due to data mining, like intrusion detection.

Keywords: Security threat, e-business, malware analysis, vulnerability, e-business attacks

3.1 Introduction to e-Business

As the engineering for information and communication technology (ICT) develops, the requirement of more sophisticated business environment is needed. The revolution in traditional business methods has resulted in e-business. Traditional business is concerned with buying and selling of goods by direct mode only, but later on, the labor and effort involved in the customer going to the shop was increasingly no longer ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures

Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures

Peter Thermos, Ari Takanen

Publisher Resources

ISBN: 9781119488057Purchase book