Cyber Security in Parallel and Distributed Computing
by Dac-Nhuong Le, Raghvendra Kumar, Brojo Kishore Mishra, Jyotir Moy Chatterjee, Manju Khari
Chapter 3Security Threats and Vulnerabilities in E-business
Satya Narayan Tripathy, Sisira Kumar Kapat, Susanta Kumar Das
Department of Computer Science, Berhampur University, Odisha, India
Email: snt.cs@buodisha.edu.in, skk.rs.cs@buodisha.edu.in, skd.cs@buodisha.edu.in
Abstract
The explosive growth of business, science and other areas has lead to abundant data. We are drowning in data, but starving for knowledge, which has brought about the concept known as data mining. Data mining is extraction of implicit, potentially useful and unknown knowledge from huge amount of data. Data mining techniques can be very effectively used used for security applications. The permission to access data may cause a threat to the privacy and security of user’s information. This chapter deeply focuses on the security aspects of data mining and possible solution techniques. Moreover, we also highlight some privacy issues due to data mining, like intrusion detection.
Keywords: Security threat, e-business, malware analysis, vulnerability, e-business attacks
3.1 Introduction to e-Business
As the engineering for information and communication technology (ICT) develops, the requirement of more sophisticated business environment is needed. The revolution in traditional business methods has resulted in e-business. Traditional business is concerned with buying and selling of goods by direct mode only, but later on, the labor and effort involved in the customer going to the shop was increasingly no longer ...