Proactive Security of E-business

Full Text (PDF, 160KB), PP.49-53

Views: 0 Downloads: 0

Author(s)

Wu Huanwei 1,*

1. Huaihai Institute of Technology, Lianyungang City, Jiangsu Province, China

* Corresponding author.

DOI: https://doi.org/10.5815/ijem.2012.04.06

Received: 16 May 2012 / Revised: 20 Jun. 2012 / Accepted: 19 Jul. 2012 / Published: 29 Aug. 2012

Index Terms

Proactive security, e-business, network security, passive defense

Abstract

After giving a brief statement to the theory of proactive security, based on the differences between passive defense and proactive security, the article describes the main idea about the proactive security theory of e-business network from aspects of network environment, security technology and service, network management. At the same time it analyses the barriers existing in the actual use of proactive security in e-business network.

Cite This Paper

Wu Huanwei,"Proactive Security of E-business", IJEM, vol.2, no.4, pp.49-53, 2012. DOI: 10.5815/ijem.2012.04.06

Reference

[1]Abdoul Karim Ganame, Julien Bourgeois, Renaud Bidou, Francois Spies. A global security architecture for intrusion detection on computer networks[J]. Computers & Security, vol. 27, pp. 30-47, March 2008.
[2]Gunilla Widen-Wulff, Reima Suomi. Utilization of InformationResources for Business Success : The Knowledge Sharing Model [J ] .Information Resources Management ,:pp.46 – 67, 2007, (20).
[3]Huo Guoqing. Enterprise inforrmation integrated management[J]. Journal of the China Society for Scientific and TechnicalInformation, pp.2-9, January 2001 (in Chinese).
[4]Liu Ping. Research on a Management Model of Enterprise InformationResources[J]. Journal of Wuhan University of Technology, pp.:93-95, May 2004 (in Chinese).