One of the most basic concepts of economics is want vs. need. Our want and need we can classify in three different dimensions: Necessity, Comfort and Luxury. For each one of them we need wealth in terms of money. The best way to get money is through business enterprises. Computers are widely used in business. Today because of the era of internet so called WWW; the need of technology in business enterprises increases. Now-a-days, most of the transactions are online.
Because of the internet other issues of E-security raises in modern days. We can heard this issues by different names of hacking, online frauds, transaction failed etc. Today the most important technology to protect a transaction is E-security. It is also called cyber security.
E-security is also limited to technology and software. It is enabled through software and it needs specialized software to limit information access. For software based and technological E-security we need a person called security professional. There are so many standard comes when we talk about E-security.
But what if the person who is having computerized business information is unethical or having no morality? then there is no use of E-security. There are so many examples we will discuss later of security frauds and violation by persons without ethics cum morality.
II. NEED OF ECONOMICAL DEVELOPMENT
It’s a question of fulfillment of wants. In terms of economy the biggest debating issue is: Need or demand to fulfill our wants. Scarcity is a situation in which there is not enough of a resource to meet everybody’s wants and needs. Today’s economy is in terms of money. Money is regarded as one of the three greatest inventions of mankind.
There is one article in BBC news tells us the reasons why do we need economic growth? With recession looming and unemployment rising, politicians and economists are trying to find ways of stimulating economic growth. But is growth a good thing? Does it have harmful consequences? Could we live without it? these kind of so many questions has been raised by this article.
Economic development is the sustained, concerted actions of policy makers and communities that promote the standard of living and economic health of a specific area. Economic development is a wealth spend on country’s population.
III. ECONOMICAL GROWTH BY BUSINESS ENTERPRISES
There are various types of macroeconomic and sociocultural indicators or “metrics” used by economists to assess the relative economic advancement of a given region or nation. Example.. GDP per capita – Growing development population, Income distribution, Literacy and education, Access to healthcare, Social security and pensions, Modern transportation.
Business enterprises are source of all these sources. Business enterprises includes: public limited company (UK and Ireland), Ltd. (UK and Ireland), limited partnership, Unlimited partnership, Chartered company, Statutory company, Holding company, Subsidiary company, One man company, NGO’s.
Through these sources any countries or group or individual can develop economy. According to the World Bank Business Report, Colombia is the third most “Business Friendly” country in Latin America and the top reformer in the region. The country also ranks fifth in the world and first in Latin America in terms of investor protection.
IV. NEED OF INFORMATION TECHNOLOGY BY BUSINESS ENTERPRISES
Information technology has become very pervasive and is therefore touched every aspect of business. The inherent characteristics of computer have made a tremendous impact on every aspect of work which it has been used. Much of business work productivity depends on the above characteristics.
Technological plus points include: processing speed, Online storage, availability 24 by 7. It replaces human labor. Email and Communication is only the issues with technology.
There are other important factors of Information technology for business enterprise discussed in article named ” The Role of Information Technology in Business “.
V. NEED OF E-SECURITY
Information is the crown jewels of business. Your business partners want to know if you have done enough to protect your information assets. “The Hindu” report says that India needs greater focus on information security.
The other report by PWD says that “In today’s global, digital world, data rule. Safeguarding intellectual property, financial information, and your company’s reputation is a crucial part of business strategy. Yet with the number of threats and the sophistication of attacks increasing, it’s a formidable challenge.”. There are so many factors or elements which raises the need of E-security: Vulnerability, Threat, Risk, Exposure, Countermeasure or Safeguard.
VI. LIMITATIONS AND FAILURE OF E-SECURITY
One great article says that important reasons for failure of E-security are Strong economic, social, and psychological. Today’s latest technology is being build towards less programming more human understandable code. For example Google sites, word press etc. We are also seeing that formal methods run by technology and people are not mixed well enough. Also most of today’s security software and technologies like IDS IPS are intrusion centric. There are two types of intruders: External and Internal.
One of the two most publicized threats to security is the intruder (the other is viruses), often referred to as a hacker or cracker. In an important early study of intrusion, By Anderson identified three classes of intruders: Masquerader, Misfeasor Clandestine. The masquerader is likely to be an outsider; the misfeasor generally is an insider; and the clandestine user can be either an outsider or an insider.
We found so many examples of intrusion like:
• Performing a remote root compromise of an e-mail server
• Defacing a Web server
• Guessing and cracking passwords
• Copying a database containing credit card numbers
• Viewing sensitive data, including payroll records and medical information, without authorization
• Running a packet sniffer on a workstation to capture usernames and passwords
• Using a permission error on an anonymous FTP server to distribute pirated software and music files
• Dialing into an unsecured modem and gaining internal network access
• Posing as an executive, calling the help desk, resetting the executive’s e-mail password, and learning the new password
• Using an unattended, logged-in workstation without permission
VII. NEED OF SECOND SIDE OF THE COIN: “ETHICS CUM MORALITY”
Traditionally, those who hack into computers do so for the thrill of it or for status. The hacking community is a strong meritocracy in which status is determined by level of competence. Thus, attackers often look for targets of opportunity and then share the information with others. A typical example is a break-in at a large financial institution reported in. The intruder took advantage of the fact that the corporate network was running unprotected services, some of which were not even needed. In this case, the key to the break-in was the pcAnywhere application. The manufacturer, Symantec, advertises this program as a remote control solution that enables secure connection to remote devices. But the attacker had an easy time gaining access to pcAnywhere; the administrator used the same three-letter username and password for the program. In this case, there was no intrusion detection system on the 700-node corporate network. The intruder was only discovered when a vice president walked into her office and saw the cursor moving files around on her Windows workstation.
Organized groups of hackers have become a widespread and common threat to Internet-based systems. These groups can be in the employ of a corporation or government but often are loosely affiliated gangs of hackers.
Insider attacks are among the most difficult to detect and prevent. Employees already have access and knowledge about the structure and content of corporate databases. Insider attacks can be motivated by revenge or simply a feeling of entitlement. An example of the former is the case of Kenneth Patterson, fired from his position as data communications manager for American Eagle Outfitters. Patterson disabled the company’s ability to process credit card purchases during five days of the holiday season of 2002. As for a sense of entitlement, there have always been many employees who felt entitled to take extra office supplies for home use, but this now extends to corporate data. An example is that of a vice president of sales for a stock analysis firm who quit to go to a competitor. Before she left, she copied the customer database to take with her. The offender reported feeling no animus toward her former employee; she simply wanted the data because it would be useful to her.
So from above examples regarding limitations of even E-security we conclude that there must be a strong background of ethics and morality is needed in back of employee. Every business enterprise must not only provide money but also provide some ethical values to their employees in parallel with technological skills. Today most of business enterprises are lacking are we can say almost null in giving or providing ethical values to their employees. There is one article raised this issue further.
From all our analysis and research at last we conclude some points. First we conclude that for economical development business enterprises are the best and fast way. It is also analyzed from our research that in today’s fast internet world we need a backup of technology and to secure it we need E-security. But only E-security & technology are not enough. We need a strong ethical background as well. Its further a question and subject of debate that at what level this ethics may go? Is it compulsory? we can’t see the greater failure if ethical background is still missing.
We have many more Virus Removal Help Articles Now Available.