Information Security Management: A Case Study Case Study by Master Researcher

Information Security Management: A Case Study
A case study of the role of information security management in an e-commerce business.
# 38268 | 2,150 words | 8 sources | MLA | 2002 | US

$19.95 Buy and instantly download this paper now


This paper provides an analysis of the security process for E-Watch, Inc., an online retailer specializing in the sale of a variety of watches and related accessories. The paper discusses the importance of information security management in the development of e-commerce businesses and presents definitions for a number of terms that are common to Internet security management.

Definition of Terms
An Effective Business Model for Information Security Management

From the Paper:

"In a historical context, information management security was established to provide the protection necessary to conduct secure business over the Internet. However, it should be noted that the ability of outsiders to penetrate security systems has been an influential factor since the evolution of the Internet in the late 1980s (Hofmeyr 18). The number of computers connected to the Internet is steadily increasing on a daily basis, and patterns of connectivity are constantly changing. As a result, complex methods for securing communications must be developed.
"In general, an effective information security management system must concentrate on the host rather than the network. According to Hofmeyr (19), "The security community must embrace a fundamental change in the way security systems are designed and built. A new security paradigm is needed, one based on machine intelligence, not human expertise. Security systems need to be self-aware, adaptive, and autonomous. They also need to focus on prevention rather than just detection and source identification." The use of an anomaly detection system running on a host computer will be able to provide the watch e-retailer under discussion with heightened security that will be a step ahead of potential hackers in pursuit (21)."

Cite this Case Study:

APA Format

Information Security Management: A Case Study (2003, October 08) Retrieved March 26, 2023, from

MLA Format

"Information Security Management: A Case Study" 08 October 2003. Web. 26 March. 2023. <>