Operability

Operability in Web commerce systems involves the software and hardware in a computing facility, the data media used in a facility, the operators using these resources, and the work products of the information systems. Because desktop and distributed computing resources also contain sensitive information, similar issues apply to those systems.

Operability involves controls, monitoring, auditing, incident management, problem management, maintenance, and patching in Web commerce platforms. Operations hardware and software security refer to the act of understanding the threats and vulnerabilities associated with computer operations and the implementation of security controls for critical activities. Some typical threats include internal intruders, external attackers, malicious and incompetent users, and other threats in the operating environment. Operations controls should address the protection of resources and privileged-entity accesses.

Protection of Resources and Privileged Entities

Resource protection is designed to help reduce the possibility of damage that can result from the unauthorized disclosure and/or alteration of data by limiting the opportunities for its misuse. Some typical operational hardware resources include routers, firewalls, storage media, file servers, Web servers, and printers. Operational software resources are operating systems, utilities, program libraries, data, databases, and applications.

Privileged entity access, which is also known as

Get Web Commerce Security Design and Development now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.