| 
                           
                              | 
                                       Jeffrey Ritter
                                          | Chapter 19 – | E-Commerce Safeguards |  Michael F. Money, CISSP, CISA
 
 Chapter Contents:
 
 
 
                                       
                                          |  | 19.1 |  | Introduction |  
                                          |  | 19.2 |  | The Legal Framework |  
                                          |  | 19.2.1 |  | State of Uniformity in Commercial Law |  
                                          |  | 19.2.1 |  | The United States |  
                                          |  | 19.2.2 |  |  |  
                                          |  | 19.2.3 |  |  |  
                                          |  | 19.2.4 |  |  |  
                                          |  | 19.2.1.1.1 |  | The Uniform Commercial Code |  
                                          |  | 19.2.1.2 |  | International Environment |  
                                          |  | 19.2.2 |  | Contract Infrastructure of E-commerce |  
                                          |  | 19.2.2.1 |  | Significance of Contracts |  
                                          |  | 19.2.2.2 |  | Common Safeguards |  
                                          |  | 19.2.2.3 |  | Legal Management of Risks |  
                                          |  | 19.3 |  | Technical Defenses |  
                                          |  | 19.3.1 |  | E-commerce Security Services: A Basic Methodology |  
                                          |  | 19.3.1.1 |  | Step 1: Define Information Security Concerns Specific to the Application |  
                                          |  | 19.3.1.2 |  | Step 2: Develop Security Service Options |  
                                          |  | 19.3.1.3 |  | Step 3: Select Security Service Options Based on Requirements |  
                                          |  | 19.3.2 |  | Using the Security Services Framework |  
                                          |  | 19.3.2.1 |  | Business-to-Customer Security Services |  
                                          |  | 19.3.2.2 |  | Business-to-Business Security Services |  
                                          |  | 19.4 |  | Conclusion |  
                                          |  | 19.5 |  | For Further Reading |  
 |  | 
                  
                     |  |