Checklist for Evaluating E-Commerce Security

August, 2002


Numerous successful website violations demonstrate e-commerce’s vulnerability to security threats. A successful security program necessitates a continuing cycle of evaluating, improving, and rebuilding defenses. This article provides a checklist to assist in developing a cost-effective policy that takes into account all factors required for success. (3 pp.)