Computer viruses and malicious software are some of the biggest threats to an e-commerce system. Viruses come from external sources and can corrupt files if introduced into the internal network. They can completely halt or destroy a computer system and disrupt the operations of any website especially E-Commerce. Malicious software such as Trojan horses pose an even greater threat as they can capture information about your clients before any encryption software can take effect. They can also impersonate a customer and pass bad or malicious code into the server running the website, this then becomes an internal problem.
“An e-commerce website is also vulnerable to fraud from both internal and external sources. Fraud activities include credit card fraud, which exposes the site to threat from customers and external sources, and internal fraud, such as fraudulent transactions being entered into the system from the back-end by rogue employees. Fraudulent transactions can also be introduced into the system by hackers or Trojan horses, with such fraudulent transactions appearing identical to real customers ' transactions.”(Gissimee Doe, 2013)
Hackers pose a threat to the future of e-commerce in two ways. First, they directly endanger e-commerce by increasing the risk of private financial information transmitted over the Internet being intercepted and used for illegal purposes. Secondly, they indirectly suppress the growth of e-commerce by undermining the public 's confidence in the safety of online transactions. This indirect threat is from the way that consumers perceive hackers. Hackers are typically characterised as super-criminals with extraordinary powers and malicious intent, many consumers may still be afraid to buy and sell goods and services over the Internet, even with adequate safeguards.
“Software firewalls consist of a software package that is installed on a server such as Linux or Windows. Software or server-based firewalls also typically sit between the Internet and an internal network so that it can provide maximum protection from harmful data packets. Software firewalls cause slightly more delay than appliances since there is more software involved, and software always introduces delays. This can be especially true if the firewall is also providing proxy or content filtering services. However, the delay is still slight and the trade-off for protection is considered worth it to most companies.” (Alan Hughes, 2013)
It is very important to have enough server capacity to handle you e-commerce shoppers. Many online retailers move to larger servers with more memory and CPUs to prepare for large numbers of customers especially around holiday seasons such as Christmas. Internet retailers rely on the High Availability (HA) concept to keep their e-commerce running in the face of unexpected glitches and malfunctions. The HA concept is quite simple and is based on eliminating as many single points of failure as possible within a reasonable budget. The simplest HA approach is to ensure a redundant infrastructure. This means your server has at least two network connections, two power supplies connected to different electrical circuits and two mirrored hard drives to prevent data loss if one of them suddenly crashes. The server itself is still a single point of failure though, and if it crashes, so does your online revenue. This is something you always need to keep an eye on.
Bibliography
Alan Hughes. (2013). How Does a Firewall Affect Speed?. Available: http://www.ehow.com/info_12183897_firewall-affect-speed.html. Last accessed 03/05/2013.
Gissimee Doe. (2013). What Are Some External & Internal Threats to an eCommerce Website?. Available: http://www.ehow.co.uk/info_8387883_external-internal-threats-ecommerce-website.html. Last accessed 1/05/2013.
Bibliography: Alan Hughes. (2013). How Does a Firewall Affect Speed?. Available: http://www.ehow.com/info_12183897_firewall-affect-speed.html. Last accessed 03/05/2013. Gissimee Doe. (2013). What Are Some External & Internal Threats to an eCommerce Website?. Available: http://www.ehow.co.uk/info_8387883_external-internal-threats-ecommerce-website.html. Last accessed 1/05/2013.
You May Also Find These Documents Helpful
-
In terms of environmental risks that are external things such as earthquakes, fires, floods, mudslides, snow, ice, lightning, hurricanes, tornadoes, zombies, and killer bee’s etc., are considered. Internal Environmental risk factors could be human malicious intent, human error, utility issues (leaks), power outages, and equipment failures. With the new web servers and online shopping site Digital Crime will also be considered in all aspects internal and external Security.…
- 827 Words
- 4 Pages
Satisfactory Essays -
The network infrastructure is the first line of defense between the Internet and public facing web servers. Firewalls provide the first line of defense in network security infrastructures. They accomplish this by comparing corporate policies about users' network access rights to the connection information surrounding each access attempt. User policies and connection information must match up, or the firewall does not grant access to network resources; this helps avert break-ins.…
- 1214 Words
- 4 Pages
Powerful Essays -
E-commerce networks are prone to external attacks. They present large targets with valuable internal data, such as customer information, credit card numbers and bank accounts, supply chain information, pricing, and so on. They must allow legitimate, worldwide users to connect and interact with the network. Speed is a priority to end users, where long transaction times or slow site navigation will motivate them to move to a different vendor. Security is another priority. Customers must be assured that their privacy and confidential information will remain intact and guarded.…
- 890 Words
- 4 Pages
Better Essays -
Software firewalls are installed on individual computers and they need sufficient configuration to be effective. Software firewalls contain a set of related programs, usually located at a network gateway server, that protect the resources of a private network from users on other networks or from internal users. Software firewalls allow application screening to verify the interaction between the requesting client and the requested resource.…
- 595 Words
- 3 Pages
Good Essays -
If a hacker is trying to hack your e-commerce site the disclosure of confidential data can occur. Confidential data includes application specific data such as credit card numbers, employee details, and financial records. If your e-commerce site has been hacked you could experience damage some of the damage you might incur is the hacker could illegally use user accounts and privileges. After the attacker successfully gains access as a legitimate user or host, elevation of privileges or abuse using authorization can begin. They could steal your hardware, steal software, run code to damage your systems, run code to damage, and corrupt your data, modify data that you have stored, steal your data, use your data for financial gain or for industrial espionage, perform actions that prevents legitimate authorized users from accessing network services and resources, perform actions to deplete network resources and bandwidth. To protect your e-commerce site you could use encryption to secure pages when processing orders and payments. Use authenticated SSL certificates, so a visitor to your site will then have the assurance that you are what you claim to be. Use digital certificates or business cookies because they will give you a unique Internet identity, like an ID or passport. Use anti-fraud solution to protect from Trojan horses, viruses, and worms.…
- 298 Words
- 1 Page
Satisfactory Essays -
Many would say that our current school system is flawed in many ways, one of which is the manner in which they get funding and quality of the information they are implanting into our children’s minds. There however is a way we can fix this, that is if we take on a movement of Interdependence, this means everyone has a sense of citizenship in their community and the world for that matter, do you agree with this? If you do than you would be able to relate to Benjamin Barber and the writing in his article, The Educated Student: Global Citizen or Global Conumer?, because he brings attention to these topics. At the beginning of his article Barber discusses how our founding fathers intended for all of our citizens to be well educated, “John Adams argued hard for schools for every young man…Thomas Jefferson made the same argument for public schooling for every potential citizen in America…” (Barber 416.3.2-3). He then proceeds to discuss how in present time there public school systems are being forced to run advertisements of companies in exchange for funding, because they are not funded enough without it; “We have watched this commercialization and privatization, a distortion of the education mission and its content, going to the heart of our schools themselves.” (Barber 417.11.1). Benjamin Barber puts great emphasis on the fact that we as a nation need to better understand citizenship and what it means to be a citizen, and on top of that be more aware of the other nations of this world and our relationship to them. We are a very multicultural nation, but he expresses how little we care about that and how we don’t understand that it gives us an advantage that we need to capitalize on. (421.28-29). Benjamin Barber has written many other articles and is still pushing the movement for Interdependence.…
- 431 Words
- 2 Pages
Satisfactory Essays -
I will then prepare a presentation that describes the kinds of actions that various organisations take to reduce security risks from operating online. I will then explain the competitivepressures on selected contrasting businesses organisations to develop their use of e-business. I will then take two contrasting businesses and explain using examples, how they have responded to competitive forces to develop their use of e-business. I will then be evaluating how successful a particular business organisation has been preparing for the growing use of e-business. I will finally prepare an outline personal development plan for sales staff that is unfamiliar with internet business.…
- 6979 Words
- 28 Pages
Powerful Essays -
References: Commonwealth of Pennsylvania: The Pennsylvania Code. (2012). Registered Nurse. Retrieved November 17, 2012, from http://www.pacode.com/secure/data/049/chapter21/s21.131.html…
- 1010 Words
- 5 Pages
Good Essays -
Cyber-crime, also known as e-crime, costs companies billions of dollars every year in stolen assets and lost business. Cyber-crime can thoroughly disrupt a company’s marketing actions. Additionally, when a business falls victim to cyber criminals, which could cause a…
- 4620 Words
- 19 Pages
Powerful Essays -
This lady cross the street lives with her son. The lady and the boy weren’t rich or anything, she used food stamps to buy food for them. The boy needs to start school so she put him in Head Start. Over the years the little boy became very successful and kept up with all the other students. He even got higher scores than his other classmates. Americans in Poverty that use Head Start and food stamps have better education and are healthier. Americans also live a more productive life due to the use of food stamps and all the programs the government offers. The United States should not end the War on Poverty because it boosts the chances for all the Americans and with the help of government programs the children will become more successful and healthier.…
- 498 Words
- 2 Pages
Good Essays -
Srinivasan G. & Abi-Raad M. (2003). Risk factors associated with e-Business infrastructure in SMEs. 1st Australian Information Security Management Conference, 24 November 2003, Perth Western Australia.…
- 3263 Words
- 14 Pages
Best Essays -
The world has been undergoing persistent transformation which some have been attributed to the changing developments in science and technology. In particular, information and communication technology is one of the most celebrated developments. Indeed, information technology has changed the lives of people across the globe. Information technology has reduced the world to a global village through fostering advanced communicationforms. However, with the advancements in information technology, especially the internet, insecurity issues have emerged. Insecurity issues have, in turn, sparked far reaching implications to the users. The most rampant security breaches that have been evidenced within the last six months include cyber bullying, network intrusion, cyber fraud, virus launching and data breaches.…
- 2967 Words
- 12 Pages
Best Essays -
The integration of technology into business transactions has allowed many organizations to provide better service while using fewer resources, but has also allowed unscrupulous individuals and organizations with a potential method of accessing information illegitimately. The cyber-criminal is often perceived to be “a computer hacker, sitting alone in his room, spending hours attempting to identify passwords, breach firewalls, and…
- 2258 Words
- 10 Pages
Best Essays -
“American consumers and businesses are the number one target of global cyber crime. For example, the Computer Security Institute and the FBI report that virus attacks have become a leading cause of financial loss by US companies, with businesses reporting an average of more than $160,000 for each security breach. According to the Internet Crime Complaint Center, the total dollar loss from all cases of Internet fraud referred to US law enforcement in 2007 was $239 million. The rapidly evolving world of global cyber crime--and what must be done about it--is described and illustrated with charts and anecdotes in the BSA report, The Fight for Cyber Space. Another recent BSA report, Online Software Scams: A Threat to Your Security describes the links between software piracy and cyber crimes such as identity theft.”(October is National Cyber Security Month, 2008)…
- 635 Words
- 3 Pages
Good Essays -
We live in the time of the World Wide Web and it brings the biggest changes ever. The effects from this powerful invention, the Internet, has made the world flat and the opportunities huge. Every big change can have an affect on people, it could be positive or negative. In early 2002, researchers evaluated the presence and role of hackers and their role in technological innovations. “A decade ago, people in the tech field were angry that hackers had been labeled the dangerous villains who threatened national security” (Nissenbaum, 2015). This negative association contrasts with the beginning days of the 1970’s when hackers “were seen as ardent if quirky programmers, capable of near-miraculous,…
- 1234 Words
- 5 Pages
Good Essays