Preview

Report on E-Commerce Security

Better Essays
Open Document
Open Document
1719 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Report on E-Commerce Security
TABLE OF CONTENT

ABSTRACT 2
1. INTRODUCTION 3
2. Features of E-commerce: 4
2.1. Security role in present E-commerce: 4
2.2. Security Factors in E-commerce: 5
3. Security Technologies: 7
3.1. Secure Electronic Transaction (SET): 7
3.2. Secure Socket Layer (SSL): 8
3.3. Firewall: 8
4. Conclusion: 9
5. References: 11

ABSTRACT

In the E-commerce security is most important point because a website is to protect the valuable information. It plays a vital role to provide security to the customer information. It mainly deals when the customer doing the online transactions. By this security support the customer has trusted on the E-commerce website as well as they protects their personal information from the thief’s and hackers. This day security has been implemented in a different way like Secure Sockets Layer, Integrity, Authentication, Encryption and Secure Payment. Integrity ensures of the remainders of data as is of the seller to the customer. Encryption deals with hide the information cannot spy on the others information.

This report describes the security technologies in the E-commerce system and issues involving the E-commerce security technologies.

1. INTRODUCTION

E- Commerce is also known as online commerce. E-commerce refers to exchange the goods and services over the internet. It includes retail shopping, banking, stocks and bonds trading, auctions, real estate transactions, air line booking, movie rentals nearly anything you can imagine in the real world. Even personal services such as hair and nail salons can benefit from e-commerce by providing a website for the sale of related health and beauty products, normally available to local customers exclusively. The main aim of this report conveying the security technologies of E-commerce website Security is the authorized conception in E-commerce website the main notion of security is protecting the customer personal details and banking information. Its mostly involve with four basic



References: Chan, H., Lee, R., Dillon, T., &Chang, E. (2001).E-commerce: Fundamental Application. John Wiley& son, West Sussex, England. David, W.(2000). E-commerce: Strategy, Technologies and Applications. McGraw Hill, University Press, Cambridge. Elias, M. A. (2000).Electronic Commerce: From Vision to Fulfillment (3rd Ed.). Pearson Edition. Security Elements. (2005). Retrieved April 30, 2009, from  http://wiki.media-culture.org.au/index.php/E-commerce_-_Overview_-_Security Advantages of Security. (2007). Retrieved April 26, 2008, from  http://www.isos.com.my/ecommerce/advantages.htm Secure Socket Layer. (2006). Retrieved April 27, 2009, from  http://unpan1.un.org/intradoc/groups/public/documents.apcity/unpan000364.pdf Secure Electronic Transaction. (1999). Retrieved April 28, 2009, from  http://www.aph.gov.au/library/pubs/rp/1998-99/99rp12.htm#CRY

You May Also Find These Documents Helpful

  • Better Essays

    E-commerce networks are prone to external attacks. They present large targets with valuable internal data, such as customer information, credit card numbers and bank accounts, supply chain information, pricing, and so on. They must allow legitimate, worldwide users to connect and interact with the network. Speed is a priority to end users, where long transaction times or slow site navigation will motivate them to move to a different vendor. Security is another priority. Customers must be assured that their privacy and confidential information will remain intact and guarded.…

    • 890 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    E-Business is much more than just a shopping website. It expands individual’s knowledge and vision of the organization, gains new customers and evaluates the relevance of the products and personal preference of the clients. Safety and security is always necessary to protect intellectual properties and customers privacy. E-Business organizations use the best technology in order to grow and create strategies to maintain affordable prices.…

    • 423 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Exam Final ECOM 320

    • 3983 Words
    • 11 Pages

    Lesson 7: E-commerce security and controls Access control: Mechanism that determines who can legitimately use a network resource. Active tokens: Access token Authentication: Process to verify the real identify of an individual, computer, computer program, or EC website. Authorization: Determines whether a buyers card is active and whether the customer has sufficient funds. Biometric systems: Authentication systems that identify a person by measurement of biological characteristic, such as fingerprints, iris patterns, facial features, or voice. Biometric control: An automated method for verifying the identity of a person based on physical or behavioral characteristics. Botnet: A huge number of hijacked Internet computers that have been set up to forward traffic, including spam and viruses, to other computers on the Internet. Business continuity plan: A plan that keeps the business running after a disaster occurs. Each function in the business should have a valid recovery capability plan. Certificate authority (CA): Third parties that issue digital certificates. Ciphertext: a plaintext message after it has been encrypted into a machine-readable form. Confidentiality: Assurance data privacy and accuracy. Keeping private or sensitive information from being disclosed to unauthorized individuals, entities, or processes. Cybercrime: Intentional crimes carried out on the Internet. Cybercriminal: A person who intentionally carries out crimes over the Internet. Crackers: A malicious hacker who may represent a serious problem for a corporation. Cryptography: is a method of storing and transmitting data in a particular form so that only those for whom it is intended can read and process it. Data breach: A security incident in which sensitive, protected, or confidential, data is copied transmitted, viewed, stolen, or used by an individual unauthorized to do so. Denial-of-service (DoS) attack: An attack on a website in which an attacker uses specialized software to send a…

    • 3983 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    The major treat for e-commerce is identity theft in which an imposter obtains personal information such as social security , driver license, credit card number to impersonate someone else. Having security control in your website like firewalls, intrusion detection systems, securing wireless network and antivirus software can help us to avoid or reduce this kind of treat.…

    • 280 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    In this document I am going to explain the security issues that every e-commerce possible faces and how to overcome them.…

    • 646 Words
    • 3 Pages
    Good Essays
  • Better Essays

    As technology continues to take shape, E-commerce continues to advance and people are getting drawn into the sector. This is due to the diverse benefits aligned to the system because the transactions are conducted in a…

    • 1194 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Legal and Ethical Issues

    • 374 Words
    • 2 Pages

    In the internet age, e-commerce and e-business professions also have many legal and ethical issues in the internet service and all transaction and operations are controlled and guided by the law and legal rules and if there is a violation of law it is considered as illegal and the offenders are punished by the legal system. Privacy problems, violations of copy right, frauds, publishing offensive and illegal information are some of the main legal and ethical issues found in the profession of e-commerce. This may result in loss of trust about the firm/company or the loss of business.…

    • 374 Words
    • 2 Pages
    Good Essays
  • Better Essays

    In the last decade, more and more companies have started to look into e-commerce to connect them to the infinite world of global suppliers, partners, consumers and much more. This boom in technology has placed multiple assets are risk from a security stand point allowing hackers/crakers and anyone on the internet to gain access to these network and gain information or try to jeopardize business to a point where it stand stills.…

    • 1237 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Swot for Amazon

    • 361 Words
    • 2 Pages

    Threats 1. Online security 2. Technology cost and services 3. International competition on rise 4. E-commerce tax…

    • 361 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    • • • LO1 Know the technologies required for an e-commerce system Technologies • hardware e.g. web server and specifications, monitor, keyboard, mouse, modem, network card • software e.g. server, web browser, web creation and database creation software • networking e.g. ports, protocols, TCP/IP • domain names and registration • programming e.g. MySQL, PHP, JavaScript, HTML • internet speeds and connections • W3C. LO3 Understand the effects of e-commerce on society Risks • hacking • viruses • identity theft • passwords • fraud • returns • payments. Solutions • firewalls • virus software • SSL, HTTPS • data security methods • returns policy • secure payment software. LO2 Understand the impact of e-commerce on organisations Advantages • 24/7 opening • global business opportunities • start-up and running costs are low • can be used to expand a retail business • increased income • customer information can be stored • competitors can be monitored • can be searched easily • can be run from home • can be managed easily • ease of access by customers.…

    • 2553 Words
    • 16 Pages
    Better Essays
  • Good Essays

    Amazon vs. Ebay

    • 584 Words
    • 3 Pages

    According to Heyes (2005), in recent years online shopping is becoming more popular. Two popular online shopping sites are Amazon and eBay. Therefore, in this report, I want to explore which site is more competitive and how each one will do in the future, in relation to the industry in which they compete. The industry of online shopping has a unique service. Online shopping is the process through which consumers directly buy goods or services from a seller in real-time, without an intermediary service, over the internet. Internet business began in1991. It was not until 1994 that online shopping was being utilized, such as online banking. “During the same year, 1994, Netscape introduced SSL (Secure Sockets Layer) encryption of data transferred online, which has become essential for secure online shopping. Also in 1994 the German company Intershop introduced its first online shopping system. In 1995 Amazon launched its online shopping site, and in 1996 eBay appeared” (Wikipedia, 2011, page.1).…

    • 584 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Secom Case Study

    • 996 Words
    • 4 Pages

    Recent years, the issue of personal information leaks over the internet is becoming fiercer. Incursions by outsiders, criminal acts of insiders, along with careless actions hurt both the information holders and the companies, since the latter might loss business accordingly. That’s why security issue, for both software and hard ware, is important for any online business.…

    • 996 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    David C. Chou, X. T. (No. 4, 2004). Web technology and supply chain. Information Management &Computer Security .…

    • 2673 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    E-Commerce

    • 1155 Words
    • 5 Pages

    Electronic commerce, commonly known as e-commerce or ecommerce, is a type of industry where the buying and selling of products or services is conducted over electronic systems such as the Internet and other computer networks. Modern electronic commerce typically uses the World Wide Web at least at one point in the transaction's life-cycle, although it may encompass a wider range of technologies such as e-mail, mobile devices social media, and telephones as well.…

    • 1155 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Online Voting System

    • 1505 Words
    • 7 Pages

    This chapter discusses the literature and studies which are related and have direct bearing to the proposed study. It consists of referenced information about information system, Sales Monitoring and Inventory System, scripting and programming languages, database, online application and web authentication security. And will also discuss the synthesis of the proposed study.…

    • 1505 Words
    • 7 Pages
    Powerful Essays

Related Topics