Preview

Security Issues in E-Commerce Can Be Overcome

Good Essays
Open Document
Open Document
646 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Security Issues in E-Commerce Can Be Overcome
Discuss how security issues in e-commerce can be overcome

In this document I am going to explain the security issues that every e-commerce possible faces and how to overcome them.

Each e-commerce have to keep their online data safe such as customers personal details, their bank details and many more and in order to make sure that their data stays safe and secured, they have to be aware of all the frauds that is taking place now days because e-commerce have to deal with payments such as online banking, electronic transactions, using debit cards, credit cards and many other ways and because of these e-commerce’s have more compliance issues as they are at more risk from being targeted than other websites. Data’s can be stolen in many ways such as by hacking and by adding viruses into systems and many other ways.

Hackers scan the whole system without the knowledge of owner and goes through the private files, data’s and most of the private and confidential files with an intention of dropping the company down. So all the companies that do online business have to be alert and have to keep tight security in every systems such as “firewall”, so no hackers can hack in to their system.

The other thing that ecommerce have to be aware of is viruses, viruses comes in many faces such as virus, worms and Trojans. These three viruses works in different way but the result of all these are same which is that they drops down the whole system once it goes into a system.

Virus is a kind of code created by human that can damage the whole system once it is been opened, and the trick that hackers use is that they send the virus in different way such as “junk email, pop-ups web pages or games. As soon as the user clicks on that particular email or pop-up the virus codes starts doing their job which is to damage the system by destroying files and other objects.

Where else the other virus called worm does not damage the system but it allows the hacker to view all the

You May Also Find These Documents Helpful

  • Better Essays

    E-commerce networks are prone to external attacks. They present large targets with valuable internal data, such as customer information, credit card numbers and bank accounts, supply chain information, pricing, and so on. They must allow legitimate, worldwide users to connect and interact with the network. Speed is a priority to end users, where long transaction times or slow site navigation will motivate them to move to a different vendor. Security is another priority. Customers must be assured that their privacy and confidential information will remain intact and guarded.…

    • 890 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    E-Business is much more than just a shopping website. It expands individual’s knowledge and vision of the organization, gains new customers and evaluates the relevance of the products and personal preference of the clients. Safety and security is always necessary to protect intellectual properties and customers privacy. E-Business organizations use the best technology in order to grow and create strategies to maintain affordable prices.…

    • 423 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Exam Final ECOM 320

    • 3983 Words
    • 11 Pages

    Lesson 7: E-commerce security and controls Access control: Mechanism that determines who can legitimately use a network resource. Active tokens: Access token Authentication: Process to verify the real identify of an individual, computer, computer program, or EC website. Authorization: Determines whether a buyers card is active and whether the customer has sufficient funds. Biometric systems: Authentication systems that identify a person by measurement of biological characteristic, such as fingerprints, iris patterns, facial features, or voice. Biometric control: An automated method for verifying the identity of a person based on physical or behavioral characteristics. Botnet: A huge number of hijacked Internet computers that have been set up to forward traffic, including spam and viruses, to other computers on the Internet. Business continuity plan: A plan that keeps the business running after a disaster occurs. Each function in the business should have a valid recovery capability plan. Certificate authority (CA): Third parties that issue digital certificates. Ciphertext: a plaintext message after it has been encrypted into a machine-readable form. Confidentiality: Assurance data privacy and accuracy. Keeping private or sensitive information from being disclosed to unauthorized individuals, entities, or processes. Cybercrime: Intentional crimes carried out on the Internet. Cybercriminal: A person who intentionally carries out crimes over the Internet. Crackers: A malicious hacker who may represent a serious problem for a corporation. Cryptography: is a method of storing and transmitting data in a particular form so that only those for whom it is intended can read and process it. Data breach: A security incident in which sensitive, protected, or confidential, data is copied transmitted, viewed, stolen, or used by an individual unauthorized to do so. Denial-of-service (DoS) attack: An attack on a website in which an attacker uses specialized software to send a…

    • 3983 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    E-commerce has many drawbacks. I will be going through these drawbacks that risk an organisation of committing to an E-commerce system.…

    • 724 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    progress check 1

    • 711 Words
    • 3 Pages

    A computer virus is programmed to raid and attack existing computer programs. The virus is sent by an e-mail or activated through a download. The virus program then infects the whole computer system. The virus attaches itself to other programs in the computer and copies itself. Some computer viruses are terrible; they erase files or lock up systems. Viruses must not go untreated.…

    • 711 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    • A computer virus’s main purpose is to replicate itself and copy its code into as many other files as possible. Although virus replication can slow down networks, it is not usually…

    • 5495 Words
    • 157 Pages
    Powerful Essays
  • Good Essays

    A computer virus attaches itself to a program or file enabling it to spread from one computer to another, leaving infections as it travels. Like a human virus, a computer virus can range in severity: some may cause only mildly annoying effects while others can damage your hardware, software or files. Almost all viruses are attached to an executable file, which means the virus may exist on your computer but it actually cannot infect your computer unless you run or open the malicious program. It is important to note that a virus cannot be spread without a human action, (such as running an infected program) to keep it going.…

    • 787 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    The World Wide Web has become more than a growing trend in today’s world. It is the electronic wave of the future for business, education, communication, and technology that is happening now. From 2000 to 2007, worldwide Internet usage grew 256% and at year-end 2007 Internet users numbered 1,319,872,109, or 20% of the world’s total population (Internet World Stats, 2008). These statistics represent a business market waiting to be explored that almost seems to guarantee growth, given the global expanse of the Internet and billion-plus users. Business on the Internet – or e-business -- has spawned different types of e-commerce operations, among them business-to-business (B2B) and business-to-consumer (B2C). Like traditional business, e-business is guided by ethical standards as well as subject to laws and regulations with which they are required to comply. This paper discusses and compares some of the ethical, legal, and regulatory issues that B2B and B2C operations face on the Internet.…

    • 1281 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Causes Of Identity Theft

    • 1108 Words
    • 5 Pages

    People often trust the internet too much when it comes to buying things or sending out their personal information. One does not take into account that there are hackers waiting to scam you for all your money and information. IN an article titled, “Information Security Breaches and the Threat to Consumers” written by Fred H. Cate, he states, “Consumers often end up unwittingly providing thieves with access to sensitive data by failing to secure their own data, by responding to fraud schemes, such as phishing and pharming, and by careless use of their personal information” (Cate 4). In other words, people tend to trust that what they put on the internet, however there are people who are trying to scam you for your money. People should be more aware and less careless about what they are sending through the internet and to who they are sending it to. While we continue to be careless with our information, we continue to see many crimes involving identity theft. Cate writes, “The vulnerability of unsecured personal data and the threat of identity-based frauds nevertheless continue to grow and evolve as perpetrators become more sophisticated in how they seek to obtain and exploit personal information” (Cate 2). It makes it easy for hackers to catch and use one’s personal information when the individual continues to be careless with their information…

    • 1108 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    ur mama

    • 659 Words
    • 3 Pages

    A computer virus is programmed to raid and attack existing computer programs. The virus is sent by an e-mail or activated through a download. The virus program then infects the whole computer system. The virus attaches itself to other programs in the computer and copies itself. Some computer viruses are terrible; they erase files or lock up systems. Viruses must not go untreated.…

    • 659 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    What is virus? A computer virus, according to Webster 's Collegiate Dictionary, is "a computer program usually hidden within another seemingly innocuous program that produces copies of itself and inserts them into other programs or files, and that usually performs a malicious action (such as destroying data)". Two categories of viruses, macro viruses and worms, are especially common today. Computer viruses are never naturally occurring; they are always man-made. Once created and released, however, their spread is not directly under human control. One example of a virus is the Anna Kournikova virus, which comes in the form of a picture sent through email.…

    • 1103 Words
    • 5 Pages
    Good Essays
  • Better Essays

    Many companies keep sensitive personal information about customers or employees in their files or on their network. Those information move fast through the systems and make easier for organizations to provide efficient and effect full service to the customers. Security of the information is one of the most concern aspects in information systems as it has become a major threat embedded with the information systems today. Having a sound security plan in place to collect only what you need, keep it safe, and dispose of it securely can help you meet your legal obligations to protect that sensitive data. In this article, it describes the data security, data breaches and as well as the existing solutions for prevent the security issues and vulnerabilities.…

    • 1700 Words
    • 6 Pages
    Better Essays
  • Better Essays

    A computer virus is a computer program that can copy itself[1] and infect a computer. The term "virus" is also commonly but erroneously used to refer to other types of malware, adware, and spyware programs that do not have the reproductive ability. A true virus can only spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive. Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer.[2][3]…

    • 2909 Words
    • 12 Pages
    Better Essays
  • Satisfactory Essays

     Viruses are basically brought into your computer without knowing which is commonly known for it to make a copy of itself on your computer repetitively which is easy to create.  How Can A Virus Come In Contact With A Computer    A computer can come in contact with a virus by not running the latest updates.…

    • 267 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Viruses are small programs built with intent to harm or disrupt the useful computer programs. Some viruses aim at overloading the computer memory by an excessive use of computer resources. These viruses tend to fail a computer in executing the desired tasks. They lead to the dysfunction of a computer. The development or the spread of such malicious software in unethical.…

    • 965 Words
    • 4 Pages
    Good Essays