Preview

E-Business, Opportunities & Threats

Satisfactory Essays
Open Document
Open Document
1044 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
E-Business, Opportunities & Threats
M1
Selling goods & services
The most way of payment in the internet is by paying through credit card. The business website could be hacked by cyber-hacker and he could steal the credit card numbers of the customers of the business.
How to solve the problem?
The company should make sure that their system is protected and safe from any viruses, so the company must install anti-virus software and do regular update for it to ensure that their system is safe well. Also the company should always make a back-up for its data and never switch off the firewall.

Communication with customers
Sometimes, while employee of the company talks with customer through the email, the customer might have in his/her computer a virus and this virus sent itself to the computer of the company and affected it.
How to solve the problem?
The company should save its data by backing-up it at safe devices. Also it should install anti-virus software the will scan every downloaded file before the employee open it. The company must inform its employees about email attachments from customers or unknown emails and how danger they could be to the company computers.

Promote Products
Some companies promote their products through sending it to customers by email, and this way of promoting is affect to reputation of the company as it is annoying or it considered as not acceptable.
How to solve the problem?
If the company wants to promote its product through sending it to customer by email, it should do it at good way like reducing number of images, never attach weird files or large size files, and the subject of the email should be simple and understandable.

Provide information
Some companies do not have the security in their websites, so it could be hacked by cyber-hacker and he might change or delete the information that will make the company at hard situation. How to solve the problem?
The company should back-up its data, enhance its system to be strong & secure, and make regular

You May Also Find These Documents Helpful

  • Satisfactory Essays

    For the LAN domain, inform employees about email scams. Most users know not to open emails when on our system. Spam filters can help control junk email, so there is less risk of opening emails containing malware.…

    • 337 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    “Proper” is left to you to determine; it can mean not storing company data on their devices, not sharing company data and apps, reporting missing devices promptly, etc.…

    • 319 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    It 205 Week 3 Assignment

    • 667 Words
    • 2 Pages

    And did not properly install another layer of security software it had already purchased .TJX also retained card hold data in its system much longer then stipulated by industry rules for storing such data. This company had very little security controls in place at all. The weakness of having a system that TJX had in place are a hacker can gain unauthorized access by finding weakness in the security protections employed by Web sites and computer systems, often taking advantage of various features of the Internet that make open system that is easy to use another problem is a hacker can install a sniffer which is eavesdropping program that monitors information over the internet so they can find personal information haw they want to.…

    • 667 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    This can be through a desktop, company laptops, tablets, or any device that connects to the network. Employees should always remember to log off their workstations to avoid unauthorized use as well as not giving out their passwords to co-workers. A good idea is to enable the screen lockout when the desktop is idle. Also block or limit user rights to download, install software, and their access to certain files on the web. This can decrease the threat of viruses, malware, and any harmful files being seen, downloaded, and installed into the system through the workstation. It is very easy for threats to spread throughout the network so it is very important to have a top shelf Anti-virus in place and enable it to scan any CD, DVD, or USB drives inserted into the…

    • 501 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt280 Week 1 Homework

    • 359 Words
    • 2 Pages

    A. Enable content filtering and antivirus scanning at the entry and exit points of the internet. Enable workstation auto-scans and auto-quarantine for unknown file types.…

    • 359 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    If a hacker is trying to hack your e-commerce site the disclosure of confidential data can occur. Confidential data includes application specific data such as credit card numbers, employee details, and financial records. If your e-commerce site has been hacked you could experience damage some of the damage you might incur is the hacker could illegally use user accounts and privileges. After the attacker successfully gains access as a legitimate user or host, elevation of privileges or abuse using authorization can begin. They could steal your hardware, steal software, run code to damage your systems, run code to damage, and corrupt your data, modify data that you have stored, steal your data, use your data for financial gain or for industrial espionage, perform actions that prevents legitimate authorized users from accessing network services and resources, perform actions to deplete network resources and bandwidth. To protect your e-commerce site you could use encryption to secure pages when processing orders and payments. Use authenticated SSL certificates, so a visitor to your site will then have the assurance that you are what you claim to be. Use digital certificates or business cookies because they will give you a unique Internet identity, like an ID or passport. Use anti-fraud solution to protect from Trojan horses, viruses, and worms.…

    • 298 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    I believe that they should monitor employee email and internet usage. By allowing the company to monitor such actions it will stop individuals wasting valuable company time. This also allows for restrictions of site access if one is exploring sites they should not be. It is important to watch to be sure that important information about the company is not leaked out to the public. Actions of their employees effect company whether online or not online. Although, the internet makes it easier to incidentally bring hardship to company in which one works the actions can cause lawsuits against the company.…

    • 359 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    ERR task B

    • 933 Words
    • 3 Pages

    Data protection: never give out personal information about colleagues or service users to unauthorised people or organisations. Never disclose commercial information about company’s activities to unauthorised people or organisations. Keep all data secure and use my own log in and not share passwords. Any papers, CD’s, portable USB devices should be locked away whenever possible, cabinets and draws that contain sensitive…

    • 933 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    SkillPort Security

    • 647 Words
    • 3 Pages

    Having the proper security measures is very critical when running a business. It can be very expensive for an organization to keep an updated security system but in the end, it is well worth the money. No manager should want to even take the risk of letting hackers or viruses into the organizations information system. To fully understand why it is critical to have security measures, you first need to understand the different threats a network can face. Having a good secure network can prevent things such as malware, social engineering attacks, spam, and phishing. All of these can be very dangerous and damaging to your network. As a manager it is also very important to have a thorough security policy that states the precautions and also the steps to take in case of a security breach. When choosing security controls for your business you must consider three things; what security controls does your business need to safeguard the information systems, the safety and protection that security controls should provide, and existing security controls and how they have been implemented.…

    • 647 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    The iPremier Company should make sure that there is the security system to make sure that when facing attacks, the company can stop it as soon as possible. The employees, especially the technology team, should take the responsibilities of protecting the information of the customers. Also not just the IT department, they have to connect the public relation department to explain what happened to the press and the customers.…

    • 658 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    The spread of the internet has opened a new way of businesses to connect with potential customers. While the traditional businesses are still around, e-business has been growing at a steady rate. The main differences between e-business and traditional business include the kind of customer interaction available, accessibility and the expenses.…

    • 413 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    is going to be unfolded, which if not managed properly, can nullify all the investments and…

    • 7537 Words
    • 31 Pages
    Powerful Essays
  • Powerful Essays

    For this assignment I am going to compare, contrast and look at the history of two internet giants: Ebay and Amazon.…

    • 3362 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    E-Commerce also known as Electronic Commerce is the use of internet to perform trading and business activities. The various technologies used by e-commerce business are Electronic Fund Transfer (EFT), Electronic Data Interchange (EDI), mobile ecommerce etc. E-Commerce has become a thriving business and is still growing exponentially towards the future.…

    • 861 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Furthermore, there are many hackers who look for opportunities, and thus an ecommerce site, service, payment gateways; all are always prone to attack. Things such as viruses could mean losing the site or affecting your customer’s computers while on your website…

    • 485 Words
    • 2 Pages
    Satisfactory Essays