Preview

E-Commerce Security

Good Essays
Open Document
Open Document
498 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
E-Commerce Security
Security
Any business that operates online is going to be at risk from internet threats and because of this the business must ensure to implement security on its network systems. Businesses need to be able to show that they can keep customer information safe and secure, this will reassure potential customers and widen your market potential.

Prevention of hacking-
E-commerce sites need to be able to prevent hacking so as to keep both business and customer data secure. If customer data is stolen from a business’s database then it is possible for the thieves to steal those customers’ identity, this is known as identity theft. Identity theft involves a thief stealing the personal details of someone and using this information to apply for services such as credit cards, loans and mortgages whilst pretending to be the person that they have stolen the details of, and it can be difficult for this crime to be detected if the thief has a large amount of the person’s details and is often only discovered when the victim receives correspondence requesting payment for the thief’s spending. The type of personal details that e-commerce sites keep about their customers provides enough information to commit identity theft so it’s important that all e-commerce businesses protect their customers’ data.

Firewall-
A way to protect customer information is to have a firewall on the business’s database. A firewall builds a protective virtual barrier around the network which only allows authorised programs access to data. When a user views a web site that has passed through a firewall they may not be able to see all the features of the site, this is because the security policies on the firewall can be set to block certain types of scripts running on the user’s computer. This is done to prevent viruses and hackers from attacking the system.

Authentication-
The most common but also effective ways of using authentication to protect your network is to ensure that all users

You May Also Find These Documents Helpful

  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    The best network design to ensure the security of Corporation Techs internal access while retaining public Web site availability consists of several layers of defense in order to protect the corporation’s data and provide accessibility to employees and the public.…

    • 1214 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    INDP Part 3

    • 1311 Words
    • 4 Pages

    The most ideal method for diminishing dangers against a server is by part the web server from the server database and other application servers. Since the web server has a direct association with the web makes it the principle focus to obtain entrance to the network. Touchy data, similar to customer records, passwords, charge card numbers, and government disability numbers ought not be put away on the web server. Switches permit data to go forward and backward between networks. Having a switch at every area will permit information to stream between all areas. Switches inspect each bundle of data on the network and figure out where it ought to be sent and guides it there. Switches utilize a setup table to figure out where associations strive for steering information, needs for directing information to specific associations, and principles for taking care of the information. Firewalls are likewise added or joined with switches to give more security to the network and information put away. Firewalls act like a channel between a network, or a PC, and the Internet. Firewalls can be arranged to keep representatives from sending particular sorts of messages and exchanging information off the network. They can likewise be set up to wipe out access to certain sites on the Internet, for instance any informal communication locales like Facebook and Twitter. One vital occupation they perform is halting PCs outside the network from getting to PCs on the network.…

    • 1311 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    Security software will be required for the new location to create user authentication, virus protection, and data protection (Cooper, n.d.). User authentication will require users to provide a username and password to access accounts. This authentication prevents unauthorized use on an account, and records activity by users. Virus protection is necessary. The security software will guard against viruses, adware, or malware from stealing or destroying information. A firewall will block incoming connections to the network. Data protection involves encrypting data transferred between locations on a network…

    • 2001 Words
    • 9 Pages
    Powerful Essays
  • Better Essays

    E-commerce networks are prone to external attacks. They present large targets with valuable internal data, such as customer information, credit card numbers and bank accounts, supply chain information, pricing, and so on. They must allow legitimate, worldwide users to connect and interact with the network. Speed is a priority to end users, where long transaction times or slow site navigation will motivate them to move to a different vendor. Security is another priority. Customers must be assured that their privacy and confidential information will remain intact and guarded.…

    • 890 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    Information has become the most valuable asset of any organization. And keeping that information secure is a major factor in the design and development of any computer system. Security is defined by Merriam-Webster as “the state of being protected or safe from harm”. It is up to every organization to insure that their data is protected, and that nothing that is harmful to the company or its clients is compromised.…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Unit 12 P6

    • 916 Words
    • 3 Pages

    Customers can be very concerned about payment security with transactions on the internet. Some of these concerns are from stories about hackers, identity theft and even fake…

    • 916 Words
    • 3 Pages
    Good Essays
  • Good Essays

    | Keep information secure and manage personal access to information sources securelyProtect systems and data: Access controls: Physical controls: log-in details should be treated as credit card information and not to be left lying anywhere with an easy access, locks, passwords, access levels.…

    • 793 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Identity theft is the one of the biggest concerns. If a person becomes a victim of identity theft, then it is almost impossible to prove innocence. Therefore, the customers should be informed about such attacks that can take place. They need to know the consequences of using online softwares and how to tackle them. Another thing that the organizations can adopt is the authentication and authorization technologies. This will make sure that the hackers are unable to steal the data. They should also put up resistive technology in place like firewalls, content filtering and encryption. These technologies should be of the highest quality.The strength of the passwords should be really strong. If any suspicious movement of data is found, then the organization must take an immediate step and not take it lightly. Lastly, they should devise an information security plan to protect their…

    • 588 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Data security would be a method that corporations use to keep important and confidential information protected. Access to this type of secure information is limited to those who have the authorization to view it. Data security is enforced so that private information that a corporation has about its employees, customers and others that they conduct business with is kept safe from any potential corruption from those who want to use it to their advantage. Many companies go to great lengths to keep their data safe and sound from hackers who can get confidential information from their systems. If a company is not careful and does not protect their confidential information many problems can occur. Some of these problems include identity theft of customers and employees. Hackers can steal information such as social security numbers, addresses, credit card information and many other key pieces of information that can let hackers easily access ones identity. The focus of this research paper would be about the Michaels Stores…

    • 813 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    Mia Casa Network

    • 294 Words
    • 2 Pages

    6-7. Adding security to the webpage and intranet webpage could be done by hiring a good web-site developer.…

    • 294 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Disaster Recovery Plan

    • 638 Words
    • 3 Pages

    Online services must be protected to ensure that both employees and customers will be able to access the programs and information to continue running the business. Sales, shipping information, customer database, and the virtual interaction provided to customers must be available. Basic functions within the main offices must remain available, including power, sales, the phones, and customer service.…

    • 638 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Causes Of Identity Theft

    • 1108 Words
    • 5 Pages

    People often trust the internet too much when it comes to buying things or sending out their personal information. One does not take into account that there are hackers waiting to scam you for all your money and information. IN an article titled, “Information Security Breaches and the Threat to Consumers” written by Fred H. Cate, he states, “Consumers often end up unwittingly providing thieves with access to sensitive data by failing to secure their own data, by responding to fraud schemes, such as phishing and pharming, and by careless use of their personal information” (Cate 4). In other words, people tend to trust that what they put on the internet, however there are people who are trying to scam you for your money. People should be more aware and less careless about what they are sending through the internet and to who they are sending it to. While we continue to be careless with our information, we continue to see many crimes involving identity theft. Cate writes, “The vulnerability of unsecured personal data and the threat of identity-based frauds nevertheless continue to grow and evolve as perpetrators become more sophisticated in how they seek to obtain and exploit personal information” (Cate 2). It makes it easy for hackers to catch and use one’s personal information when the individual continues to be careless with their information…

    • 1108 Words
    • 5 Pages
    Good Essays
  • Good Essays

    McBride Financial services’ main concern is to ensure security for its customers’ financial online application services, and making sure that the online information is protected. In order not to involve into a lawsuit from clients because of identity stolen, McBride Financial will implement a kind of internal security system so every employee can access the clients’ information. McBride Financial is also concerned with physical security of the computer system, and other security issues as the company’s success is based on client’s understanding of how their personal information is safe. (Apollo Group, 2003 )…

    • 664 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Online Marketing

    • 581 Words
    • 3 Pages

    The most important example of technical consideration of online marketing is security. Security is the number one issue in a consumer’s mind when they need to use personal information to purchase or do anything online that requires that information. Hackers and viruses can lead to personal information on any database to be sold and used to wreak havoc on innocent consumers. Viruses can be…

    • 581 Words
    • 3 Pages
    Good Essays