StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Security Issues in E-Commerce - Coursework Example

Cite this document
Summary
The paper "Security Issues in E-Commerce" is a great example of E-Commerce coursework. Where there is no confidence, most far-sighted traders and customers may resolve to give up the use of the web and go back to back to the conventional technique of trading. To respond to this tendency, the problems of internet security in online trading and consumer websites have to be frequently assessed…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.8% of users find it useful

Extract of sample "Security Issues in E-Commerce"

Security issues in e-commerce Insert Name Course, Class, Semester Institution Instructor Date Abstract Where there is no confidence, most far-sighted traders and customers may resolve to give up use of the web and go back to back to conventional technique of trading. To respond to this tendency, the problems of internet security in the online trading and consumer websites have to be frequently assessed and suitable measures formulated. These security precautions have to be executed so that they do not hamper or deter the projected e-commerce functionality. This paper will talk about important internet safety matters. It will also handle a number of the dangers facing e-commerce and consumer confidentiality. These dangers start off from both the hacker and the e-commerce website. A clear-cut comparison can be made of the safety limitations in the postal organizations and safety faults on the internet. The susceptible parts in either case are at the terminals – the consumer’s processor and the trader’s server. Information streaming in the channel is quite impervious to daily break-ins. Issues of confidentiality are among the key drivers for enhanced internet protection together with the reduction of stealing, scam and sabotage. Two chief dangers facing client confidentiality and trust come from sources both unfriendly to the setting as well as sources that are apparently pleasant. Most of the problems and precautionary measures talked about in this paper come from knowledge resultant from discussions with customers on how to sustain safe e-commerce services. These techniques and practices can be valuable in a range of consumer and trader settings. Security issues in e-commerce Introduction E-commerce is the exchange of goods or services over electronic mechanisms such as the net and in some cases, other sets of connections associated with computers. It is usually considered the marketing and profit-making purpose of e-Business. There has been a considerable rise in the amount of transactions executed by electronic means since the extensive acceptance of the Internet (Qin, 2009). An extensive diversity of business is executed through the internet, including wire transfer of money, supply chain organization, online marketing, internet business deal processing, stocks managing systems, and computerized data collection applications. Maxims of e-Commerce The immense increase in the appreciation of e-Commerce has led to a new generation of connected safety threats, but any e-Commerce system has to meet four fundamental conditions, namely: privacy, reliability, verification and authorization, and non-repudiation. Privacy entails that information channeled to one party must be kept from unofficial and illegitimate parties (Qin, 2009). Reliability also referred to as integrity means that client and trader’s information must not be interfered with in the slightest way. The authorization and verification concept states that both dispatcher and receiver of correspondence must confirm their identities in the communication process. Non-repudiation is about proving that indeed the exchanged information was received. These essential principles of e-Commerce are primary to the execution of protected online business. In addition to the primary maxims of e-Commerce above, online traders also have to guard against several different external safety hazards, most conspicuously Denial of Service. This is where people maliciously make effort to make a computer source inaccessible to its rightful users through a variety of apparatus. The monetary services division bears the burden of cyber crime. Even so, the segment that has had the biggest rise in the number of online attacks is e-Commerce (Mehd, 2004). Participants of e-Commerce security In a usual e-Commerce practice, a consumer goes on to a web site to look through an index showing the available products and their respective prices so as to make a purchase. This straightforward action points up the four most important participants in e-Commerce safety (Bidgoli, 2004). The first participant is the purchaser who makes use his internet browser to trace the site. The web site is typically managed by a company. The company is the second player, whose business is to put on the market commodities to with an aim of making proceeds. As the commercial concern is advertising products and services, not structuring computer programs, it generally procures most of the computer applications externally. It therefore runs its website from intermediary software dealers. The vendor of the computer programs is the very last of the three legal participants. The invader regularly referred to as the attacker is the player whose objective is to maliciously take advantage of the other three legitimate participants for illegitimate gains (Simmons& Simmons, 2006). The invader can lay siege to the legal participants and their assets with a variety of detrimental systems that bring about system misuse. Dangers and susceptibilities are categorized under privacy, reliability, and accessibility. A danger is a potential attack against a computer system. It does not automatically imply that the computer is at risk of the attack. An assailant can make threats to hurl eggs at your stone house, but it is not detrimental. Susceptibility is a weak point in the system, but it is not automatically recognized by the enemy. Susceptibility exists at way in and the way out of the system. In a home, the susceptible places are the entrance and windowpanes. When the thief makes threats to break into the house and discovers the susceptibility of the open entrance, he is take advantage of the items in the house (Simmons& Simmons, 2006). Attacks on e-commerce web sites Attacks and threats against e-business sites are so shocking; they go right after brutal felonies seen in the daily news reports. Almost on a monthly basis, there is a broadcast of an attack on a key online site where susceptible data is acquired. The dealers manufacturing e-Commerce computer programs are sourced from the same group as those who work on other computer applications. Actually, this comparatively innovative field is an appeal for top aptitude. For that reason, the class of computer applications being manufactured is rather the same evaluated against other creations (Hughes, 1995). The scandalous people did not undergo a sudden increase, but the motivation of an e-Commerce abuse is a good deal compared to other unlawful prospects. Weighed against stealing from a financial institution, the instruments required to carry out a hit on the Internet is comparatively cheap. The scandalous person only requires contact with a computer workstation and an Internet link. In contrast, a bank raid may call for guns, a car for hurried departure, and apparatus to split a safe, and these possibly will not be adequate. Thus, the little expenses of accessing an e-business site attract the large number of scandalous people. The corrupt gain of a triumphant online attack is unbelievable. If a criminal was to take a unit of currency from all bank accounts at any one of the main banks, it without doubt sums up to a number of millions. The typical bank thief hopefully anticipates a one-off in hundreds of thousands. Whereas the typical bank raider is limited to the quite a few branches in his area, his online equivalent is capable of choosing from all banks with an internet function. The online thief can steal from a bank overseas, exploiting the non-existent expatriation regulations between the state where the attack began, and the country of destination. A raid on a branch of a bank calls for cautious arrangements and safety measures to ensure that the perpetrator of the crime does not leave a trace. He makes certain that the fleeing vehicle is not straightforwardly recognizable after the raid. If he executes his deeds online, he can effortlessly make himself unidentified and the starting place of the exploit undetectable. Some of the simplest and money-making attacks are centered on swindling the consumer. These are referred to as common engineering procedures. Such attacks entail close watch of the consumer’s conduct, collecting information to bring into play against the consumer (Kidd, 2000). For instance, a person’s surname is a frequent test question used by several Web sites. If one of the Web sites is deceived into give away a secret code once the test query is offered, then not only has the site in question been jeopardized its standards, but it is also very probable that the consumer used a similar logon username and password on other Web sites. The greater parts of safety contraventions on the Internet take place at the endpoints, that is, the local system, and not the key factors of the Internet. This circumstance allows for the making of an assessment of the safety faults in the mailing system and the net. The most susceptible parts of the postal systems are at the terminals (Bidgoli, 2004). Reports have been made of thieves pilfering invoices, pay envelopes and other customer’s private correspondence from the sufferer’s house mailbox or the lane mailboxes. This nature of safety contravention takes place more often than one in which a crook pilfers straight from inside a post bureau. Precautionary standards have been instituted inside the main systems of the postal structures to check and optimistically avert interception of correspondence. Comparable measures have been implemented at the corresponding Internet set-up level. Checks at the terminals conversely differ extensively from great to absent, especially at the house computer system. Customer confidentiality is currently the most publicly known security concern having replaced stealing and deception as the key issues in e-commerce. The attacks by online thieves confirmed that commercial sites did not keep sufficient security shield and invasion revealing measures (Bidgoli, 2004). The attackers who managed to get through to these sites had the capacity to execute an information reliability attack on the companies with weak systems for a lesser amount of time. Firms were spared for the simple reason that the attackers preferred not to hit them that way. Scores of computer systems get connected to the net on a monthly basis. Awareness of many consumers on the security susceptibilities of their computer is unclear. Furthermore, dealers in computer programs and hardware, in their mission to ensure that their inventions can be effortlessly installed, will export software with security element disabled (Hughes, 1995). Usually, activating security elements calls for thorough reading of written manuals by the technicians. The less informed non-technical consumers do not make efforts to activate the security elements. This creates a valuable opportunity for invaders. Much as security resolutions for computer programs and hardware available guard the community’s computer systems, they are not fully effective. Consumers that procure firewall programs to protect their systems may come to discover that there is a clash with other programs on their computer systems. To eliminate the clash, the consumer deactivates adequate facilities to make the firewall program ineffective. This leaves the computer system vulnerable to the malicious attacks by scandalous people (Hughes, 1995). The online criminals use the weaknesses to penetrate the systems and hack sites with crucial information. In another scheme, the invader observes the information transmitted between the customer's system and the server. He gathers information about the consumer or robs private information, for instance credit card digits and passwords. There are areas in the system where this hit is more realistic than others. If the invader takes position at the center of the system, then inside the range of the Internet, this attack becomes impossible. An application from the customer to the server system is reduced to minute bits known as packages as it leaves the customer’s system and is recreated at the server. The packages of an application are sent to diverse directions. The invader cannot enter all the packages of an application and cannot crack what communication was sent (Hughes, 1995). Bugs and Trojan horses Bugs, commonly referred to as computer viruses are the most famous menace to user systems. Viruses are malicious computer programs that tend to hinder the normal functioning of a computer system by tampering with other programs installed in the same system. They are efficient since they attach their files to the other programs the user of the computer may have installed in his system (Hughes, 1995). Weakening a computer system calls for entrance to the system and no unique right is required to write a cryptogram into susceptible system part. E-commerce Security elements E-commerce protection policy covers two issues: safeguarding the reliability of the company’s system and its interior structures; and with achieving transaction safety between the client and the company. The main instrument companies employ in protecting their internal systems is the firewall. This is computer software that permits only those guest users who meet particular requirements to enter a protected set of connections. The original blueprint was intended to permit only certain services for instance mails (Kidd, 2000). The firewall is currently the major point of protection in the e-trade security infrastructure. Security of business deals is vital in strengthening customer trust in a particular e-Business web site. Business security is determined by the firm’s capacity to guarantee confidentiality, dependability, reliability, accessibility and the preventing of malicious disturbances. Privacy of online business dealings can be faced with the threat of illegitimate system observation by computer programs sniffer software. There are countless forms of resistance against this danger for instance encryption and changed system topologies. Transaction privacy calls for the elimination of any hint of the real business information from intermediary web sites. Encryption is the most universal technique of guaranteeing privacy and makes use of such technologies as the digital signatures (Kidd, 2000). Conclusion In conclusion, online trading popularly referred to as e-Commerce is facing a difficult future as far as security threats are concerned. With technological understanding growing rapidly, and its extensive accessibility through the internet, malicious people are becoming increasingly complicated in the fraud and intrusions they can execute. Fresh lines of attack and susceptibilities only become apparent after the person behind them has exposed and taken advantage of them. There are numerous protection policies which any e-commerce source can initiate to trim down the menace of intrusion considerably. Understanding of the dangers and the installation of multifaceted protection procedures, comprehensive and open confidentiality strategies and tough verification and encryption precautions will go a long way in ensuring that the danger of concession is kept negligible. This paper has explained the chief participants in e-commerce and safety attacks and protection measures in an online business system. The two major dangers facing the e-commerce consumer -server model are bugs and Trojan horse software. Bugs, commonly referred to as computer viruses are basically troublesome in character but the Trojan horse software is the most severe menace since they not only make possible breaking into another computer system, they as well allow information reliability invasions. Current technical know-how enables for safe site plan. It is up to the information technology improvement departments to be both prudent and reactive in managing safety threats. It is the customer’s duty to be watchful when shopping on the internet. References Bidgoli, H. (2004). The Internet Encyclopedia. (Vol 1) Hobken. John Wiley & Sons, Inc Hughes, L. (1995). Actually Useful Internet Security Techniques. Indianapolis. New Riders Publishing Kidd, P. (2000). Key Issues Applications Technologies. Amsterdam. IOS Press Mehd, K. (2004) E-Commerce Security: Advice from Experts. Hershey. Cybertech Publishing. Qin, Z. (2009). Introduction to E-Commerce. New York. Springer Berlin Heidelberg Simmons& Simmons (2006) The Secure Online Business Handbook: A Practical Guide To Risk Management And Business Continuity (4th Edition). Derby. Kogan page limited Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Security Issues in E-Commerce Coursework Example | Topics and Well Written Essays - 2250 words, n.d.)
Security Issues in E-Commerce Coursework Example | Topics and Well Written Essays - 2250 words. https://studentshare.org/e-commerce/2079513-e-commerce-issues-paper
(Security Issues in E-Commerce Coursework Example | Topics and Well Written Essays - 2250 Words)
Security Issues in E-Commerce Coursework Example | Topics and Well Written Essays - 2250 Words. https://studentshare.org/e-commerce/2079513-e-commerce-issues-paper.
“Security Issues in E-Commerce Coursework Example | Topics and Well Written Essays - 2250 Words”. https://studentshare.org/e-commerce/2079513-e-commerce-issues-paper.
  • Cited: 0 times

CHECK THESE SAMPLES OF Security Issues in E-Commerce

E-commerce Activities at British Oxygen

This raises various accountability issues in case of accidents and mishaps as well as commercial controls.... … The paper "e-commerce Activities at British Oxygen" is a good example of an information technology case study.... nbsp;Business-to-consumer (B2C) e-commerce is the commotion in which consumers acquire information and procure products by means of Internet expertise (Aizen, 2002).... The probable profits of e-commerce have been extensively publicized (e....
11 Pages (2750 words) Case Study

General Principles and Issues of E-Commerce Management

… The paper “General Principles and Issues of e-commerce Management” is an exciting example of term paper on e-commerce.... Based on the issues concerning e-commerce the purpose of this report is to discuss the Management and principles of e-commerce in general.... The report will also highlight the challenges faced by e-commerce.... The paper “General Principles and Issues of e-commerce Management” is an exciting example of term paper on e-commerce....
9 Pages (2250 words) Term Paper

Electronic Commerce in Contemporary Business and Government

… The paper “Electronic Commerce in Contemporary Business and Government” is an informative variant of the essay on e-commerce.... The Internet has built an innovative economic system, the e-commerce market, as well as it has turned out to be a huge virtual street in the world.... The paper “Electronic Commerce in Contemporary Business and Government” is an informative variant of the essay on e-commerce.... The Internet has built an innovative economic system, the e-commerce market, as well as it has turned out to be a huge virtual street in the world....
7 Pages (1750 words) Essay

The Impact of Security on E-Commerce

… The paper "The Impact of Security on e-commerce" is a great example of a report on e-commerce.... e-commerce has become the central element in the contemporary business environment.... e-commerce services present quite a number of benefits both to individuals and organizations.... The paper "The Impact of Security on e-commerce" is a great example of a report on e-commerce.... e-commerce has become the central element in the contemporary business environment....
10 Pages (2500 words)

Components, Features, and Development of Mobile Commerce Applications

… The paper “Components, Features, and Development of Mobile Commerce Applications” is an exciting variant of the case study on e-commerce.... The paper “Components, Features, and Development of Mobile Commerce Applications” is an exciting variant of the case study on e-commerce.... M-commerce is referred to as the e-commerce of the next generation and it allows its users to easily access the internet without a need of finding the plug-in....
6 Pages (1500 words) Case Study

The State of E-Commerce in the UAE and Challenges Facing E-Commerce Start-Ups

… The paper “Thе Stаtе of Е-Соmmеrсе in thе UАЕ and Сhаllеngеs Fасing Е-Соmmеrсе Start-Ups” is a convincing example of the literature review on e-commerce.... The paper “Thе Stаtе of Е-Соmmеrсе in thе UАЕ and Сhаllеngеs Fасing Е-Соmmеrсе Start-Ups” is a convincing example of the literature review on e-commerce.... e-commerce entails buying or selling online.... e-commerce has its fair share of benefits and drawbacks and businesses should be aware of this....
10 Pages (2500 words) Literature review

E-Commerce in the Global Business Environment

… The paper “e-commerce in the Global Business Environment” is an impressive variant of the assignment on e-commerce.... The paper “e-commerce in the Global Business Environment” is an impressive variant of the assignment on e-commerce.... -commerce websites can be accessed globally and thus, this e-commerce website will be keen to conduct business where there is no limitation to free internet access....
6 Pages (1500 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us