Securing Higher Grades Costing Your Pocket? Book Your Assignment at The Lowest Price Now!

Information Security In E Commerce

tag 170 Download8 Pages 1,806 Words tag Add in library Click this icon and make it bookmark in your library to refer it later. GOT IT
Jacob Galbraith Student Reviews Student Reviews Student Reviews Student Reviews Student Reviews 5/5 hire me
Question: Information security and buyer protection and the challenge of data protection are expanding in degree and trouble. While online businesses have since a long time ago expected to shield their clients' security and private data, changes in information transforming and plans of action present new dangers and new regulations.   As part of your report, you are required to assess different protection and security issues experienced by customers and online businesses, including security strategies by which these issues are currently being addressed.     Answer: Introduction Privacy and security in the realm of e commerce are the two critical factors of concern that determine the course of online business. E commerce security is considered to be a small part of the wider dimension of information security framework. There are two main areas of focus namely computer security including all kinds of internet thefts and data security that pertains to privacy issues of personal data (Udo, 2001). The security of e commerce is the highly visible form of security component affecting daily routine of the payment interactions and transactions. The thesis developed in the study would dwell deeper into the dynamic dimensions of e commerce security namely authenticity, confidentiality, non repudiation, integrity, privacy and availability (Ghosh, 1998). Hence, the realm of e commerce security is an essential requirement for all the managements and technical domains for effective transactions over the internet. The study would discuss about some of the pertinent security issues that are posing threat to the privacy of the customers. The security issues are also discussed with some technical jargon used. Another area of discussions would be the measures that can be taken to prevent this threat and risk over e commerce in the form of information security. The study would also discuss some of the major laws that support the cause of business management and online transactions. Threats to e commerce   The main security crunches and the relevant issues pertain to verifying the identity of the person involved in business transactions and ensuring correct and timely delivery of messages without tampering. Networks at both the ends of customers and business vendors are at risk with hackers demanding ransoms to reveal credit card information (Ghosh, 2001). But the conflict of ease of use versus the security is heavier on the side of convenience. The virus attacks against the software Microsoft Outlook that there have been quick proliferation of these viruses and worms (Hassler, 2002) throughout the internet network. All the sites that are directly, or remotely associated with e commerce site must adequately arrange security services due to widespread attacks of Distributed Denial of Service. Code Red worm and NIMDA have successfully penetrated the system and have leaked sensitive security information (Awad, 2004) without the permission of the customers. Viruses and Trojan horse programs are main threats to the client server model of e commerce websites. Viruses are naturally disruptive but Trojan horse programs facilitate breaking into the system in addition to permit the attacks of data integrity. Therefore, Trojan horses are serious threats that remotely control some of the programs and are difficult to resolve. Spamming is another security threat that is sending of unconsolidated email threats (Belanger, 2002) and mailers to individuals leading to situations of email bombing. Hackers also place software agents to get into the system. The unauthorized access security measure is the illegal access into the system with active and passive modes. The passive mode is overhearing of some communication or overlooking some transactions while active mode refers to modification of the information or intended changes in the message. It also includes forms of masquerading that is to send messages in a fake form in the terms of spoofing. Hackers also take advantage of the operating system security holes. Theft and fraud cases also overpower the e commerce world of online business. In technical terms, there are some other attacks such as smurf attacks (These are ICMP attacks where a large number of IP packets are send with fake source address quickly using up network’s bandwidth and easing up breach to the required destination), teardrop attack (sending of distorted fragments with oversized and overlapping payloads along with a bug leading to improper handling of fragments and crashing them ultimately), phlashing (this is a form of permanent denial of service damaging the system to a greater extent that would require reinstallation of even the hardware and sometimes making it completely unusable) and brute force attacks (to defeat a cryptographic scheme), phishing attacks (it is a criminally fraudulent process to acquire sensitive information in e communication mainly targeting online auction sites, bank customers, service providers and online retailers), social engineering (manipulating people by pretexting, phone phishing, baiting with Trojan horse, interactive voice recording) (Sindre, 2005).   Social engineering is an open area of research nowadays with various mental models and motivations. The management of software is also another pertinent issue with the e commerce security guidelines and policies. There have to be balance among all the domains of data on e commerce websites and without the accomplishment of this equilibrium, e commerce security will remain as an issue of concern and a problem of all the times. There can be numerous measures that can be taken in order to mitigate the risks associated with the e commerce security and threats. Encryption in the form of public key or private key can be used to secure the arrangements in the process of transactions. An algorithm is a key for encoding and decoding the message (Ford, 2000). The process of key protects the contents of the message and the associated technology of digital signatures can prove the true identity of the authorized sender too. In other terms, it is a digitally signed certificate for electronic identification. There are certain laws in UK pertaining to electronic signatures like Electronic Communications Act of 2000. Digital signatures are replaced by electronic signatures and are validated by
OR

With time, MyAssignmenthelp.com has become one of the best college essay writing services. Our all rounded services give students the confidence to overcome assignment related issues. Our services are fast enough to meet most urgent deadlines. We are capable of delivering fast essay writing services with the help of our specially designed provisions and writers' teams. Our urgent essay help services guarantee most rapid delivery of assignment solutions. Some of our most popular essay services are application essay help, exploratory essay help, literary review essay help and argumentative essay help.

Most Downloaded Sample Of Management

Toulin Method Of Argumentation

Download : 279 | Page : 1

You are required to write a researched argument essay that convinces persuades the reader of your position / stance. This is an academic, researched and referenced document that demonstrates your understanding of the objectives of the course. The structure of the argument will follow the TOULMIN METHOD of argumentation.

Read More arrow Tags: Australia Arlington Management University of New South Wales 

Consumer Behavior Assignment

Download : 208 | Pages : 9

Executive Summary The purpose of this report is to elaborate the factors which are considered by individuals before selecting an occupation. Choosing an occupation is indeed a major decision of everyone’s life and it does give a shape to where he would be heading in the course if time. The report begins with a list of various occupations which have been going since the human civilization started though it has indeed changed its form to...

Read More arrow Tags: Australia Arlington Management University of New South Wales 

Internet Marketing Plan For River Island

Download : 369 | Pages : 13

Introduction With the increase enhancement in the field of technology, it has been considered essential by the businesses to implement such technology in their business processes. Further, the increasing demand from the customers regarding the better quality of products and services delivered to their doorstep has also necessitated for the businesses to implement the e-business strategy in their business processes. E-business which is common...

Read More arrow Tags: Australia Arlington Management University of New South Wales 

Strategic Role Of HR In Mergers & Acquisitions

Download : 330 | Pages : 9

Executive Summary In a merger & acquisition, role of an HR has emerged as a very critical function. At each stage of merger and acquisition process, HR plays a strategic role. The importance of role of HR part in integration of the merged companies should not be taken lightly and should be handled very carefully and with due planning. At pre acquisition stage, due diligence should be taken before the start of the process and HR must carve ou...

Read More arrow Tags: Australia Arlington Management University of New South Wales 

Relationship Between Knowledge Management, Organization Learning And HRM

Download : 360 | Pages : 7

Introduction In this competitive business environment where every business organization is trying to attract the customers of each other, it becomes essential for these organizations to remain competitive by innovating new ideas and thoughts, so that value added products and services can be provided to the customers. The motive of such organization in providing value added services to their customers, require their employees to be quite effect...

Read More arrow Tags: Australia Arlington Management University of New South Wales 
Next
Free plagiarism check online Free plagiarism check online on mobile
Have any Query?