Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
The thesis about e-commerce security
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: The thesis about e-commerce security
Introduction
E-commerce i.e. the exchange of goods and services on the internet has a number of retail brands that have an online presence. Business to business transactions are also a part of e-Commerce.
The recent trend of multichannel retail allows a number of additional transactions like purchasing online and pick up in store along with the traditional features of buying online and delivering services.
The paper gives an overview of privacy and security of e-commerce. It discusses various risks associated with all e-commerce web server and states the solution to obtain a secure system. It further discusses the security overview, common security threats and the technological solutions.
Risk of Ecommerce
With time, the methods used by ecommerce sites to use and store credit card information has become further sophisticated than the earlier days of online shopping. This has helped online shopping conquer one of its utmost obstacles, consumer trust. Now people feel more secure in shopping online than they have in the past. Sadly, the methods used by cyber criminals try and steal the customer’s data have made it easier for them to conciliate the system.
Credit card credential theft: Credit card security is one of the major components of e-commerce. Most sites are vulnerable to the following types of attacks:
• SQL Injection
• Session Hijacking
• Malware
• Cross-site Scripting
• Path Traversal
Business Interruption: A competitor or an attacker can compromise the system to use the resources of the server like bandwidth, processing power, disk space ect.
It leads to denial of services and prevents the customer from reaching the website leading to a loss in revenue and customer website relations.
Brand D...
... middle of paper ...
...a computer system.
Hackers with a criminal content are called crackers. Hackers may be hired by corporations to find weakness, cause harm or disrupt a system.
• Cyber vandalism is referred to an intentional disruption of functionality or destruction of a website.
• Data breach is the loss of corporate information of an organization to an outsider
• Credit Card Fraud.
• Spoofing is misrepresentation of someone as someone else. Spoofing of website is called pharming. These are carried out by hacking the DNS server.
• Denial of Service attacks- flooding of website with useless traffic to overwhelm network.
Technology Solutions
• Protecting network through firewall
• Securing Channels of communication using SSL, S-HTTP, VPNs.
• Protecting Internet communications through encryption.
• Protecting Servers and clients
Site Security Tools
iPremier once suffered a denial of service attack on 12th January 2007 that almost rendered the company’s site nonfunctional (Austin, 2007). Denial of service attack can be defined simply as an attempt to prevent the availability of computer resources to its legitimate users (Encyclopedia Britannica). This is achieved through halting an internet site or service from working efficiently, temporarily or permanently. Hackers had launched the denial of service attack on iPremier but luckily it was launched either by a script-kiddie or a competitor trying to ...
Therefore, cyber-attacks causing tremendous damage to organizations along with customer spreading fear among
...rtising medium but now things has changed around, people used the website to perform their businesses and most of the consumers rely on Internet transactions, therefore, computer expertise used technology which is called phishing to trick computer users and reveal personal information as well as financial information, in this case attackers they use this technology to steal from different customers.
The problem causes the harm to companies’ image, the troublesome to consumers, the loss of confidence in the rule of law and the increase in the awareness on privacy and respective solutions are provided to tackle the consequences. Consumer privacy is an essential element in e-business. To further expand the utilization of e-business, each party should bear the responsibility to respect the privacy and to respect human rights.
Recently, many people have focused on credit card security. The credit card as a payment and financial instrument, it does separate purchases and payments (Berthoud and Kempson 1992). Many banks provide many kinds of credit cards, for example, LLOYDS bank actually have 10 types credit cards for different customers. However, when people are enjoying the convenience for using a credit card, they almost forget these potential problems on credit card security. Especially, online credit card fraud, organized crimes for credit cards and lost/stolen cards, when people found someone stole their accounts, maybe it was too later. Therefore,
Simply put, cyber squatting means the registration of a domain name in violation of a trademark or business name or other intellectual property of its owners. This includes the registration of a name deceptively similar to such business name or trademark. Usually, domain squatters register these domains before the company does and offer these domain names to such business houses at a premium 1.
Internet Retailing or �e-retailing� as is usually referred to as covers retailing using a variety of different technologies or media. It may be broadly be a combination of two elements.
The risk of identity theft in ecommerce for consumers and online merchants is a growing serious crime that is on the rise. I am sure that we have all got an email from someone we know saying they were stranded in another country and they had got robbed, requesting for you to send money. Or maybe you gotten an email from your bank or one of your online account requesting that you update your info by reply to email. Or maybe you gotten an email saying that you have won some money but to get it they need your bank account and routine number. I recently had my own first-hand experience with identity theft this pass holiday season.
The term “hacker” has been in use since the early 1980’s due to mass media usage to describe computer criminals. The use of this term is vastly used by the general population and most are not aware that there are different meanings to the word. People within the computing community especially within the programming subculture emphasize the use of the term “crackers” for computer security intruders (cyber criminals). Early hackers rarely used their skills for financial gain as a motivation for their criminal behavior in that time cybercrime was infantile and largely seen as a practical joke or game by those who committed it. Bob Thomas created the first credited computer worm n...
The advent of technology, in the form of credit card, brought in convenience and made life simpler for us, but along with it came the Pandora’s Box. While credit cards have made life easy for us, they have also managed to make life easy for the crooks. While enabling us to purchase things we fancy whilst seated on our couch, it has on the other hand made it easy for fraudsters to guzzle away money that is not truly theirs.
The lack of awareness of data security is a contributing factor to the rapid increase of successful attacks conducted by people known as hackers. So we ask ourselves, who are these hackers and why do they do what they do? Black hat hackers also known as crackers are people who usually conduct planned attacks that are designed to steal critical information and destroy data. They gain un-authorized access to systems with the intention of causing malicious damage.
Cyber crime has become an important concern for not only the business firms, government, law enforcement agencies but also for the common people because these kinds of issues are related to the consumer’s day-to-day activity (Polivanyuk, 2005). Due to these types of crimes, consumer’s money, children, business organization’s integrity, consumer and company’s privacy, etc. are in danger.
Electronic Commerce as popularly as E-commerce has become a big deal in our growing economy due to the increase use of online systems. E-commerce now of the fastest growing business in the world. The technology has change the way of business. Business that have physical location have now made it an effort to focus their online business. It is the new sort of business platform where you can make use of different technologies like electronic data interchange or transfer document electronically. Online business is an effective of sales.
E-commerce or electronic commerce is carrying out business communications and transactions through computers and over networks. It involves buying and selling of goods and services through digital communication. E-commerce also includes transactions on the World Wide Web and the Internet and means such as electronic funds transfer, smart cards and digital cash. E-commerce covers outward facing processes that interact with customers, suppliers and external partners such as sales, marketing, delivery, customer service, purchasing of raw materials and supplies for production.
E-commerce means that the company runs their business online, not like the traditional business way. We have to go the shopping mall or store to get goods that we need, E-Business is the enabling of electronic communication between any two or more participants in a business relationship. It helps companies capture abroad business field, cost saving, and market opportunity. E-commerce is an important factor that is making people’s lives more efficient.