1. Before starting any E-commerce business the owner have to make sure that his/hers website has all kind of security systems which provide absolute safety for customers and the owner himself. Nowadays, online robberies have become the most common. Every single day, hackers attack thousands of web sites in the hope of a good profit. among the most important elements of the protection should be as following: • Security Hosting supposed to include Bandwidth (to maintain E-commerce traffic), a large Disk Space (to be able to place more products and store business and customer’s information), Firewall (supposed to be strong in order to reject any external threats), 99, 9% of all security system updates (to be sure that your website is fully secured). • SSL Encryption is a system that codes and decodes customers’ personal information and information about the transactions. In other words, this system makes data unreadable for any external sources. • PCI Compliance is responsible for safe credit card transactions. to comply with this system every online business supposed to build and maintain Secured Network, protect Cardholder Data, follow Information Security Policy, regularly testing Networks, maintain Vulnerability Management Program. • DDoS protection and mitigation service - Installation of this system saves a lot of money for other security aspects. This cloud-based system helps protect website from hacker attacks, even the most powerful ones. • Sensitive Data Storage - The online business should not to store sensitive data on their hard drives. Even the strongest security systems could be hacked and all the data will be gone. Nowadays, it is forbidden by Informational Security Policy to store all sensitive data at one place. F... ... middle of paper ... ...egally and ethically clear); and this is create “gray” shadows of e-commerce. E-businesses have to inform their customers of all rules and regulations, product full information and product safety confirmation. Judicial comity enforces other countries’ legal institutions to exercise “clear” e-commerce laws in order to practice “friendly” international business relationships. Each e-commerce enterprise has to be registered and precede all legal procedures. E-businesses have to obey the tax regulation complex such as Income Taxes, Transactional Taxes, Custom Duties, and Property Taxes. Income Taxes - taxation for all company’s income. Transactional Taxes imposed by the Government on the sale and use of any goods and services by the company. Custom Duties – taxation on imports into the country. Property Taxes – taxation of real estate and any other personal property.
URL encryption is a method that prevents your ISP, network administrator, or other intermediaries from easily tracking and logging the sites that you visit. This prevents companies from gaining information on your surfing habit and purchasing habit on the net. Companies have been accumulating data on us for years without our permission. Once these companies or have the information they can make money on us by selling the information to other companies or as I stated the government. Why should they make money on our information without our consent? The URL encryption also protects the user from potential Internet pr...
E-commerce Law Report. 4(4), pp23-24.
The digital era arrives. Blue Book information editorial board and Social Science Literature Publishing House (2010) pointed out that “China's e-commerce transaction volume reached 3.85 trillion yuan in 2009”. Utilisation of e-business services was also high amongst Hong Kong people. About 98.3% of all persons had used e-business services such as Octopus Card and Automatic Teller Machine (Census and Statistics Department, 2009). One of the pitfalls for the development of e-business, however, is the concerns on consumer privacy. According to Green’s (1999) survey, 54% of respondents had decided not to purchase a product because of a concern on overuse of personal information collected in the e-business transaction. This essay examines the circumstance on protection of consumer privacy in e-business. As e-business is surging by astronomical number and consumer information is a kind of property, the protection of consumer privacy in e-business becomes significant. This essay begins with the causes of the problem, and then move on to analyse the effects. Lastly, the essay concludes with the solutions to the problem.
Data encryption refers to the process of transforming electronic information into a scrambled form that can only be read by someone who knows how to translate the code. In nowadays business world, it’s the easiest and most practical way to secure the information that we stored and processed, and it’s significant for our sensitive information. For example, as electronic commerce is popular now, the vendors and retailers must protect the customers’ personal information from hackers or competitors. They also have many business files or contracts that need to be strictly protected. Without data encryption, these important information may fall into wrong hands and be misused by others. Besides, data encryption may be used to secure sensitive information that exists on company networks, or create digital signatures, and help to authorize in business. No one should underestimate the importance of encryption. A little mistake in encryption may make sensitive information revealing, or even result in illegal and criminal accuse.
On 5 October 2009, computer equipment from a network data closet was stolen from BCBST. The items stolen were 57 unencrypted hard drives which contained over 300,000 video recording and over one million audio recordings. According to Whitman & Mattord (2010), confidentiality, integrity, and availability makes up the C.I.A triangle which is the basis of Committee on National Security model for information security, an industrial standard, (Whitman & Mattord, 2010). Confidentiality can be a synonym for encryption but also means only the people with the correct permission can access the information. One of the major security issue is the hard drives were not encrypted. The hard drives should be encrypted to prevent people from reading the information the computer. Software can be purchased which will encrypt files on hard drive with such as Folder Lock, SensiGuard, Secure IT, and more. There are open source encrypting software which are free for use which could have been used. If the hard drives were not needed, the data should hav...
The ability to conduct warfare through technological methods has increased information security awareness and the need to protect an entity's infrastructure. Subsequently, cyber warfare produces increased risk to security practitioners that employ technology and other methods to mitigate risks to information and the various systems that hold or transmit data. A significant risk to information lies in the conduct of electronic commerce, hereinafter called e-commerce. E-commerce is the purchasing or selling of goods and/or services through the internet or other electronic means (Liu, Chen, Huang, & Yang, 2013). In this article, the researchers will discuss cyber warfare risks, present an evaluation of established security measures, identify potential victims of identity theft, and present an examination of the security of e-commerce companies....
Data encryption refers to the transformation of data into a structure that makes it unreadable by anyone without a secret decryption key. It ensures that messages can be read only by the planned recipient. Encryption is the procedure of obscuring information to create it unreadable without special information. Only organizations and individuals with an abnormal need for secrecy have actually made good use of it. Nowadays, encryption is one of the most important technologies for maintaining your privacy and the security of important information. This helps out greatly especially when E-Commerce is being used.
From PayPal to Debit cards, from EFT to Credit cards, this modern world has been inundated with new ways of making business transactions. Instead of the conventional use of dollars and nickels, now there are electronic payment systems. These types of systems allow for better trust and acceptance between consumer and businesses. In the traditional way of buying a product, one would see a product in person, and pay for it with cash or credit. In e-commerce, the business uploads images of its products online and it enables its customers to shop it using any type of electronic payment system.
Without proper protection, any part of any network can be susceptible to attacks or unauthorized activity. Routers, switches, and hosts can all be violated by professional hackers, company competitors. In fact, according to several studies, more than half of all network attacks are waged internally. To determine the best ways to protect against attacks, we should understand the many types of attacks that can be instigated and the damage that these attacks can cause to data. The most common types of attacks include Denial of Service (DoS), password, an...
Privacy exist wherever personal information or other sensitive information is collected, stored, used, and finally destroyed or deleted – in digital form or otherwise. The challenge of data privacy is to use data while safe-guarding individual's privacy preferences and their personally identifiable information. The fields of computer security, data security, and information security design and utilize software, hardware, and human resources to address this issue.
As established by PCI DSS, our company needs to include different aspects to securely handle and store credit cards information. From the perspective of the Information Security Analyst we must to consider the following points:
E-business is a wider concept that takes into account all the aspects of use of information technology in business. Apart from buying and selling, it also includes servicing customers, collaboration with business partners, and engages incorporation across business processes and communication within the organisation (Rowley, 2002)
E-commerce means that the company runs their business online, not like the traditional business way. We have to go the shopping mall or store to get goods that we need, E-Business is the enabling of electronic communication between any two or more participants in a business relationship. It helps companies capture abroad business field, cost saving, and market opportunity. E-commerce is an important factor that is making people’s lives more efficient.
E- Commerce is a phenomena that is emerging rapidly between businesses all over the world, and it has affected the businesses at all sizes in many aspects.
Rayne, PB, Kulkarni, P, Patil, S & Meshram, BB 2012, ‘Authentication and Authorization:Tool for Ecommerce Security’, Engineering Science and Technology: An International Journal, vol. 2, no. 1, pp. 150-157.