Because innovative technologies have transformed the world, and created an easy access to computers, the Internet has revolutionized traditional shopping, from a brick-and-mortar status to E-commerce. Today, a consumer can avoid errands and buy almost everything without living the comfort of his or her home. The author of this paper, ventured in the experience as an online naïve customer, provides a guideline of how-to-shop-safely-on-line for the first time. First, the paper covers the basic precautions and steps of where to search for buying a camcorder online from a specific merchant, a shopping portal, and a comparison-shopping site. Secondly, the author compares three selected Web sites and focuses on the purchase itself.
The authentication protocols (EAP Protocol) used in WiMAX help relieve this threat. (EAP Protocol forces mutual authentication, therefore the subscriber station would send an authentication message to the rogue base station. This does not completely alleviate the threat of rogue base stations, but it does make it more difficult.) Denial of Service (DoS) attacks DoS attacks are defined as an effort to make a computer resource unavailable to its users. (Hackers usually use this type of attack on web servers for banks, credit card payment gateways or DNS root servers.)
People are still concerned about giving their information online. Therefore it is up to the retailers to assure their customers that making a purchase online is safe and secure. The use of 56-bit and 128-bit encryption technology has definitely helped ease the minds of customers by offering them a sense of security. However, there is no gaurantee that this security measure can prevent hackers from cracking the code if they really wanted to. In the future, there will be a greater dependence on the Internet than ever before, and not just for e-commerce, but also for control of critical infrastructure (power generation, communications, transportation, etc.).
Banking services through the Internet is a way to keep existing customers and attract others to the bank. This paper online banking is defined as " an Internet portal , through which customers can use different types of banking services ranging from bill payment to making investments " ( Pikkarainen et al. , 2004) . Compared with the traditional approach , online banking is a simple inexpensive way to bank , changing customized information and buying and selling goods and services from anywhere at any time. Despite the many benefits of this service to the bank and its customers , remains a double-edged sword and is not used by all customers, due to the increased distance between the bank and customers can take lack of confidence and in... ... middle of paper ... ...s of online banking: The account can be accessed from any Internet -enabled device in the world.
Data Encryption The definition and importance of data encryption Data encryption refers to the process of transforming electronic information into a scrambled form that can only be read by someone who knows how to translate the code. In nowadays business world, it’s the easiest and most practical way to secure the information that we stored and processed, and it’s significant for our sensitive information. For example, as electronic commerce is popular now, the vendors and retailers must protect the customers’ personal information from hackers or competitors. They also have many business files or contracts that need to be strictly protected. Without data encryption, these important information may fall into wrong hands and be misused by others.
Data Encryption Shiqi Luo(701794770) The definition and importance of data encryption Data encryption refers to the process of transforming electronic information into a scrambled form that can only be read by someone who knows how to translate the code. In nowadays business world, it’s the easiest and most practical way to secure the information that we stored and processed, and it’s significant for our sensitive information. For example, as electronic commerce is popular now, the vendors and retailers must protect the customers’ personal information from hackers or competitors. They also have many business files or contracts that need to be strictly protected. Without data encryption, these important information may fall into wrong hands and be misused by others.
The widespread use of strong encryption technology is essential to protect consumers and businesses against spies, fraud, and theft over the computer networks used in electronic commerce. The federal government has just announced a new policy that will maintain restrictions on the export of encryption stronger than 56 bits. Stronger encryption technology may be exported only to subsidiaries of U.S. companies in most countries, or to certain economic sectors in 42 countries (insurance, banking, or online merchants). Some law enforcement interests support legislation that would force U.S. citizens and residents to give the government access to the secret keys that read encryption. Government-mandated key recovery and controls over the strength of encryption are a grave danger to the privacy of law-abiding citizens and businesses, not only in the United States but all over the world.
Before issuing a SSL certificate, the requestor’s identity, ownership of domain name and business existence will be authenticated therefore it is difficult for criminals to acquire a SSL Certificate. Figure 3a: SSL Certificate authentication between client and server Figure 3b: Examples of SSL Certificate issuing authorities 2. Raising Public Awareness of Pharming Attack Apart from the technology aspect, raising the awareness of Internet users also plays a significant role in dealing with the problem of Pharming. Many general computer users do not h... ... middle of paper ... ...er than attacking the DNS server, installing an anti-virus software and a secure browser can help protect users from connecting to the suspicious site configured by the hacker. Once a user enters an insecure Web site without realizing, the anti-virus and browser will block this malicious Web site automatically so it is a good practice to keep both up to date.
A hacker may also want to penetrate the web server of the company wanting to have some fun by defacing the company's website and replacing the first page or number of them with his own. Therefore there are different types of intrusion methods that a person will follow to gain access to a network. A common method is password sniffing. It's not a highly sophisticated method of gaining access to system on a computer network but rather allows an attacker to gain access to quickly to hundreds of hosts. Once the passwords are obtained it is difficult to spot the attacker because they appear as a normal user.
The proxy server effectively hides the true network addresses. In practice, many firewalls use two or more of these techniques in concert. A firewall is considered a first line of defense in file and network security. For greater security, data should be encrypted. (www.webopedia.com) Symmetric and asymmetric encryption Symmetric encryption is a type of encryption where the same key is used to encrypt and decrypt the message.