Shopping for Online Security

1105 Words3 Pages

Shopping for Online Security

Since the early 2000’s, people have been shopping online. More and more it has grown where now people are constantly online doing their shopping. Anything and everything is available for purchase. From a piece of fruit from around the world; to a vehicle that is a few states away. Whatever your heart desires, if you have the money for it, you are most likely going to be able to buy it. What happens though when someone else grabs ahold of your information while you are shopping online? It is a lot less noticeable than if you were at the supermarket down the street. There it would be much easier to notice if someone takes your wallet. Online someone can just hack into your account without your knowledge and take all of your information. They could go on an online shopping spree. If this were to happen to you, you’re going to go after the site that let your information slip so easily. This could ruin a business for good. Why then, would a business risk even having an online store, what can they do to protect their consumers and themselves, and what can the consumer do to protect themselves?

Electronic commerce- E-Commerce- is “Business-to-consumer and business-to-business commerce conducted by way of the internet or other electronic networks.” (Merriam-Webster) The online retail business is very profitable. Anyone and everyone can go to a website to view their favorite products and make a purchase. This makes selling products much easier and less expensive than setting up a building to hold those products they wish to sell. This building is much less remote than the online store which will lead to less profit in the long run. For the small business that is just starting out, or even the medium sized b...

... middle of paper ...

...on and decryption algorithms are the same. With asymmetric- public-key- algorithms, there are two different but similar keys. One key is made public and one key is kept secret. In reality, symmetric and asymmetric key algorithms are used together. The reason being is that the symmetric system is much faster. A random key is then generated and encrypted using the asymmetric algorithm. The user then uses the first key that was populated and with the asymmetric algorithm the data is decrypted with the newly created key.

Cryptosystems are not the only component of cryptography. The main areas are cryptosystems, modes, protocols, and key management. Cryptosystems are the basis for cryptography and that it refers to the algorithms to secure data. Modes refer to how the algorithms are used and used to manage the algorithms that are longer than a single block

ingle block

Open Document