Preview

P3 Explain The Potential Risks To An Organisation Of Committing To An E Commerce System

Satisfactory Essays
Open Document
Open Document
522 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
P3 Explain The Potential Risks To An Organisation Of Committing To An E Commerce System
P3 – Explain the potential risks to an organisation of committing to an e-commerce system
Hacking - This is associated with malicious programming attacks on the Internet. For example personal data can be stolen online, things like your credit card details so the hacker can use that to purchase things. If the hacker gets access to the site and breaks the encryption then they can access customer details.
Product Description Problems –
Most customers worry that the product description may be wrong and not accurate, especially for colours of an or certain features. The quality of the product as shown may be just a new picture of it when the seller may be selling a slightly more damaged and used product. E-Commerce sites may exaggerate the products in order to try and get people to purchase the products.
Viruses -
A virus is a type of malware that can damage your computer system. A virus can damage your manufactures computer system by destroying it and change how it works. A Trojan is a hacking program and can damage your manufactures computer system by using executable files/programs which once opened will perform certain 'actions' to damage your system. Another example of a virus is a worm, which is a small program that moves through a computer system randomly altering or overwriting pieces of data as it moves.
More on Viruses & Firewalls -
The site can be hacked and data can be stolen and utilised for their own reasons like getting the credit card details of customers and using it to buy items also with the confidential data.
What measures can be taken to protect the web server holding your Manufactures e-commerce website from viruses?
The measures could be to use firewalls; a firewall is either a software application or a hardware device. It acts as a shield between your computer/s and the rest of the Internet. The purpose of this is to control and keep safe of all the incoming and outgoing network traffic by carefully checking the data packets and

You May Also Find These Documents Helpful

  • Good Essays

    IS3110 U5D1

    • 712 Words
    • 3 Pages

    There are several different types of controls that you can take advantage of for securing your servers. Below are official guidelines from the (National Institute for Standards and Technology), or NIST.…

    • 712 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    In the LAN-to-WAN domain, closing off unused ports thru a firewall to reduce the chance of unwanted network access. Monitor inbound IP traffic, more specifically looking for inbound transmissions that show signs of malicious intent. And run all networking hardware with up to date security patches, and operating systems.…

    • 386 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    o Develop an e-business risk management plan for an organization in this industry and explain the key aspects of e-business risk manageme...…

    • 492 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Apply email server and attachment antivirus/malware and email quadrating for unknown file types. Disable for ping, probing, and port scanning on all exterior IP devices. Denying of outbound traffic using source IP addresses. Apply file transfer monitoring, scanning and alarming for unknown file types. Web Surfing should be monitored by filtering out any unknown IP address with trusted cites. Apply domain-name content filtering at the internet entry/access point as well.…

    • 313 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Nt280 Week 1 Homework

    • 359 Words
    • 2 Pages

    A. Enable content filtering and antivirus scanning at the entry and exit points of the internet. Enable workstation auto-scans and auto-quarantine for unknown file types.…

    • 359 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Install antivirus software, configuring it to run scans automatically at predefinedtimes and updating the definition files regularly.…

    • 546 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Passwords – for example sharing passwords, insecure passwords, storing username and passwords in public web browsers. This makes your security level low giving easy access to hacker and viruses.…

    • 914 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    If a hacker is trying to hack your e-commerce site the disclosure of confidential data can occur. Confidential data includes application specific data such as credit card numbers, employee details, and financial records. If your e-commerce site has been hacked you could experience damage some of the damage you might incur is the hacker could illegally use user accounts and privileges. After the attacker successfully gains access as a legitimate user or host, elevation of privileges or abuse using authorization can begin. They could steal your hardware, steal software, run code to damage your systems, run code to damage, and corrupt your data, modify data that you have stored, steal your data, use your data for financial gain or for industrial espionage, perform actions that prevents legitimate authorized users from accessing network services and resources, perform actions to deplete network resources and bandwidth. To protect your e-commerce site you could use encryption to secure pages when processing orders and payments. Use authenticated SSL certificates, so a visitor to your site will then have the assurance that you are what you claim to be. Use digital certificates or business cookies because they will give you a unique Internet identity, like an ID or passport. Use anti-fraud solution to protect from Trojan horses, viruses, and worms.…

    • 298 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Sending critical information such as credit card numbers or bank account numbers puts it at risk of being intercepted by hackers or cyber attacks.…

    • 691 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Websites are routinely collecting information about customers and visitors to understand and serve their customers better. Personal information is collected and administrated with integrity, responsibility, and security.…

    • 423 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Nt1310 Unit 3 Essay

    • 1872 Words
    • 8 Pages

    A firewall is software or a device that blocks hackers, viruses, and malware from accessing to your network system. Second, you should create strong passwords that nobody can guess. Third, you can hide your browsing activities from others by opening an Incognito window on Google Chrome, Private Browsing on Firefox, and InPrivate on Internet Explorer. These private windows don't record your browsing history. Fourth, when you are using a public computer, you can use a portable privacy device such as the Ironkey Personal Flash Drive or take Linux OS with you on a flash drive. Ironkey Personal Flash Drive is an encrypted flash drive that stores sensitive data and passwords and they are safe from viruses and malware.…

    • 1872 Words
    • 8 Pages
    Better Essays
  • Good Essays

    Week3 Hacking

    • 391 Words
    • 2 Pages

    Workstation and Desktop devices are prone to viruses, malware, and malicious software, especially if the user surfs the Internet and World Wide Web. Given that users connect to the Internet and World Wide Web, what security countermeasures can organization implement to help mitigate the risk caused from viruses, malware, and malicious software?…

    • 391 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Week 5 Quiz

    • 531 Words
    • 3 Pages

    5 List and explain three basic protection steps you can take to ensure all servers are hardened, thus reducing incidents.…

    • 531 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    • The Internet Crime Complaint Center (IC3) processed more than 336,000 complaints related to Internet crime in 2009 in the United States. • Many complaints were related to fraud, including nondelivery of ordered items, credit and debit card fraud, and advanced fee scams. Much of the credit card fraud was perpetrated when credit card numbers were stolen by criminals tricking people into revealing sensitive information or by computer programs that gather credit card data. • Non-fraud-related complaints pertained to issues such as computer intrusions, unsolicited e-mail, and child pornography.…

    • 5495 Words
    • 157 Pages
    Powerful Essays
  • Good Essays

    Cyber Crime

    • 395 Words
    • 2 Pages

    Well, One of the first steps you can take is to add firewalls to your computer so that scams and viruses are less likely to "bug" your computer. Also, one of the major steps, always make sure not to give out your personal information and only shop on secure websites. I never give out any personal information of mine online unless it is 100 percent secure. If it is not secure somebody else could have your identity very quick. Costing you a lot of money. I definitely do not want my identity stolen. Most “secure” websites will have a logo saying “Website Secured.”These steps will help ensure that some negative activity does not occur.…

    • 395 Words
    • 2 Pages
    Good Essays