Top-Rated Free Essay
Preview

Potential Risks of an E-Commerce System

Good Essays
603 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Potential Risks of an E-Commerce System
Potential Risks of an E-Commerce System

Computer viruses and malicious software are some of the biggest threats to an e-commerce system. Viruses come from external sources and can corrupt files if introduced into the internal network. They can completely halt or destroy a computer system and disrupt the operations of any website especially E-Commerce. Malicious software such as Trojan horses pose an even greater threat as they can capture information about your clients before any encryption software can take effect. They can also impersonate a customer and pass bad or malicious code into the server running the website, this then becomes an internal problem.
“An e-commerce website is also vulnerable to fraud from both internal and external sources. Fraud activities include credit card fraud, which exposes the site to threat from customers and external sources, and internal fraud, such as fraudulent transactions being entered into the system from the back-end by rogue employees. Fraudulent transactions can also be introduced into the system by hackers or Trojan horses, with such fraudulent transactions appearing identical to real customers ' transactions.”(Gissimee Doe, 2013)
Hackers pose a threat to the future of e-commerce in two ways. First, they directly endanger e-commerce by increasing the risk of private financial information transmitted over the Internet being intercepted and used for illegal purposes. Secondly, they indirectly suppress the growth of e-commerce by undermining the public 's confidence in the safety of online transactions. This indirect threat is from the way that consumers perceive hackers. Hackers are typically characterised as super-criminals with extraordinary powers and malicious intent, many consumers may still be afraid to buy and sell goods and services over the Internet, even with adequate safeguards.
“Software firewalls consist of a software package that is installed on a server such as Linux or Windows. Software or server-based firewalls also typically sit between the Internet and an internal network so that it can provide maximum protection from harmful data packets. Software firewalls cause slightly more delay than appliances since there is more software involved, and software always introduces delays. This can be especially true if the firewall is also providing proxy or content filtering services. However, the delay is still slight and the trade-off for protection is considered worth it to most companies.” (Alan Hughes, 2013)
It is very important to have enough server capacity to handle you e-commerce shoppers. Many online retailers move to larger servers with more memory and CPUs to prepare for large numbers of customers especially around holiday seasons such as Christmas. Internet retailers rely on the High Availability (HA) concept to keep their e-commerce running in the face of unexpected glitches and malfunctions. The HA concept is quite simple and is based on eliminating as many single points of failure as possible within a reasonable budget. The simplest HA approach is to ensure a redundant infrastructure. This means your server has at least two network connections, two power supplies connected to different electrical circuits and two mirrored hard drives to prevent data loss if one of them suddenly crashes. The server itself is still a single point of failure though, and if it crashes, so does your online revenue. This is something you always need to keep an eye on.

Bibliography
Alan Hughes. (2013). How Does a Firewall Affect Speed?. Available: http://www.ehow.com/info_12183897_firewall-affect-speed.html. Last accessed 03/05/2013.
Gissimee Doe. (2013). What Are Some External & Internal Threats to an eCommerce Website?. Available: http://www.ehow.co.uk/info_8387883_external-internal-threats-ecommerce-website.html. Last accessed 1/05/2013.

Bibliography: Alan Hughes. (2013). How Does a Firewall Affect Speed?. Available: http://www.ehow.com/info_12183897_firewall-affect-speed.html. Last accessed 03/05/2013. Gissimee Doe. (2013). What Are Some External & Internal Threats to an eCommerce Website?. Available: http://www.ehow.co.uk/info_8387883_external-internal-threats-ecommerce-website.html. Last accessed 1/05/2013.

You May Also Find These Documents Helpful

  • Powerful Essays

    Cyber-crime, also known as e-crime, costs companies billions of dollars every year in stolen assets and lost business. Cyber-crime can thoroughly disrupt a company’s marketing actions. Additionally, when a business falls victim to cyber criminals, which could cause a…

    • 4620 Words
    • 19 Pages
    Powerful Essays
  • Satisfactory Essays

    Appendix D IT244

    • 827 Words
    • 4 Pages

    In terms of environmental risks that are external things such as earthquakes, fires, floods, mudslides, snow, ice, lightning, hurricanes, tornadoes, zombies, and killer bee’s etc., are considered. Internal Environmental risk factors could be human malicious intent, human error, utility issues (leaks), power outages, and equipment failures. With the new web servers and online shopping site Digital Crime will also be considered in all aspects internal and external Security.…

    • 827 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    The network infrastructure is the first line of defense between the Internet and public facing web servers. Firewalls provide the first line of defense in network security infrastructures. They accomplish this by comparing corporate policies about users' network access rights to the connection information surrounding each access attempt. User policies and connection information must match up, or the firewall does not grant access to network resources; this helps avert break-ins.…

    • 1214 Words
    • 4 Pages
    Powerful Essays
  • Better Essays

    E-commerce networks are prone to external attacks. They present large targets with valuable internal data, such as customer information, credit card numbers and bank accounts, supply chain information, pricing, and so on. They must allow legitimate, worldwide users to connect and interact with the network. Speed is a priority to end users, where long transaction times or slow site navigation will motivate them to move to a different vendor. Security is another priority. Customers must be assured that their privacy and confidential information will remain intact and guarded.…

    • 890 Words
    • 4 Pages
    Better Essays
  • Good Essays

    unit 7 lab 10

    • 595 Words
    • 3 Pages

    Software firewalls are installed on individual computers and they need sufficient configuration to be effective. Software firewalls contain a set of related programs, usually located at a network gateway server, that protect the resources of a private network from users on other networks or from internal users. Software firewalls allow application screening to verify the interaction between the requesting client and the requested resource.…

    • 595 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    If a hacker is trying to hack your e-commerce site the disclosure of confidential data can occur. Confidential data includes application specific data such as credit card numbers, employee details, and financial records. If your e-commerce site has been hacked you could experience damage some of the damage you might incur is the hacker could illegally use user accounts and privileges. After the attacker successfully gains access as a legitimate user or host, elevation of privileges or abuse using authorization can begin. They could steal your hardware, steal software, run code to damage your systems, run code to damage, and corrupt your data, modify data that you have stored, steal your data, use your data for financial gain or for industrial espionage, perform actions that prevents legitimate authorized users from accessing network services and resources, perform actions to deplete network resources and bandwidth. To protect your e-commerce site you could use encryption to secure pages when processing orders and payments. Use authenticated SSL certificates, so a visitor to your site will then have the assurance that you are what you claim to be. Use digital certificates or business cookies because they will give you a unique Internet identity, like an ID or passport. Use anti-fraud solution to protect from Trojan horses, viruses, and worms.…

    • 298 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    3) Suppose your business had an e-commerce Web site where it sold goods and accepted credit card payments. Discuss the major security threats to this Web site and their potential impact. What can be done to minimize these threats?…

    • 280 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    LAB 7 Security Basics

    • 1023 Words
    • 3 Pages

    Software firewalls are installed on individual servers. They intercept each connection request and then determine whether the request is valid or not. Software firewall process all requests by using the server resources. Apart from performance limitation, the software firewall has numerous advantages.…

    • 1023 Words
    • 3 Pages
    Powerful Essays
  • Powerful Essays

    Unit 12

    • 6979 Words
    • 28 Pages

    I will then prepare a presentation that describes the kinds of actions that various organisations take to reduce security risks from operating online. I will then explain the competitivepressures on selected contrasting businesses organisations to develop their use of e-business. I will then take two contrasting businesses and explain using examples, how they have responded to competitive forces to develop their use of e-business. I will then be evaluating how successful a particular business organisation has been preparing for the growing use of e-business. I will finally prepare an outline personal development plan for sales staff that is unfamiliar with internet business.…

    • 6979 Words
    • 28 Pages
    Powerful Essays
  • Best Essays

    Risk Management Strategy

    • 3263 Words
    • 14 Pages

    Srinivasan G. & Abi-Raad M. (2003). Risk factors associated with e-Business infrastructure in SMEs. 1st Australian Information Security Management Conference, 24 November 2003, Perth Western Australia.…

    • 3263 Words
    • 14 Pages
    Best Essays
  • Best Essays

    security breaches

    • 2967 Words
    • 12 Pages

    The world has been undergoing persistent transformation which some have been attributed to the changing developments in science and technology. In particular, information and communication technology is one of the most celebrated developments. Indeed, information technology has changed the lives of people across the globe. Information technology has reduced the world to a global village through fostering advanced communicationforms. However, with the advancements in information technology, especially the internet, insecurity issues have emerged. Insecurity issues have, in turn, sparked far reaching implications to the users. The most rampant security breaches that have been evidenced within the last six months include cyber bullying, network intrusion, cyber fraud, virus launching and data breaches.…

    • 2967 Words
    • 12 Pages
    Best Essays
  • Good Essays

    Causes Of Identity Theft

    • 1108 Words
    • 5 Pages

    People often trust the internet too much when it comes to buying things or sending out their personal information. One does not take into account that there are hackers waiting to scam you for all your money and information. IN an article titled, “Information Security Breaches and the Threat to Consumers” written by Fred H. Cate, he states, “Consumers often end up unwittingly providing thieves with access to sensitive data by failing to secure their own data, by responding to fraud schemes, such as phishing and pharming, and by careless use of their personal information” (Cate 4). In other words, people tend to trust that what they put on the internet, however there are people who are trying to scam you for your money. People should be more aware and less careless about what they are sending through the internet and to who they are sending it to. While we continue to be careless with our information, we continue to see many crimes involving identity theft. Cate writes, “The vulnerability of unsecured personal data and the threat of identity-based frauds nevertheless continue to grow and evolve as perpetrators become more sophisticated in how they seek to obtain and exploit personal information” (Cate 2). It makes it easy for hackers to catch and use one’s personal information when the individual continues to be careless with their information…

    • 1108 Words
    • 5 Pages
    Good Essays
  • Good Essays

    We live in the time of the World Wide Web and it brings the biggest changes ever. The effects from this powerful invention, the Internet, has made the world flat and the opportunities huge. Every big change can have an affect on people, it could be positive or negative. In early 2002, researchers evaluated the presence and role of hackers and their role in technological innovations. “A decade ago, people in the tech field were angry that hackers had been labeled the dangerous villains who threatened national security” (Nissenbaum, 2015). This negative association contrasts with the beginning days of the 1970’s when hackers “were seen as ardent if quirky programmers, capable of near-miraculous,…

    • 1234 Words
    • 5 Pages
    Good Essays
  • Best Essays

    Corporate Espionage

    • 2258 Words
    • 10 Pages

    The integration of technology into business transactions has allowed many organizations to provide better service while using fewer resources, but has also allowed unscrupulous individuals and organizations with a potential method of accessing information illegitimately. The cyber-criminal is often perceived to be “a computer hacker, sitting alone in his room, spending hours attempting to identify passwords, breach firewalls, and…

    • 2258 Words
    • 10 Pages
    Best Essays
  • Good Essays

    Cyber Security

    • 635 Words
    • 3 Pages

    “American consumers and businesses are the number one target of global cyber crime. For example, the Computer Security Institute and the FBI report that virus attacks have become a leading cause of financial loss by US companies, with businesses reporting an average of more than $160,000 for each security breach. According to the Internet Crime Complaint Center, the total dollar loss from all cases of Internet fraud referred to US law enforcement in 2007 was $239 million. The rapidly evolving world of global cyber crime--and what must be done about it--is described and illustrated with charts and anecdotes in the BSA report, The Fight for Cyber Space. Another recent BSA report, Online Software Scams: A Threat to Your Security describes the links between software piracy and cyber crimes such as identity theft.”(October is National Cyber Security Month, 2008)…

    • 635 Words
    • 3 Pages
    Good Essays