Preview

Security Issues in E-Commerce Can Be Overcome

Good Essays
Open Document
Open Document
646 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Security Issues in E-Commerce Can Be Overcome
Discuss how security issues in e-commerce can be overcome

In this document I am going to explain the security issues that every e-commerce possible faces and how to overcome them.

Each e-commerce have to keep their online data safe such as customers personal details, their bank details and many more and in order to make sure that their data stays safe and secured, they have to be aware of all the frauds that is taking place now days because e-commerce have to deal with payments such as online banking, electronic transactions, using debit cards, credit cards and many other ways and because of these e-commerce’s have more compliance issues as they are at more risk from being targeted than other websites. Data’s can be stolen in many ways such as by hacking and by adding viruses into systems and many other ways.

Hackers scan the whole system without the knowledge of owner and goes through the private files, data’s and most of the private and confidential files with an intention of dropping the company down. So all the companies that do online business have to be alert and have to keep tight security in every systems such as “firewall”, so no hackers can hack in to their system.

The other thing that ecommerce have to be aware of is viruses, viruses comes in many faces such as virus, worms and Trojans. These three viruses works in different way but the result of all these are same which is that they drops down the whole system once it goes into a system.

Virus is a kind of code created by human that can damage the whole system once it is been opened, and the trick that hackers use is that they send the virus in different way such as “junk email, pop-ups web pages or games. As soon as the user clicks on that particular email or pop-up the virus codes starts doing their job which is to damage the system by destroying files and other objects.

Where else the other virus called worm does not damage the system but it allows the hacker to view all the

You May Also Find These Documents Helpful

  • Better Essays

    E-commerce networks are prone to external attacks. They present large targets with valuable internal data, such as customer information, credit card numbers and bank accounts, supply chain information, pricing, and so on. They must allow legitimate, worldwide users to connect and interact with the network. Speed is a priority to end users, where long transaction times or slow site navigation will motivate them to move to a different vendor. Security is another priority. Customers must be assured that their privacy and confidential information will remain intact and guarded.…

    • 890 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    E-Business is much more than just a shopping website. It expands individual’s knowledge and vision of the organization, gains new customers and evaluates the relevance of the products and personal preference of the clients. Safety and security is always necessary to protect intellectual properties and customers privacy. E-Business organizations use the best technology in order to grow and create strategies to maintain affordable prices.…

    • 423 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The major treat for e-commerce is identity theft in which an imposter obtains personal information such as social security , driver license, credit card number to impersonate someone else. Having security control in your website like firewalls, intrusion detection systems, securing wireless network and antivirus software can help us to avoid or reduce this kind of treat.…

    • 280 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    progress check 1

    • 711 Words
    • 3 Pages

    A computer virus is programmed to raid and attack existing computer programs. The virus is sent by an e-mail or activated through a download. The virus program then infects the whole computer system. The virus attaches itself to other programs in the computer and copies itself. Some computer viruses are terrible; they erase files or lock up systems. Viruses must not go untreated.…

    • 711 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    • A computer virus’s main purpose is to replicate itself and copy its code into as many other files as possible. Although virus replication can slow down networks, it is not usually…

    • 5495 Words
    • 157 Pages
    Powerful Essays
  • Good Essays

    A computer virus attaches itself to a program or file enabling it to spread from one computer to another, leaving infections as it travels. Like a human virus, a computer virus can range in severity: some may cause only mildly annoying effects while others can damage your hardware, software or files. Almost all viruses are attached to an executable file, which means the virus may exist on your computer but it actually cannot infect your computer unless you run or open the malicious program. It is important to note that a virus cannot be spread without a human action, (such as running an infected program) to keep it going.…

    • 787 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    ur mama

    • 659 Words
    • 3 Pages

    A computer virus is programmed to raid and attack existing computer programs. The virus is sent by an e-mail or activated through a download. The virus program then infects the whole computer system. The virus attaches itself to other programs in the computer and copies itself. Some computer viruses are terrible; they erase files or lock up systems. Viruses must not go untreated.…

    • 659 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    In the good old days (i.e., the early 1980s), viruses depended on humans to do the hard work of spreading the virus to other computers. A hacker would save the virus to disks and…

    • 9130 Words
    • 37 Pages
    Good Essays
  • Good Essays

    Causes Of Identity Theft

    • 1108 Words
    • 5 Pages

    Hackers are people who hack into other people’s computers or electronic devices so they can take control over their things. A book titled Net Crimes and Misdemeanors written by J. A. Hitchcock takes us through many different aspects of how people take and control our things. She explains to us “When you’re connected to the internet, your computer is part of a worldwide network and anyone can try to connect to your system. The best way to describe it is by contrasting it to your television, a one-way communication mechanism” (Hitchcock 237). Hackers can reach any personal information located on an individual’s computer. Any accounts or credit card numbers in the system, they can get ahold of. We use many internet softwares today that can help prevent hackers, but not all the time. Hackers are extremely knowledgeable with computers and can find their way in. Hitchcock also gives us a little background information on when many viruses and softwares were introduced. She states, “…there was a good enough market for a security suite that included a personal firewall and antivirus capability. They were right. When NIS was introduced in December 1999, the U.S. retail market for internet security software grew more than 140 percent” (Hitchcock 236). Throughout the years, many software updates came out to help protect people and their information. The problem is that the more…

    • 1108 Words
    • 5 Pages
    Good Essays
  • Better Essays

    Many companies keep sensitive personal information about customers or employees in their files or on their network. Those information move fast through the systems and make easier for organizations to provide efficient and effect full service to the customers. Security of the information is one of the most concern aspects in information systems as it has become a major threat embedded with the information systems today. Having a sound security plan in place to collect only what you need, keep it safe, and dispose of it securely can help you meet your legal obligations to protect that sensitive data. In this article, it describes the data security, data breaches and as well as the existing solutions for prevent the security issues and vulnerabilities.…

    • 1700 Words
    • 6 Pages
    Better Essays
  • Good Essays

    First of all we would like to know what exactly are virus, Trojan horse and worms. Viruses, worms, and Trojans are malicious programs which enter to your computer without your permission and knowing that can cause damage, information losses, privacies leak to your computer .They can also slow down the Internet connections, and they might even use your computer to spread themselves to your friends, family, co-workers, and the rest of the internet. The good news is that with an ounce of prevention and some good common sense, you are less likely to fall victim to these threats. Think of it as locking your front door to protect your entire family for example you will never open anonymous mails or attached file and always keep you computer security up to date like latest firewall, antivirus programs and etc.…

    • 1103 Words
    • 5 Pages
    Good Essays
  • Better Essays

    The term "computer virus" is sometimes used as a catch-all phrase to include all types of malware, adware, and spyware programs that do not have the reproductive ability. Malware includes computer viruses, worms, trojans, most rootkits, spyware, dishonest adware, crimeware, and other malicious and unwanted software, including true viruses. Viruses are sometimes confused with computer worms and Trojan horses, which are technically different. A worm can exploit security vulnerabilities to spread itself to other computers without needing to be transferred as part of a host, and a Trojan horse is a program that appears harmless but has a hidden agenda. Worms and Trojans, like viruses, may cause harm to either a computer system's hosted data, functional performance, or networking throughput, when they are executed. Some viruses and other malware have symptoms noticeable to the computer user, but many are surreptitious or go unnoticed.…

    • 2909 Words
    • 12 Pages
    Better Essays
  • Powerful Essays

    The World Wide Web has become more than a growing trend in today’s world. It is the electronic wave of the future for business, education, communication, and technology that is happening now. From 2000 to 2007, worldwide Internet usage grew 256% and at year-end 2007 Internet users numbered 1,319,872,109, or 20% of the world’s total population (Internet World Stats, 2008). These statistics represent a business market waiting to be explored that almost seems to guarantee growth, given the global expanse of the Internet and billion-plus users. Business on the Internet – or e-business -- has spawned different types of e-commerce operations, among them business-to-business (B2B) and business-to-consumer (B2C). Like traditional business, e-business is guided by ethical standards as well as subject to laws and regulations with which they are required to comply. This paper discusses and compares some of the ethical, legal, and regulatory issues that B2B and B2C operations face on the Internet.…

    • 1281 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    This virus was designed originally to cause as much damage as possible on a computer. Worms   A worm is a program that spreads over network.…

    • 267 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Viruses are small programs built with intent to harm or disrupt the useful computer programs. Some viruses aim at overloading the computer memory by an excessive use of computer resources. These viruses tend to fail a computer in executing the desired tasks. They lead to the dysfunction of a computer. The development or the spread of such malicious software in unethical.…

    • 965 Words
    • 4 Pages
    Good Essays