Preview

E-Commerce: Security and Privacy

Good Essays
Open Document
Open Document
2213 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
E-Commerce: Security and Privacy
As the evolution of the internet and purchasing online becomes popular, so do the security factors that contribute to the ways of eliminating fraud, theft, and acquiring personal information. E-commerce has created many new ways for customers to make payments including e-cash, e-cheques, and e-wallets. In the 21st century, many organizations worked hard at securing communications and payments made through e-commerce transactions. In doing so, customers would be able to feel a sense of trust, confidence and assurance that their information is safe. Many technological developments are being tested and today even implemented through that very system, of e-payments. Already being used today are smart-cards and e-wallets, which in fact work well at creating a safeguard for customers information. Customers now have the convenience of quick and more efficient ways of making transactions and saving data effortlessly with the click of a button. Authentication programs such as VeriSign Secure Site Program, allows one to learn more about web sites users visited before they submit any confidential information, in addition to permitting one to submit sensitive information like one's own credit card number. Such programs are being used on sites such as Ryerson's website, where students can make payments through the system where credit card information is used. Public key infrastructure and digital certificates help companies battle the wave of illegal activity and enhance the business models. Today many businesses are using firewalls as a way to add security to a network. Virtual Private Network allows users to gain secure access to its organizations network. Companies that have used these technologies are paving the way for future security methods. Encryption and decryption are always used whenever secure sites are accessed so that users that enter information can not be accessed by unauthorized people. 56 bit used before and the 128-bit encryption is becoming the

You May Also Find These Documents Helpful

  • Good Essays

    Information Technology is advancing and growing by the minute. Without encryption, credentials sent can be easily intercepted and read by hackers, causing "irreparable damage" to the user and the website owner 's reputation (Eugene Teo, senior manager of security response at security software firm Symantec Singapore, 2014). Security will include monitoring internet behavior, login and log on password rules, software update, and privacy of information.…

    • 688 Words
    • 3 Pages
    Good Essays
  • Good Essays

    There are various types of electronic categories for the e-commerce system. The most popular type of electronic payment is the digital wallet. By using the digital wallet for paying purchases over the web more efficiently and by eliminating the need repeated information for each purchase. The digital wallet is more secure, and the owner’s information is saved automatically when the information is completed for a purchase. For example; the consumer would not have repeat credit-card information each time they purchase something. Example: Google Checkout.…

    • 679 Words
    • 3 Pages
    Good Essays
  • Better Essays

    First World Bank Savings and Loan (FWBSL) needs to consider the increased revenue and cost that will be present if they decide to offer secure services to their clients. With them expecting to have over $100,000,000 a year for online credit cards and loan applications together with other banking services, they are also expected to provide this service while paying close attention to the three security priorities which are: confidentiality, integrity, and availability. Customers expect FWBSL to be diligent when it comes to protecting their accounts and Nonpublic Personal Information. If something were to go wrong they could lose credibility with their current and potential…

    • 1335 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    In order to operate a successful and efficient E-Business, organizations must avoid legal problems by always operating by policies and procedures established by the company and the intellectual property laws and rights. Security is crucial on an online business to protect customer’s personal and financial information. In order to perform safely and responsibly, organization must keep operating systems updated, limit access of sensitive information to those who need to see it, and use encryption software to protect customers’ financial information from theft during…

    • 423 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Unit 12 P6

    • 916 Words
    • 3 Pages

    Customers can be very concerned about payment security with transactions on the internet. Some of these concerns are from stories about hackers, identity theft and even fake…

    • 916 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Exam Final ECOM 320

    • 3983 Words
    • 11 Pages

    Lesson 7: E-commerce security and controls Access control: Mechanism that determines who can legitimately use a network resource. Active tokens: Access token Authentication: Process to verify the real identify of an individual, computer, computer program, or EC website. Authorization: Determines whether a buyers card is active and whether the customer has sufficient funds. Biometric systems: Authentication systems that identify a person by measurement of biological characteristic, such as fingerprints, iris patterns, facial features, or voice. Biometric control: An automated method for verifying the identity of a person based on physical or behavioral characteristics. Botnet: A huge number of hijacked Internet computers that have been set up to forward traffic, including spam and viruses, to other computers on the Internet. Business continuity plan: A plan that keeps the business running after a disaster occurs. Each function in the business should have a valid recovery capability plan. Certificate authority (CA): Third parties that issue digital certificates. Ciphertext: a plaintext message after it has been encrypted into a machine-readable form. Confidentiality: Assurance data privacy and accuracy. Keeping private or sensitive information from being disclosed to unauthorized individuals, entities, or processes. Cybercrime: Intentional crimes carried out on the Internet. Cybercriminal: A person who intentionally carries out crimes over the Internet. Crackers: A malicious hacker who may represent a serious problem for a corporation. Cryptography: is a method of storing and transmitting data in a particular form so that only those for whom it is intended can read and process it. Data breach: A security incident in which sensitive, protected, or confidential, data is copied transmitted, viewed, stolen, or used by an individual unauthorized to do so. Denial-of-service (DoS) attack: An attack on a website in which an attacker uses specialized software to send a…

    • 3983 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    Bis/220 It Acts Paper

    • 590 Words
    • 3 Pages

    The internet and other information services have made almost any information obtainable at the click of a button. This has also made the world a much less secure place when it comes to protecting one’s work. It has also compromised the security of bank accounts and fund transfers of those who use the internet for purchases, banking, or use other automated machines. Due to these security issues two information technology acts were created to protect the people. First, the Electronic Fund Transfer Act (EFTA) was created in 1978. Then, the No Electronic Theft (NET) Act was created in 1997.…

    • 590 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    It/205 Week 5 Checkpoint

    • 593 Words
    • 3 Pages

    There are many different types of payment systems, but the four major ones are Online Credit Card Payment System, Online Electronic Cash System, Electronic Check System and Smart Cards based Electronic Payment System. The key advantages to these systems vary from privacy, integrity, compatibility, good transaction efficiency, acceptability, convenience, mobility, low financial risk and anonymity, compared to the traditional method of payment systems. There are some feared concerns with the credit card system such as lack of authentication, repudiation of charges and credit card frauds, and also having to reveal credit information at…

    • 593 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Week 7 Checkpoint It 205

    • 694 Words
    • 3 Pages

    There are many different types of electronic payment systems. Each of these systems has their own place in the e-commerce environment. One of these systems is the digital wallet. This system…

    • 694 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Each e-commerce have to keep their online data safe such as customers personal details, their bank details and many more and in order to make sure that their data stays safe and secured, they have to be aware of all the frauds that is taking place now days because e-commerce have to deal with payments such as online banking, electronic transactions, using debit cards, credit cards and many other ways and because of these e-commerce’s have more compliance issues as they are at more risk from being targeted than other websites. Data’s can be stolen in many ways such as by hacking and by adding viruses into systems and many other ways.…

    • 646 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Cac Card

    • 1716 Words
    • 7 Pages

    Public key infrastructure (pki) certificates that enable cardholders to "sign" documents digitally, encrypt and decrypt emails, and establish secure online network connections.…

    • 1716 Words
    • 7 Pages
    Good Essays
  • Powerful Essays

    Public Key Infrastructure

    • 2320 Words
    • 10 Pages

    This paper is intended to show the importance using a Public Key Infrastructure (PKI). PKI is a broad subject matter and is constantly evolving to meet the growing demands of the business world. This paper will address PKI at a relatively high-level and will not include details regarding the underlying cryptography (Weise, 2001). This paper will cover the history behind PKI, why we should us PKI, its purposes and functions how PKI works.…

    • 2320 Words
    • 10 Pages
    Powerful Essays
  • Best Essays

    Ssh/Tls

    • 5132 Words
    • 21 Pages

    While most computer users understand a secure connection is needed to transact an online purchase, communicate, or transfer sensitive data few understand the methodology and inherent weaknesses that are prevalent in many sites today almost 20 years after the first SSL protocol was developed. The common user…

    • 5132 Words
    • 21 Pages
    Best Essays
  • Good Essays

    The search for solutions for wicked problems never ends whereas ordinary problems can be solved in a certain way (Camillus 2008). The digital economy raises such concerns as consumers’ security and privacy (OECD ). Therefore, companies have to find solutions to solve these problems. For example, companies can make effort to secure environment for transaction. However, how to provide such a secure environment will be a permanent issue to them, which demonstrates that digital revolution is a wicked problem.…

    • 699 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Amazon vs. Ebay

    • 584 Words
    • 3 Pages

    According to Heyes (2005), in recent years online shopping is becoming more popular. Two popular online shopping sites are Amazon and eBay. Therefore, in this report, I want to explore which site is more competitive and how each one will do in the future, in relation to the industry in which they compete. The industry of online shopping has a unique service. Online shopping is the process through which consumers directly buy goods or services from a seller in real-time, without an intermediary service, over the internet. Internet business began in1991. It was not until 1994 that online shopping was being utilized, such as online banking. “During the same year, 1994, Netscape introduced SSL (Secure Sockets Layer) encryption of data transferred online, which has become essential for secure online shopping. Also in 1994 the German company Intershop introduced its first online shopping system. In 1995 Amazon launched its online shopping site, and in 1996 eBay appeared” (Wikipedia, 2011, page.1).…

    • 584 Words
    • 3 Pages
    Good Essays