Monday, August 12, 2019
The security technology of e-commerce Essay Example | Topics and Well Written Essays - 2000 words
The security technology of e-commerce - Essay Example Most reputable financial institutions and e-commerce service providers take all measures to protect the data and transactions online and simultaneously they provide the details to the customers, how to protect their transaction. Although the risks are generally avoided while dealing with internet transactions, even then the threats are enormous. The various threats include cyber terrorism, credit card number may be intercepted, cyber attacks during the war on terrorism, viruses and worms, hacking and malware techniques, one of the service providers may deny that the deals ever took place, hackers may exploit data from web page due to some improper security measures, hackers may gain access to the system. Sometimes customers may also become a victim of identity theft. According to a survey conducted by the US Department of Justice (DOJ), identity theft is affecting millions of household in the US and costing an estimated $ 6.4 billion per year. To avoid all these consumers must take s ome proactive steps and practices to access the computer before carrying out any financial transaction. Some of the most common practices include the use of updated versions of software and operating systems, ensure proper network security, avoid opening unknown emails and attachments, use of passwords, use of updated antivirus software and use of encryption.In the present paper, the author attempts to deal with the type of risks available to the internet user, the present security system available to the consumers and future security trends. trends. The finding of available security system has been summarized. 3.0 RESEARCH HYPOTHESIS STATEMENT: While going before the literature as cited in bibliography, author made an attempt to a hypothetical statement as , " Are the current security systems able to provide security to the e-commerce users" 4.0 EXPLANATION OF THE TECHNOLOGY: 4.1 BACKGROUND: In the early 1990's digital break-ins, kidnapping were the terms used by many popular journals to hackers. The early targets were educational institutes and
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.