Different Types of Policy E-Commerce Securtity Measures

Only available on StudyMode
  • Topic: Public-key cryptography, Cryptography, RSA
  • Pages : 34 (10214 words )
  • Download(s) : 275
  • Published : November 30, 2005
Open Document
Text Preview
Table of Content

ABSTRACT …………………………………………………………………………….2

THEISIS …………………………………………………………………………………2

Introduction ……………………………………………………………………….3

Different types OF POLICY e-commerce securtity measures 5

Privacy Policy *

Network security policy *

Encryption policy *

Firewall Policy 13

MEASURES TO MAKE E-COMMERCE SECURITY SAFE…………………… 13

LIMITATIONS AND WEAKNESSES OF E-COMMERCE SECURITY MEASURES …………………………………………………………………………. 21

CONCLUSION ………………………………………………………………………. 26

REFERENCES 28

GLOSSARY …………………………………………………………………………...29

Abstract

Many efforts are being undertaken to make e-commerce a safe and reliable means of transaction. These measures have encountered many pitfalls and weak points. Moreover, they are difficult to comprehend and assure the consumer the extent of the security applications. This not only discourages to join e-commerce, but also hampers the further growth of the e-commerce sector.

Thesis statement

To discuss the major polices and procedures e-commerce security that affects business to consumers at large. Based on these findings propose viable solutions and alternatives to address the needs of Internet shoppers.

Electronic commerce (e-commerce) Internet security

Introduction

Electronic commerce is buying and selling of goods and services across the Internet. An e-commerce site can be as simple as a catalog page with a phone number or it can range all the way to a real-time credit card processing site where customers can purchase downloadable goods and receive them on the spot. Electronic commerce merchants can range from the small business with a few items for sale all the way to a large on-line retailer such as Amazon.com.

Commercial activities over the Internet have been growing in an exponential manner over the last few years. Despite this rapid growth the security of monetary transaction over the wide-open Internet has been a major point of uneasiness for many to join this new modality of buying and selling.

This research study is undertaken firstly to determine the different types of e-commerce security policies, applications and technologies currently in use, and secondly, to point out the possible weaknesses and drawbacks of the existing security measures. This research paper will specifically point out the benefits of encryption methods and techniques to secure Internet e-commerce.

In order to fulfill this goal pertaining to security measures will be discussed first. This will be followed by detailed description of the technology behind the security measures. The weak points of these technologies will be pointed out and attempts' will be made to propose solutions to make it safer.

It is clear that electronic commerce will revolutionize businesses, and customers will be offered new and exciting services. As e-commerce businesses are growing, more secure technologies are being developed and improved every day.

The purpose of this research is to show how current Internet security polices and technologies fail to meet the needs of end users.

E- commerce business has four different consists of components to build business to consumer. The major components are product catalog (where the online customers select what they want to order), a shopping cart (where product selections are collected), transaction security (credit authorization and other payment schemes), and order processing (shipping, taxes, inventory, etc). All of these elements combined give the store a personality and the end users a true shopping experience.

From customer's perspective, whether browsing or buying from online catalog is the most important part of e-commerce. It's similar to the printed mail-order catalog with respect to the basics: products, pictures, and prices. However, a web catalog can be a fully interactive...
tracking img