INTERNET SECURITY AGAINST HACKING SYSTEMS
The internet has been a wide usage in all the fields in the present competitive world. It is being used in the education, research, business and what not, in everything. But providing security for the users information or transactions or any other data in any of the field has become a paramount. This paper gives a vivid picture of “E-commerce” and the vulnerabilities they are facing in providing a secure system for the users. In other words, how the security attacks are made either by the hackers or the intruders, the ways how they attack and exploit to illegitimate means.
This paper is an overview of the security and privacy concerns based on the experiences as developers of E-commerce. E-commerce is a business middleware that accelerates the development of any business transaction-oriented application, from the smallest retailer to the distributor, to the consumer (user). These transactions may apply b between manufacturers and distributors or suppliers. Here, the user needs to be assured with the privacy of his/her information. In this article, we focus on possible attack scenarios in an e-Commerce system and provide preventive strategies, including security features that one can implement. Here we present you the better ways of how to defend from the attacks and protect your personal data without depending on the network provider’s security with the help of personnel firewalls and honey pots.
E-Commerce refers to the exchange of goods and services over the Internet. All major retail brands have an online presence, and many brands have no associated bricks and mortar presence. However, e-Commerce also applies to business to business transactions, for example, between manufacturers and suppliers or distributors. E-Commerce provides an integrated platform that runs both their customer facing online shopping sites, and their internal distributor or supplier portals as shown in Figure.
E-Commerce systems are relevant for the services industry. For example, online banking and brokerage services allow customers to retrieve bank statements online, transfer funds, pay credit card bills, apply for and receive approval for a new mortgage, buy and sell securities, and get financial guidance and information.
SECURITY OVERVIEW AND ITS FEATURES:
A secure system accomplishes its task with no unintended side effects. Using the analogy of a house to represent the system, you decide to carve out a piece of your front door to give your pets' easy access to the outdoors. However, the hole is too large, giving access to burglars. You have created an unintended implication and therefore, an insecure system. While security features do not guarantee a secure system, they are necessary to build a secure system. Security features have four categories: •Authentication: Verifies who you say you are. It enforces that you are the only one allowed to logon to your Internet banking account. •Authorization: Allows only you to manipulate your resources in specific ways. This prevents you from increasing the balance of your account or deleting a bill. •Encryption: Deals with information hiding. It ensures you cannot spy on others during Internet banking transactions. •Auditing: Keeps a record of operations. Merchants use auditing to prove that you bought specific merchandise. The victims and the accused (the players):
In a typical e-Commerce experience, a shopper proceeds to a Web site to browse a catalog and make a purchase. This simple activity illustrates the four major players in e-Commerce security. One player is the shopper who uses his browser to locate the site. The site is usually operated by a merchant, also a player, whose business is to sell merchandise to make a profit. As the merchant business is selling goods and...