Preview

E-Commerce Security

Good Essays
Open Document
Open Document
498 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
E-Commerce Security
Security
Any business that operates online is going to be at risk from internet threats and because of this the business must ensure to implement security on its network systems. Businesses need to be able to show that they can keep customer information safe and secure, this will reassure potential customers and widen your market potential.

Prevention of hacking-
E-commerce sites need to be able to prevent hacking so as to keep both business and customer data secure. If customer data is stolen from a business’s database then it is possible for the thieves to steal those customers’ identity, this is known as identity theft. Identity theft involves a thief stealing the personal details of someone and using this information to apply for services such as credit cards, loans and mortgages whilst pretending to be the person that they have stolen the details of, and it can be difficult for this crime to be detected if the thief has a large amount of the person’s details and is often only discovered when the victim receives correspondence requesting payment for the thief’s spending. The type of personal details that e-commerce sites keep about their customers provides enough information to commit identity theft so it’s important that all e-commerce businesses protect their customers’ data.

Firewall-
A way to protect customer information is to have a firewall on the business’s database. A firewall builds a protective virtual barrier around the network which only allows authorised programs access to data. When a user views a web site that has passed through a firewall they may not be able to see all the features of the site, this is because the security policies on the firewall can be set to block certain types of scripts running on the user’s computer. This is done to prevent viruses and hackers from attacking the system.

Authentication-
The most common but also effective ways of using authentication to protect your network is to ensure that all users

You May Also Find These Documents Helpful

  • Powerful Essays

    Security software will be required for the new location to create user authentication, virus protection, and data protection (Cooper, n.d.). User authentication will require users to provide a username and password to access accounts. This authentication prevents unauthorized use on an account, and records activity by users. Virus protection is necessary. The security software will guard against viruses, adware, or malware from stealing or destroying information. A firewall will block incoming connections to the network. Data protection involves encrypting data transferred between locations on a network…

    • 2001 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    This domain needs strict security controls given the risks and threats of connecting to the internet. This domain is where all data travels into and out of the IT infrastructure. A security solution for unauthorized access through the LAN-to-WAN domain is to apply strict security monitoring controls for intrusion detection and prevention.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Better Essays

    E-commerce networks are prone to external attacks. They present large targets with valuable internal data, such as customer information, credit card numbers and bank accounts, supply chain information, pricing, and so on. They must allow legitimate, worldwide users to connect and interact with the network. Speed is a priority to end users, where long transaction times or slow site navigation will motivate them to move to a different vendor. Security is another priority. Customers must be assured that their privacy and confidential information will remain intact and guarded.…

    • 890 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    Information has become the most valuable asset of any organization. And keeping that information secure is a major factor in the design and development of any computer system. Security is defined by Merriam-Webster as “the state of being protected or safe from harm”. It is up to every organization to insure that their data is protected, and that nothing that is harmful to the company or its clients is compromised.…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Identity theft is the one of the biggest concerns. If a person becomes a victim of identity theft, then it is almost impossible to prove innocence. Therefore, the customers should be informed about such attacks that can take place. They need to know the consequences of using online softwares and how to tackle them. Another thing that the organizations can adopt is the authentication and authorization technologies. This will make sure that the hackers are unable to steal the data. They should also put up resistive technology in place like firewalls, content filtering and encryption. These technologies should be of the highest quality.The strength of the passwords should be really strong. If any suspicious movement of data is found, then the organization must take an immediate step and not take it lightly. Lastly, they should devise an information security plan to protect their…

    • 588 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    E-Business is much more than just a shopping website. It expands individual’s knowledge and vision of the organization, gains new customers and evaluates the relevance of the products and personal preference of the clients. Safety and security is always necessary to protect intellectual properties and customers privacy. E-Business organizations use the best technology in order to grow and create strategies to maintain affordable prices.…

    • 423 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Unit 12 P6

    • 916 Words
    • 3 Pages

    Customers can be very concerned about payment security with transactions on the internet. Some of these concerns are from stories about hackers, identity theft and even fake…

    • 916 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Data security would be a method that corporations use to keep important and confidential information protected. Access to this type of secure information is limited to those who have the authorization to view it. Data security is enforced so that private information that a corporation has about its employees, customers and others that they conduct business with is kept safe from any potential corruption from those who want to use it to their advantage. Many companies go to great lengths to keep their data safe and sound from hackers who can get confidential information from their systems. If a company is not careful and does not protect their confidential information many problems can occur. Some of these problems include identity theft of customers and employees. Hackers can steal information such as social security numbers, addresses, credit card information and many other key pieces of information that can let hackers easily access ones identity. The focus of this research paper would be about the Michaels Stores…

    • 813 Words
    • 4 Pages
    Better Essays
  • Good Essays

    | Keep information secure and manage personal access to information sources securelyProtect systems and data: Access controls: Physical controls: log-in details should be treated as credit card information and not to be left lying anywhere with an easy access, locks, passwords, access levels.…

    • 793 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Cis 333 Final Term Paper

    • 2531 Words
    • 11 Pages

    In today’s IT world every organization has a responsibility to protect the information and sensitive data they have. Protecting data is not only responsibility of security and IT staff but every individual is involved in protecting the information. The risks to information security are not digital only, but it involves technology, people and process that an organization may have. These threats may represent the problems that are associated to complex and expensive solution, but doing nothing about these risks is not the solution.…

    • 2531 Words
    • 11 Pages
    Better Essays
  • Satisfactory Essays

    Mia Casa Network

    • 294 Words
    • 2 Pages

    6-7. Adding security to the webpage and intranet webpage could be done by hiring a good web-site developer.…

    • 294 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Disaster Recovery Plan

    • 638 Words
    • 3 Pages

    Online services must be protected to ensure that both employees and customers will be able to access the programs and information to continue running the business. Sales, shipping information, customer database, and the virtual interaction provided to customers must be available. Basic functions within the main offices must remain available, including power, sales, the phones, and customer service.…

    • 638 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    When it comes to online marketing there are many risks an individual can face when it comes to purchasing online. As this generation is all about technology most things that are set up online require personal information for example New Look requires its customer to set up an online account to purchase items. This may make the customers wary, as they wouldn’t like to become a victim of fraud due to payment security being an issue.…

    • 341 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    McBride Financial services’ main concern is to ensure security for its customers’ financial online application services, and making sure that the online information is protected. In order not to involve into a lawsuit from clients because of identity stolen, McBride Financial will implement a kind of internal security system so every employee can access the clients’ information. McBride Financial is also concerned with physical security of the computer system, and other security issues as the company’s success is based on client’s understanding of how their personal information is safe. (Apollo Group, 2003 )…

    • 664 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Online Marketing

    • 581 Words
    • 3 Pages

    The most important example of technical consideration of online marketing is security. Security is the number one issue in a consumer’s mind when they need to use personal information to purchase or do anything online that requires that information. Hackers and viruses can lead to personal information on any database to be sold and used to wreak havoc on innocent consumers. Viruses can be…

    • 581 Words
    • 3 Pages
    Good Essays