Preview

E-Commerce Threats Essay Example

Powerful Essays
Open Document
Open Document
2402 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
E-Commerce Threats Essay Example
Introduction Barriers to entering e-commerce are comparatively low, but new opportunities can be accompanied by new risks. Risk assessment means listing all of the risks a business might face and assigning varying degrees of importance to them. Risk management means prioritizing these risks and formulating policies and practices to balance and mitigate them. Every business can benefit from conducting a risk assessment of their e-commerce systems, although smaller businesses may not need to implement some of the more sophisticated techniques described in this guide. Under written are the risks that you need to be aware of or ask your e-commerce developer about. It also explains how risk assessment and management can help in recognizing and quantifying the risks and how to balance them against the potential gains. However, e-commerce has unavoidably invited its share of trouble makers. As much as e-commerce simplifies transactions, it is occasionally plagued by serious concerns that jeopardize its security as a medium of exchanging money and information. Identifying risks in e-commerce Today's threats to e-commerce systems include: Physical threats - threats posed to the IT infrastructure by, for example, fire or flood. Data threats - threats posed to software, files, databases, etc by viruses, Trojans and so forth. Errors by people, eg employees clicking on links within messages received on social networking websites that are found to be malicious or the accidental deletion of data by an employee. Technical failure, eg software bugs. Infrastructure failures, eg server crashes. Credit card and payment fraud. Malicious attacks from inside or outside your business. Hacker threats should your computers become part of a larger group of infected, remote-controlled computers known as a botnet. Typical threats to e-commerce systems Risk to corporate information and

You May Also Find These Documents Helpful

  • Satisfactory Essays

    It205 Capstone Question

    • 633 Words
    • 3 Pages

    Estimated losses from malicious programs and viruses have been estimated in the billions of dollars. The costs come not only from theft of funds or information, but also the manpower and resources that it takes to find, track, and remove malicious programs, as well as replace programs or files damaged or removed. If you add in trust issues and loss of business from consumers because of data loss, the effects can be long lasting and even devastating to a business.…

    • 633 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    E-commerce networks are prone to external attacks. They present large targets with valuable internal data, such as customer information, credit card numbers and bank accounts, supply chain information, pricing, and so on. They must allow legitimate, worldwide users to connect and interact with the network. Speed is a priority to end users, where long transaction times or slow site navigation will motivate them to move to a different vendor. Security is another priority. Customers must be assured that their privacy and confidential information will remain intact and guarded.…

    • 890 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    Unit 6 Lab

    • 727 Words
    • 2 Pages

    A big point of focus in your risk assessment should be the service you provide to your customers because without them, your company cannot survive. In this case, your customers purchase electronics parts from you. If your online ordering service goes down, or the systems that build your parts…

    • 727 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    E-Business is much more than just a shopping website. It expands individual’s knowledge and vision of the organization, gains new customers and evaluates the relevance of the products and personal preference of the clients. Safety and security is always necessary to protect intellectual properties and customers privacy. E-Business organizations use the best technology in order to grow and create strategies to maintain affordable prices.…

    • 423 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    All rights reserved. Page 5 Types of Threats  Malicious software  Device failure  Application failure  Natural disaster  Intrusive cracker NT2580 Introduction to Information Security © ITT Educational Services, Inc.…

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    | Describe the threats to system and information security and integrityThe possible threats to information security may be: from theft, unauthorised access, accidental file deletion, use of removable storage media; malicious programs (including viruses, trojans), hackers, phishing and identity theft; unsecured and public networks, default passwords and settings, wireless networks, Bluetooth, portable and USB devices.…

    • 793 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Week 2 Quiz

    • 599 Words
    • 5 Pages

    D.An external situation or event with the potential to cause harm to an IT system…

    • 599 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    4. CYBERSECURITY. Cyber threats have amplified with the globalization of digital communications, increased reliance on computer networks, and convergence of technology. Cyber threats have also evolved. The risk is no longer from sophisticated nation states, but also from hackers, criminals, and terrorists.…

    • 798 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Computer systems are vulnerable to many threats that can inflict various types of damage resulting in significant losses. This damage can range from errors harming database integrity to fires destroying entire computer centers. Losses can stem, for example, from the actions of supposedly trusted employees defrauding a system, from outside hackers, or from careless data entry clerks. Precision in estimating computer security-related losses is not possible because many losses are never discovered, and others are "swept under the carpet" to avoid unfavorable publicity. The effects of various threats varies considerably: some affect the confidentiality or integrity of data while others affect the availability of a system.…

    • 1117 Words
    • 5 Pages
    Better Essays
  • Better Essays

    This report describes the security technologies in the E-commerce system and issues involving the E-commerce security technologies.…

    • 1719 Words
    • 7 Pages
    Better Essays
  • Good Essays

    There are many security issues involved with e-commerce. Following is a brief list of potential hurdles or issues:…

    • 517 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Ebusiness

    • 358 Words
    • 2 Pages

    Module1 Introduction E-Business - Origin and Need of E-Commerce, Factors affecting E-Commerce, Business dimension and technological dimension of E-Commerce, E-Commerce frame work Electronic Commerce Models, Types of Electronic Commerce, Value Chains in Electronic Commerce. Module 2 Internet and E-Business Introduction to internet and its application, Intranet and Extranets. World Wide Web, Internet Architectures, Internet Applications, Business Applications on Internet, E- Shopping, Electronic Data Interchange, Components of Electronic Data Interchange, Creating Web Pages using HTML. Module 3 Electronic Payment System Concept of Money, Electronic Payment System, Types of Electronic Payment Systems, Smart Cards and Electronic Payment Systems, Infrastructure Issues in EPS, Electronic Fund Transfer. Module 4 Security Issues in E-business Security Overview, Electronic Commerce Threats, Encryption, Cryptography, Public Key and Private Key Cryptography, Digital Signatures, Digital Certificates, Security Protocols over Public Networks-HTTP, SSL, Firewall as Security Control, Public Key Infrastructure (PKI) for Security, Prominent Cryptographic Applications. Module 5 E-Business Applications & Strategies Business Models & Revenue, Models over Internet, Emerging Trends in e-Business, e-Governance, Digital Commerce, Mobile Commerce, Strategies for Business over Web, Internet based Business Models. Module 6 E-Commerce and retailing On-line retail industry dynamics, On-line mercantile models from customer perspective, Management challenges in on-line retailing. E-Commerce and on-line publishing, Module 7 Emerging trends and technologies in E-Business E-Business and MIS, E-Business and ERP, E-Business and CRM, E-Business and Supply chain management, Benefits of E-Commerce; Drawbacks and limitations of E-Commerce. Minimum 5 cases to be discussed Suggested Readings 1. 2. 3. 4. 5. E-Commerce Strategy, Technologies and Applications, Whitley, David, Tata McGraw Hill. Electronic…

    • 358 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Nowadays the electronic media is the best and fastest medium for promoting a product directly to the consumers. Electronic media devices such as televisions, radios, cell phones and personal computers can be found in every house now, so advertising, buying and selling products over these mediums is a very convenient and promising way of doing a good business. It also gives the customers the ease of ordering stuff from home and receiving it on their doorstep.…

    • 4870 Words
    • 20 Pages
    Powerful Essays
  • Good Essays

    Joke

    • 2280 Words
    • 10 Pages

    As the internet grows in popularity every day, so too does electronic commerce. Electronic commerce, simply put, is the exchange of money for goods and services via electronic means. In other words, electronic commerce is usually when you purchase something off of the internet. Electronic commerce is often referred to as e-commerce, or e-business. In this paper I will be discussing the technical side of e-commerce, security, different points of view regarding e-business, and of course my personal opinion and experiences.…

    • 2280 Words
    • 10 Pages
    Good Essays
  • Good Essays

    Risk Control Matrix

    • 607 Words
    • 3 Pages

    • Ensure that antivirus and antimalware controls are installed on all systems and updated daily.…

    • 607 Words
    • 3 Pages
    Good Essays