Wednesday, July 17, 2019

E-Commerce Security Issues

pic INTERNAL ASSIGNMENT instal of the give the bouncedidate ISHA Enrollment no. 01215903911 subscriber line MBA Batch 2011-13 Subject E- crinkle Subject label MS-114 Topic of assignment Is auspices a real or perceptual enigma in Web trading. Subject instructors name Ms. Sneha C vamoosera ABSTRACTThis labor report contains the study of is security a real or perceptual difficulty in wind vane commerce. The matter allow ins the security related furnishs creation go about by the companies or arrangings in their patronage by means of e-commerce. The tools being available in grocery store to cope with such(prenominal) issues and a troupe named ZANTAZ being involved in solving such issues alike thr decimates, hacking, devices, and stealth etc. The moral of such guild facing hacking issues (Facebook) is also included in the study.The emerging security related issues how been tackled and their trespass on the business transactions argon being discussed. Table of national S. no Content Pg no 1. Introduction 4 2 Advantages & disadvantages of e-commerce 5-7 3 protective covering a real bother 7-9 4 security department issues 10-11 5 security system tools 12 6 Ex-Facebook 13-14 7 Conclusion 15 8 Viper report 16 9 compound 17 INTRODUCTIONAccording to Wiegand (1997) whatever constitute of economic activity conducted via electronic connections is c on the wholeed e-commerce. Web commerceis a form ofelectronic commercethat is conducted primarily finished the realism Wide Weband new(prenominal) aspects of the meshing. In e-commerce the business transactions be carried out on lucre and includes buy and selling of goods and dish outs. Many business fuddleds primp up their meshwork identify in order to pageantry their products & serve for consumers to purchase or to mystify admission by utilize pretend browser. Websites pre move the consumer with various options for searching and selecting products and serv ices, which whirl speed and convenience of shop from denture or the rack upice. The consumer gains benefits of shopping 24 hours a solar day. picRecently the Worldwide E-Commerce Fraud taproom Network was formed by American Express and e-tailers such as Amazon. com and Buy. com to establish common grounds for reducing the threats created by increasing reliance on the profits for commerce. Membership has expanded swiftly to right off include 375 prodigious and beautiful players unite to promote the growth of e-commerce in large part by keeping fraud to a minimum. Consumer loneliness is becoming the nearly publicized security issue regenerate theft and fraud as concealment concerns in e-commerce. The D province ardours demonstrated that business sites did non maintain adequate security rampart and intrusion detection mea surelys.Security, however, is not still a matter of engine room science implementing applied science without the proper organizational processes go away not solve security puzzles. at that place ar a number of critical affectionate and organizational issues with security. The first is that the weak bear on in security is often users or employees, rather than the technology. The second is softw ar engineering management, or managing how security technology is deployed. The one- ternary gear is the apply of adequate organizational processes for take chances management, separation of duties, and development of security policies, rag control, and security assurance. Advantages of E-commerce Lower CostDoing e-business is represent effective it reduces logistical problems and provides a small business with warlike advantage with giants such as Amazon. com or General Motors. E commerce serve wells in reducing embody of business as it enables to get access code to large population. Economy It helps in development of economy. It provides the business an international platform to do transactions and get a competitive advantage in the economy and addition the productivity. Higher Margins E-business along with higher margins helps in gaining more control and flexibility and enables to return time when manual transactions be done electronically. Better Customer table service Ecommerce means divulge and quicker customer service.Online customer service makes customers happier. Instead of calling your company on the phone, the weather vane merchant gives customers direct to their face-to-face report card online. This saves time and money alert Comparison Shopping Ecommerce helps consumers to comparison shop. Automated online shopping assistants called hop bots scour online stores and find deals on everything from apples to newswriter ribbons. Productivity Gains Implementing the web throughout an organization means improved productivity. For example IBM embodied the web into every corner of the firm products, marketing, and practices. Teamwork It has made the interaction easier through e-r ing armors.It has transform the way organizations interact with suppliers, vendors, business partners, and customersmail is one example of how mint work to exchange selective education and work on solutions Information Sharing, Convenience, and Control Electronic commerce improves learning sharing surrounded by merchants and customers and promotes quick, estimableintime deliveries. They can interact at any time through internet without any traffic jams, no crowds etc. Disadvantages of Ecommerce Security Security march ons to be a problem for online businesses. A customer does not emotional state confident about the secrecy of the retri stillion process before they purchase anything. wildcat access and hacking of information argon the major concern. System and information Integrity Data protection and the integrity of the trunk are serious concerns. Viruses cause unnecessary ticks, record backups, storage problems, danger of hacks and other convertible difficulties. System Scal king A business develops an interactional interface with customers with a website. A website essential be scalable, or upgradable on a regular basis to make sure customers remain with them. Ecommerce is not free Establishing a web found organization involves huge funds or investment by the management. Brands are judge to lower search costs, build trust, and progress lineament. Customer Relations ProblemsIt is the foremost neutral of the organization to maintain the customers loyalty with them because they cannot survive in the market for long term without them. Products People wont buy online People mostly dont prefer to buy furnitures for ex, online because they want to sit on it olfactory sensation the texture of the fabric and therefore a website called furniture. com or living. com, piddle failed. Fake sites in that prize are many bad sites which eat up customers money. Product quality There is no guarantee of product quality as customers cannot touch or turn out the product before the deal. pic Security is a real problem in web commerce. Security issues are rising day by day in web commerce and have fit a major problem in the economy.The opaqueness of entropy collection methods on the World Wide Web has given rise to cover concerns among profit users. The number of hacking cases has go up and fake sites are countless on net. From this we can assume how secure our business transactions on the internet. To overcome this problem many software package product such as firewall, etc has been developed and installed in the organizations database so that the information is been secured from outside users. Security means freedom from risk and danger. In e-business security is the main concern of the business. How safe you are while conducting business on internet is the issue of nowadays. Consumers fear the loss of their fiscal data, and e-commerce sites fear the financial losses.Studies have shown that consumers are concerned abo ut the lack of privacy on the Web. For example, Ryker et al. 2002 quote a ex compilediture Water House Coopers study indicating that 92% of consumers are worried about privacy, with 61% refuses to shop online. Forrester research has found that privacy fears inhibit nearly 50% of consumers from shopping online and suggests that consumers often decline to provide data requested by websites and provide traitorously information. Online privacy and online security are distinct. screen concerns arise when consumers personal information is retrieved online without the consumers fancy or knowledge and is sold to third parties without the consumers consent or knowledge.Whereas, online security relates to the confidentiality of the information, systems ability to secure itself against the conduct of unlicensed third parties, such us hackers, who travail to access the Web sites stored information. Security Issues in web commerce- Three types of security threats 1. demur of service, 2. U nauthorized access, and 3. thieving and fraud 1). self-discipline of Service (DOS)- Two primary types of DOS attacks spamming and viruses a) Spamming Sending unsolicited mercantile emails to individuals netmail bombing caused by a hacker targeting one computing device or network, and move thousands of email messages to it. Surfing involves hackers placing software agents onto a third-party system and setting it off to trust requests to an intended target.DDOS (distributed denial of service attacks) involves hackers placing software agents onto a number of third-party systems and setting them off to simultaneously send requests to an intended target. b) Viruses self-replicating computer schedules designed to perform unwanted events c) Worms especial(a) viruses that spread using direct Internet connections d) Trojan Horses disguised as legalize software and trick users into running the program 2). Unauthorized access a) Illegal access to systems, applications or data b) Passi ve unauthorized access listening to confabulations melodic line for finding secrets. May use content for damaging purposes c) Active unauthorized access. Modifying system or data. Message stream limiting Changes intent of messages, e. g. to abort or delay a negotiation on a contract d) Masquerading or spoofing sending a message that appears to be from someone else. Impersonating some other user at the name (changing the From field) or IP levels (changing the source and/or computer address IP address of packets in the network) e) Sniffers software that illegally access data traversing across the network. 3). Theft and fraud a. Fraud occurs when the stolen data is used or modified b. Theft of software via illegal copying from companys servers c. Theft of hardware, ad hocally laptops, pen drive, cds, hard disk etc. E-COMMERCE trade protection TOOLS- 1. Firewalls- software and hardware 2. digital certificates 3. digital signatures 4. ublic key infrastructure 5. encryption software 6. Biometrics- retinal scan, fingerprints, voice, etc. 7. passwords 8. Locks and bars- network trading operations centers. An example- Driven by information preservation rules, corporations within the financial services sector have begun to seek financial aid from companies such as ZANTAZ, a leash provider of Compliance Technology Solutions. With the help of companies like ZANTAZ, a corporation can deploy proactive compliance initiatives that a) automatically capture, archive and instantly retrieve email, attachments, and IM b) monitor and supervise email, IM and other electronic communication and ) Quickly restore data from back-up tapes in the event of an audit, litigation or investigation. Companies like ZANTAZ have gone to great lengths to invest a corporation to quickly, efficiently, and cost efficaciously deploy proactive compliance solutions associated with electronic communication preservation, supervision, and record-keeping regulations. Example- Facebook s ecurity issues One of the example of the company facing security issue worldwide is Facebook. Facebook has been under heavy attack since the last two year as the popular loving networking site has become the victim of a tough hacking offer affecting nearly every user on the site. it has become a severe problem worldwide and is still increasing.The hacks do not seem to have specific targets but happen at stochastic with some users news prevails being littered with objectionable content and others not seeing anything. This led to the temporarily pulley-block of site and unable to access the information by the users. Some of the hacks happen in the form of click spam being sent out. A popular spam involves Kim Kardashian with a associate to a television system. It will severalize something like After watching this video I lost all respect for Kim. Upon clicking, the link takes the unsuspecting person nowhere, and hacks the account sending the same spam to all of the users frie nds. Other spams include mass messages and tagged photos leading people to believe they are in the link or involved with it because it is not personalized.Those will also have the same result, and continue the spamming of others walls. Impact on customer Users are outraged and some are considering deleting their profiles. Actress and director, Courtney Zito, told The ChristianPost, I have 5000 friends. My feed is littered with porn. I cant even check my news feed with anyone around because of it. This led to the decrease in the market share and people have removed their pictures and are now scared of posting anything on profile. Computer hackers attempt to break into at least 600,000 Facebook accounts using stolen username and password details every day, the social networking giant have revealed.The latest revelation came after Facebook issued a security annunciation promoting its new Trusted Friends password takings technique. Many of the hackers are caught out by additional aut hentication questions, such as asking users to identify friends in pictures, but many attempts are successful. this problem has helped grant to the demise of Myspace a couple of geezerhood ago. The spam ran rampant ultimately causation many of the users to switch to the safer Facebook. pic Conclusion Security is now understood to be largely imperfect, the continual cat-and-mouse game of security able and hacker. Important technical developments have been deployed in the last five years however, it is clear that organizational policies may play as an important role in site security.The results of this study provide support for the arrogance that consumer e-commerce adoption/rejection decisions are determined by rational behavior in monetary value of channel net value seen as the perceived balance of power between the overall benefits that are likely to return by using the Internet, and the overall barriers encountered to using it or to deriving the sought benefits Internet ad opters, and especially the consumers who have embraced online shopping, perceive the essence benefits of e-commerce as exceeding the total impediments to encompass/using e-commerce, whereas Internet non-adopters consider the impediments to e-commerce as drastically surpassing the benefits offered by the commercial Internet. VIPER REPORT pic SOURCES 1. http//www. allbusiness. om/technology/software-services-applications-online-security/11565464-1. htmlixzz1kNGJjj94 2. http//www. allbusiness. com/technology/software-services-applications-online-security/11565464-1. html 3. www. manjeetss. com/ conditions/advantagesdisadvantagesecommerce. htm 4. http//www. allbusiness. com/technology/software-services-applications-online-security/11565464-1. htmlixzz1kNOllPwd 5. http//www. pcworld. com/article/160545/facebook_hit_by_five_security_problems_in_one_week. html 6. http//www. dailymail. co. uk/sciencetech/article-2054994/Facebook-hackers-attempting-crack-600-000-accounts-day. html 7. http/ /www. eecs. umich. edu/ackerm/pub/03e05/EC-privacy. ackerman. pdf

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.