• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Security Issues of E-Commerce

Extracts from this document...

Introduction

Ricki Lambert E-Commerce Assignment 3 - Security Issues Introduction In this assignment I shall be looking at the security implications of shopping on the internet, and will also be evaluating, the reasons, why I think that the security flaws to internet shopping are minimal. Task 1 Firstly, when looking at the security implications imposed on the internet we need to consider who the flaws are going to effect. In most cases it will be the consumer, who, ultimately will be parting with their money. Now we have considered the main threatened party we must consider what can actually affect them. These shall be listed below, whilst also taking in to consideration the effects on shop owners and other parties. Consumer: The biggest problem that the consumer faces is that their private details are to be entered in to WebPages and then they disappear, somewhere over the internet and they have no idea where it has gone. As far as their concerned any one could access this information and then commit a fraudulent activity and steal there money. To counter this many things have been put in to place, but these will be talked about at a later stage. The problem that many of today's public are facing is the increased attempts of members of the community in trying to steal and take others peoples money and details. For this reason many people turn away form e-commerce and stick to the more "traditional methods of purchasing, bricks and mortar being the main way. Business Users: When thinking of the business we have a few more worries that are a little deeper than the consumer's issues. For the business there is more on the line, normally a lot more money involved, a lot more information to be stolen and normally tend to be a bigger target for attack. With this in mind the businesses have to be a lot more careful. ...read more.

Middle

It is the claims of e-tailors and telecommunication companies that this ability to gain information will help these companies to greater understanding of the consumer's needs. However should the law allow companies to use this information as they want? The answer is no. If you walk in to a shop, pay by card; do you no what happens to your information? Most people now days don't even consider it any more. This is because they no (or hope) that it's going to be protected. Well it has to be by law and this is the same for e-commerce. So when comparing data security as far as keeping it and not distributing it then the e-commerce world is just as safe as the manual, bricks and mortar methods. SSL (Secure Sockets Layer) When using the internet there are many differing types of protocols that are used. The protocol is a method of describing how certain things should be carried out in order for the process to be completed successfully. In this case the secure sockets layer uses the methods of encryption and decryption. To do so an algorithm must be implemented. Further to this the business tends to adopt a further network called a virtual circuit which is actually devoted to the encryption and decryption process. This is a very secure method of transferring data and therefore means the susceptibility of hackers successfully gaining detailed information is kept to a minimum. Dedicated, protected servers back up the process of SSL and in doing so means all transactions can be kept separately so that any unauthorised access can be avoided. It is the servers ultimately that are protected by the SSL and therefore the process needs to be set-up by the business in the first place. If this is done it is a very effective method in preventing unwanted intrusion or data loss. In comparison to the day to day, brick and mortar methods we see a similar stance, an encrypted process when entering the pin ...read more.

Conclusion

To protect against the Trojan Horse there isn't much the bank can do, unless its obviously their end there protecting opposed to the users end, in which case both would supply their own anti virus which constantly monitors activities on the machines. Used in conjunction with firewall software and both ends should be just fine. If all the above processes are followed then the user should have no problems carrying out their banking tasks online and there would be a very minimal risk. Obviously the banks implement other security features, but those are much more advanced. EBAY EBay and similar places actually have security limitations, in fact with such a number of people using the site it makes it a prime target for attacks. And, we can to see it counters these problems in the same sort of way as the banks. EBay has been caught out a couple of times, but with the millions of people that use it two times isn't bad. Ebay uses exactly the same system as the banks, but the big difference is that the money exchange is done using a third party called pay pal. This means that all users they can be rest assured knowing all that can be done is the losing of there personal details. If a hacker did get my details he or she couldn't access pay pal without having the separate login information, thus limiting the potential of theft. As well as this EBAY will have all the same digital signature software, anti virus software and things that the banks have. Maybe a little less strict though. Conclusion Overall I can see that there are many features that are included to make the shopping experience of e-commerce safer than the day to day method of the bricks and mortar stores. However we must conclude that the task of completely eradicating all security errors is almost absolutely impossible. There will always be a threat no matter how good your defence is and it's just a case of trying to make systems as secure as possible. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Peer reviewed

    Organisational system security - The possible security issues which exist within the FilmPoster.com system

    3 star(s)

    to overload or shut down a service they usually attack and target web servers aiming to make a website unavailable and no longer accessible to the users. The most common way of attack used is by sending traffic and overloading a computer and using botnet to flood a web server with request.

  2. I have been given the task of creating a system for a hospital to ...

    Throughout the entire program I have included macro buttons, not only to perform challenging task and to save time but also so that the user can easily navigate around the program. On every page there are buttons which can take you back to the main menu or to another menu.

  1. LAN & WAN Protocols

    It used within an autonomous system (AS). IGP is divided into two groups Distance-Vector Routing Protocol and Link-State Routing Protocol. It is used in contrast with EGP with is the opposite Exterior Gateway Protocol is used to determine network reachability between AS and it uses IGP to resolve routes within the AS. RIP Routing Information Protocol (RIP)

  2. Free essay

    Incentives and Barriers to E-commerce

    By doing this the maximum chance for revenue maximization is increased greatly. * By setting up a forum on the webpage we can see what the users think of our products when they have purchased them. This will then help us to specifically identify problems and issues where we may not in a shop.

  1. I have been given the task to design a database for a company called ...

    * Price lists which specification says must be included. This will be used for hard evidence on the prices and may be used when re-pricing the cost of sending parcels. * Manager's statistics which were also specified in the specification. METHODS OF DATA ENTRY The user only needs to enter data into the database about the customer, parcel, destination and order.

  2. What are Internet Business models? Give examples of them. Outline how they might ...

    Java is designed to run on any computer or computing device, regardless of the specific microprocessor or operating system it uses. Hence, it is important for Internet, since it can run on any client. Java can be used to create miniature programs called Applets designed to reside on centralized network servers.

  1. Unit 10 Server-side scripting of web pages part 2

    Heat Sink & Fan - A heat sink is specifically designed to reduce the temperature of an electronic device by releasing the heat into the surrounding air (case fans would then push out this hot air while pulling in cool air).

  2. Coursework 1 (c)Install Apache Web Server on Unix ...

    &sa, sizeof sa); if (err < 0) { printf("%s %-5d %s\r", argv[1], i, strerror(errno)); } else { printf("%s %-5d accepted. \n", argv[1], i); if (shutdown(net, 2) < 0) { perror("\nshutdown"); exit(2); } } close(net); } fflush(stdout); return (0); } Structure of the program 1.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work