• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Discuss security issues in e-commerce.

Extracts from this document...


Transfer-Encoding: chunked ´╗┐Firewall can block Trojans. These can latch onto your computer files, then when you send a file they go with the file and makes more damage where it is received. They are very dangerous as they transmit what they undercover about you on a web server. A firewall blocks them from the outset, before they have a chance to infect your computer. They are used mainly to prevent hacking. Without firewall security, a hacker could get a hold of your computer and make it a part of what?s called a botnet, which is a large group of computers used to conduct illicit activity, such as spreading viruses. A firewall prevents such peeping-tom intrusions. Having firewall security will reduce the risk of key loggers monitoring you. A key logger is spyware software that cybercriminals try to put on your computer so they can target your keystrokes. After they can identify what you're typing in and where, they can use that information to do the same thing. This knowledge can help them log in to your private online accounts. Firewalls are central points of attack. ...read more.


If it expires then a pop up will be shown to customers saying the site is no longer secure which means they are unlikely to continue. Having a strong password is very beneficial and is sure to protect from any malicious activity. If you have a strong password nobody can access your account and gain all your personal information. It also means no malicious software can break the password either, if it contains a mixture of letters, numbers, symbols, capital and lower case letters nothing will be able to break it and steal all your personal information. The main and only disadvantage of having a strong password is forgetting it. If it has lots of symbols and letters it?s hard to actually remember it which means you could be locked out of accounts. It?s also unsuitable at most times to write the password down somewhere to remind you which means that it is easily forgotten. Captcha is a way to differentiate between an automated computer program and a human. It is a box with distorted text that must be translated in order to enter email services, online polls, and to complete online purchases. ...read more.


Some firewall or proxy systems may not allow access to HTTPS sites. Sometimes this is simply because the administrators have forgotten to allow for HTTPS. However sometimes it is a conscious security decision: since HTTPS connections are end-to-end encrypted, they can be used to carry any traffic at all. Allowing them through a firewall, which then has no way to look inside the data stream, could allow any sort of data transfer. Digital certificate is an encryption technology. It does this by using public key and private key information. The digital certificate authenticates the identity of the sender to ensure safer communication and prevent fraud on the Internet. By encrypting communications such as emails, logins or online banking transactions it means that it protects private data and prevent the information from being seen by unwanted people. They are also user friendly, they work automatically and require minimal involvement. It is not 100% effective. In 2011, Dutch digital certificate authority called DigiNotar was compromised by hackers. Since time certificate authorities are in charge of issuing the certificates, hackers target them in order to manipulate information. As a result hackers can create websites of send emails that look real and pass certification tests but are really fraudulent. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Marked by a teacher

    Investigating a Transactional Website (www.latestdvd9.com)

    4 star(s)

    Another method used by the website to retain its customers is showing a list of the most popular DVDs of the week. This is a list showing the top 20 most purchased films of the wee. To see that list you have to click on TOP BOX OFFICE in the navigation bar, which has the background colour red.

  2. Marked by a teacher

    Social Implications of E-Commerce

    ________________ Many customers will not buy from a website that does not have a reasonable returns policy, which means the cost of sending back unwanted or damaged items could leave the company out of pocket.

  1. From the e-commerce strategy you gave me earlier I understand that by having a ...

    Data should be "adequate, relevant and not excessive".[1] IV. The information must be accurate and up to date and kept for no longer than necessary. V. Data should be kept for no longer than absolutely necessary. VI. Data should be processed in line with your rights.

  2. IT Security Threats to Users and Businesses.

    This means that the systems should be able to cope with extreme disasters, things that can be done are using remote storage of data and backing up the files everyday so that you always have a copy. You have to make sure that you have your data save and secure for if and when these disasters strike.

  1. Unit 34: E-commerce

    However E-commerce businesses simply have to change their databases. E-commerce has also opened a wide range of services and products that were formerly unheard of. This includes social networks such as: Facebook, MySpace, and Twitter. Also allows e-based services such as Google, an internet search engine that also supplies online maps and a variety of other services.

  2. What is networking?

    Ethernet or token ring is still common with this size network. * Large Networks: usually involve many floors or areas in a building and serve a large organisation with diverse needs. This again is segmented into logical parts for security to share the load on servers and the need to balance bandwidth for best performance.

  1. This report seeks to study the social phenomenon of Short Messaging Service (SMS) and ...

    [19] This amount corresponds to the increase in talktime, and SMS sent. In fact, users spend "202,940,000 hours on the mobile phone and 82 billion text messages a year". [19] Generally, the people involved in this telecommunications market are the consumers (users), and the companies (organisations) that offer such services.

  2. Network Security

    It enables the user to have an access to the network and the data and software on the server. Circuit: The circuit is the route or the medium through which the message travels. Nowadays the fibre optic cable and wireless transmission are becoming increasingly common.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work