• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Discuss security issues in e-commerce.

Extracts from this document...

Introduction

Transfer-Encoding: chunked ´╗┐Firewall can block Trojans. These can latch onto your computer files, then when you send a file they go with the file and makes more damage where it is received. They are very dangerous as they transmit what they undercover about you on a web server. A firewall blocks them from the outset, before they have a chance to infect your computer. They are used mainly to prevent hacking. Without firewall security, a hacker could get a hold of your computer and make it a part of what?s called a botnet, which is a large group of computers used to conduct illicit activity, such as spreading viruses. A firewall prevents such peeping-tom intrusions. Having firewall security will reduce the risk of key loggers monitoring you. A key logger is spyware software that cybercriminals try to put on your computer so they can target your keystrokes. After they can identify what you're typing in and where, they can use that information to do the same thing. This knowledge can help them log in to your private online accounts. Firewalls are central points of attack. ...read more.

Middle

If it expires then a pop up will be shown to customers saying the site is no longer secure which means they are unlikely to continue. Having a strong password is very beneficial and is sure to protect from any malicious activity. If you have a strong password nobody can access your account and gain all your personal information. It also means no malicious software can break the password either, if it contains a mixture of letters, numbers, symbols, capital and lower case letters nothing will be able to break it and steal all your personal information. The main and only disadvantage of having a strong password is forgetting it. If it has lots of symbols and letters it?s hard to actually remember it which means you could be locked out of accounts. It?s also unsuitable at most times to write the password down somewhere to remind you which means that it is easily forgotten. Captcha is a way to differentiate between an automated computer program and a human. It is a box with distorted text that must be translated in order to enter email services, online polls, and to complete online purchases. ...read more.

Conclusion

Some firewall or proxy systems may not allow access to HTTPS sites. Sometimes this is simply because the administrators have forgotten to allow for HTTPS. However sometimes it is a conscious security decision: since HTTPS connections are end-to-end encrypted, they can be used to carry any traffic at all. Allowing them through a firewall, which then has no way to look inside the data stream, could allow any sort of data transfer. Digital certificate is an encryption technology. It does this by using public key and private key information. The digital certificate authenticates the identity of the sender to ensure safer communication and prevent fraud on the Internet. By encrypting communications such as emails, logins or online banking transactions it means that it protects private data and prevent the information from being seen by unwanted people. They are also user friendly, they work automatically and require minimal involvement. It is not 100% effective. In 2011, Dutch digital certificate authority called DigiNotar was compromised by hackers. Since time certificate authorities are in charge of issuing the certificates, hackers target them in order to manipulate information. As a result hackers can create websites of send emails that look real and pass certification tests but are really fraudulent. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Marked by a teacher

    Database Coursework on a Vehicle Rental System: Analysis

    5 star(s)

    These documents can include things such as source documents, customer invoices and delivery notes, which will enable me to construct an image of the information flows between input and output. The records and procedure manuals of the business can also be examined.

  2. Marked by a teacher

    Investigating a Transactional Website (www.latestdvd9.com)

    4 star(s)

    film, which would make this website less easy to use and it might cause less customers to buy the DVD. Reviews are not available on this website, but they can be found on other websites that deal with movie reviews.

  1. Marked by a teacher

    Assignment A: Analysis of Transactional Website

    3 star(s)

    to make additional checks on your credit card Shirts with additional name, numbering and badges added may take an extra few days to despatch. When viewing a product on their website they provide various bits of important information about the product that the customer may need to know before purchasing it, for example the size.

  2. Marked by a teacher

    Social Implications of E-Commerce

    The main way today's shopping experiences differ from those of the past is the accessibility of an endless array of products. Shopping is now a much more global experience.

  1. IT Security Threats to Users and Businesses.

    individual worker restless as many things now get completed over the systems, so any failure would distrupt this. Human errors Human errors can cause many system failures such things as lack of knowledge, ignorance and forgetfulness can all play a part in the way human errors occur.

  2. From the e-commerce strategy you gave me earlier I understand that by having a ...

    The Data Protection Act covers all data within your company so it is important as you said. The Data Controller in your company has to register with the Information Commissioners Officer (ICO); failing to do so is a criminal offence.

  1. Before the system can be installed and used by hatch end cars it is ...

    "The value you entered isn't valid for this field." 7 Entering the county of a member in the Members form. The county typed in is not "Middlesex". The county has been wrongly entered. The county has to be "Middlesex". 8 Entering the Car ID of a car in the Rentals form.

  2. Unit 34: E-commerce

    become redundant; this loss of high street stores lowers the quantity of jobs in retail - however more businesses are becoming 'clicks' causing a high demand of warehouse (low-wage) workers and IT specialists (high-wage). E-commerce has also enabled people to carryout a whole series of tasks, which they would usually do by post or telephone, online.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work