• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Discuss security issues in e-commerce.

Extracts from this document...

Introduction

Transfer-Encoding: chunked ´╗┐Firewall can block Trojans. These can latch onto your computer files, then when you send a file they go with the file and makes more damage where it is received. They are very dangerous as they transmit what they undercover about you on a web server. A firewall blocks them from the outset, before they have a chance to infect your computer. They are used mainly to prevent hacking. Without firewall security, a hacker could get a hold of your computer and make it a part of what?s called a botnet, which is a large group of computers used to conduct illicit activity, such as spreading viruses. A firewall prevents such peeping-tom intrusions. Having firewall security will reduce the risk of key loggers monitoring you. A key logger is spyware software that cybercriminals try to put on your computer so they can target your keystrokes. After they can identify what you're typing in and where, they can use that information to do the same thing. This knowledge can help them log in to your private online accounts. Firewalls are central points of attack. ...read more.

Middle

If it expires then a pop up will be shown to customers saying the site is no longer secure which means they are unlikely to continue. Having a strong password is very beneficial and is sure to protect from any malicious activity. If you have a strong password nobody can access your account and gain all your personal information. It also means no malicious software can break the password either, if it contains a mixture of letters, numbers, symbols, capital and lower case letters nothing will be able to break it and steal all your personal information. The main and only disadvantage of having a strong password is forgetting it. If it has lots of symbols and letters it?s hard to actually remember it which means you could be locked out of accounts. It?s also unsuitable at most times to write the password down somewhere to remind you which means that it is easily forgotten. Captcha is a way to differentiate between an automated computer program and a human. It is a box with distorted text that must be translated in order to enter email services, online polls, and to complete online purchases. ...read more.

Conclusion

Some firewall or proxy systems may not allow access to HTTPS sites. Sometimes this is simply because the administrators have forgotten to allow for HTTPS. However sometimes it is a conscious security decision: since HTTPS connections are end-to-end encrypted, they can be used to carry any traffic at all. Allowing them through a firewall, which then has no way to look inside the data stream, could allow any sort of data transfer. Digital certificate is an encryption technology. It does this by using public key and private key information. The digital certificate authenticates the identity of the sender to ensure safer communication and prevent fraud on the Internet. By encrypting communications such as emails, logins or online banking transactions it means that it protects private data and prevent the information from being seen by unwanted people. They are also user friendly, they work automatically and require minimal involvement. It is not 100% effective. In 2011, Dutch digital certificate authority called DigiNotar was compromised by hackers. Since time certificate authorities are in charge of issuing the certificates, hackers target them in order to manipulate information. As a result hackers can create websites of send emails that look real and pass certification tests but are really fraudulent. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Marked by a teacher

    Investigating a Transactional Website (www.latestdvd9.com)

    4 star(s)

    bank account details: If there was no IP recorded, this would mean that everybody would be able to do fraud on the website, without anybody being able to chase you. This would make the website very unsafe for themselves and the business would rather go down, as fewer honest customers will be there and more criminals would be their customers.

  2. Marked by a teacher

    Social Implications of E-Commerce

    The main way today's shopping experiences differ from those of the past is the accessibility of an endless array of products. Shopping is now a much more global experience.

  1. The Impact of Mobile Phones on social Interaction

    Another significant finding that was made showed that 96% of individuals, who had used WAP from their phone, used it for information retrieval purposes and to check information such as the latest football scores, email and news. Only 4% had used their WAP phone for commercial use.

  2. This research that I've done will discuss about the effectiveness of the Light Railway ...

    This increased by 50.5% to reach 8.1 million vehicles in 1997, with motorcycles accounting for 53% of the total, followed by motorcars 40% and goods vehicles 7%. The number of vehicles per 100 populations, which is an indicator of the quality of life of the population, increased from 27.6 in 1993 to 37.6 in 1997.

  1. IT Security Threats to Users and Businesses.

    This means that the systems should be able to cope with extreme disasters, things that can be done are using remote storage of data and backing up the files everyday so that you always have a copy. You have to make sure that you have your data save and secure for if and when these disasters strike.

  2. From the e-commerce strategy you gave me earlier I understand that by having a ...

    As Bolton Area Divers may want to access environmental information, it is useful to know that everyone has access to this information under the Environmental Information Regulations. The sort of information you can access is air and water quality, noise and waste as well as any decisions, activities or policies which could affect them.

  1. Analysis Tools

    Each data flow may be referenced by the processes or data stores at its head and tail, or by a description of its contents, customer details to customer inventory. Fig. 1 An example of a data flow diagram. It also focuses on the processes that transform incoming data flows (inputs)

  2. Before the system can be installed and used by hatch end cars it is ...

    "Prices for cars have been successfully updated" Pass. None needed. 18 Password. Normal data and unit testing. Enter 'pakiza' when the user is prompted for a password in the process of opening the system. The system should successfully open. Pass.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work