• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Discuss security issues in e-commerce.

Extracts from this document...

Introduction

Transfer-Encoding: chunked ´╗┐Firewall can block Trojans. These can latch onto your computer files, then when you send a file they go with the file and makes more damage where it is received. They are very dangerous as they transmit what they undercover about you on a web server. A firewall blocks them from the outset, before they have a chance to infect your computer. They are used mainly to prevent hacking. Without firewall security, a hacker could get a hold of your computer and make it a part of what?s called a botnet, which is a large group of computers used to conduct illicit activity, such as spreading viruses. A firewall prevents such peeping-tom intrusions. Having firewall security will reduce the risk of key loggers monitoring you. A key logger is spyware software that cybercriminals try to put on your computer so they can target your keystrokes. After they can identify what you're typing in and where, they can use that information to do the same thing. This knowledge can help them log in to your private online accounts. Firewalls are central points of attack. ...read more.

Middle

If it expires then a pop up will be shown to customers saying the site is no longer secure which means they are unlikely to continue. Having a strong password is very beneficial and is sure to protect from any malicious activity. If you have a strong password nobody can access your account and gain all your personal information. It also means no malicious software can break the password either, if it contains a mixture of letters, numbers, symbols, capital and lower case letters nothing will be able to break it and steal all your personal information. The main and only disadvantage of having a strong password is forgetting it. If it has lots of symbols and letters it?s hard to actually remember it which means you could be locked out of accounts. It?s also unsuitable at most times to write the password down somewhere to remind you which means that it is easily forgotten. Captcha is a way to differentiate between an automated computer program and a human. It is a box with distorted text that must be translated in order to enter email services, online polls, and to complete online purchases. ...read more.

Conclusion

Some firewall or proxy systems may not allow access to HTTPS sites. Sometimes this is simply because the administrators have forgotten to allow for HTTPS. However sometimes it is a conscious security decision: since HTTPS connections are end-to-end encrypted, they can be used to carry any traffic at all. Allowing them through a firewall, which then has no way to look inside the data stream, could allow any sort of data transfer. Digital certificate is an encryption technology. It does this by using public key and private key information. The digital certificate authenticates the identity of the sender to ensure safer communication and prevent fraud on the Internet. By encrypting communications such as emails, logins or online banking transactions it means that it protects private data and prevent the information from being seen by unwanted people. They are also user friendly, they work automatically and require minimal involvement. It is not 100% effective. In 2011, Dutch digital certificate authority called DigiNotar was compromised by hackers. Since time certificate authorities are in charge of issuing the certificates, hackers target them in order to manipulate information. As a result hackers can create websites of send emails that look real and pass certification tests but are really fraudulent. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Marked by a teacher

    Investigating a Transactional Website (www.latestdvd9.com)

    4 star(s)

    only movies on DVDs. The majority of its movies are Hollywood; however there are also movies from other film industries available such as Bollywood, and Cinemas of other countries. The DVDs come in a DVD sleeve, which also protects the disk from damage.

  2. Marked by a teacher

    Social Implications of E-Commerce

    This has affected the amount of jobs available in retail, not all that long ago it was easy to walk into a local high street job with a CV and be offered a job on the spot, nowadays there are much less jobs available at this level which has left a big chunk of the unskilled workforce unemployed.

  1. IT Security Threats to Users and Businesses.

    Technical failures Another threat is technical failures because it can be a risk even with the technology becoming more realiable. A technical failure could mean a loss for the business. Anything from an internet connection not working to servers not working can leave not only the business but also the

  2. From the e-commerce strategy you gave me earlier I understand that by having a ...

    If the retailer does not do this, you get money off the purchase price or money back relative to how much the product has been used. If the retailer uses to repair your product, you can get a third party to repair the goods and claim back the costs from the retailer.

  1. Analysis Tools

    With a dataflow diagram, users are able to visualize how the system will operate, what the system will accomplish, and how the system will be implemented. The old system's dataflow diagrams can be drawn up and compared with the new system's dataflow diagrams to draw comparisons to implement a more efficient system.

  2. Before the system can be installed and used by hatch end cars it is ...

    Test 12- Printing off member details: Input- Click on Print Member Details in the Reports menu and enter '11' as the parameter. Actual output- A hard copy showing details of member ID 11 was printed out. In the Reports menu, I clicked on Print Member Details and then entered a valid member ID (i.e.

  1. Unit 34: E-commerce

    E-commerce allows stores to source their supplies from anywhere in the world, depending on size and weight of products and a wider range of information and actual suppliers are available. High street stores are facing financial challenges as a result of E-commerce; mainly due to the high overheads that they are paying.

  2. Communications Protocol

    The Internet Protocol was developed to create a Network of Networks, the Internet. Sockets - This is the name given to the package of subroutines that provide access to TCP/IP on most systems. Each technology has its own convention for transmitting messages between two machines within the same network.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work