• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Explain the potential risks to an organisation of committing to an e-commerce system

Extracts from this document...

Introduction

Transfer-Encoding: chunked I am working for a firm of e-commerce consultants. I have been asked to write a report to a start-up businesses explaining the potential risks to an organisation of committing to an e-commerce system. Any business that operates online is at risk of many internet threats so it?s important that there is sufficient security to prevent any malicious harm to the business. One the main problem that happens is identity theft. This can make customers the victims of serious fraud and damage caused by viruses can close businesses down. It?s Important that businesses show that they are safe for their customers so they will want to continue using the site. Hacking is a major problem within e-commerce. Hacking is when somebody gains unauthorised access to data in a system or computer. E-commerce businesses need to prevent hacking from occurring so that the day to day running of the businesses isn?t disturbed and to make sure customer details are not stolen and used for fraud. ...read more.

Middle

Identity theft is a risk that can also be dangerous for a business. Identity theft is the fraudulent practice of using somebody else?s name and personal information in order to obtain credit. Identity theft is hard to detect if the thief has a lot of information about the victim. Tracing the thief is also very difficult. Lots of details are stored by an e-commerce site including, banking details, name, address and date of birth which make it easy for someone to use the details for fraud. It?s important that e-commerce business use every method to stop unwanted access. Such as using a firewall as previously mentioned of secure sockets layer (SSL). SSL is a computing protocol that ensures the security of data sent via the internet by using encryption. It provides authentication, meaning that the server and the client need to be identified and confirm that they are who they say they are. ...read more.

Conclusion

It?s also important to change the password every 90 days to keep it up to date and limiting a hacker?s ability to gain access to your details. There is software that can try and break passwords to steal personal information and therefore, it?s important it is difficult and is updated regularly. Lastly, there are other alternative authentication methods. These may include pattern authentication, fingerprint scanning, voice authentication or digital signatures. An alternative authentication method in e-commerce is a good idea to provide an extra layer of security. This might be voice authentication which can stop potential hackers from pretending to be another customer as it is a very unique way of authentication. Other means of alternative authentication methods are a very unique to the user, only the user can talk in there voice or remember a digital signature or pattern. This allows the user to have a better choice of a memorable user identification method. Overall, there are many ways to protect personal information from being stolen. It?s important to make sure you have many security measures in place in order to keep everything secure. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Marked by a teacher

    Database Coursework on a Vehicle Rental System: Analysis

    5 star(s)

    The staff details are collected by the manager when a person first becomes a staff member. The details collected are Staff Name, Street Address, Town, County, Postcode, Telephone Number, Mobile Phone Number, Working Hours, Job Description and Date Employed. The vehicle details are collected by the vehicle controller from the manufacturer when a new vehicle is ordered.

  2. Marked by a teacher

    Social Implications of E-Commerce

    If a business is not successful the costs are easily written off. Advertising a new online business can often be done for free, most company?s now have Facebook and twitter pages to advertise their business and huge interest can be generated in a business if they ?go viral? ? this

  1. Unit 1 business at Work How ICT is used within the Organisation

    Al information that everyone in the workplace needs to know is put up on the notice board for all to see. This way employee's can see how well the business is doing at any point or can be informed of when holiday sheets have to be brought back into work before a certain date.

  2. Data Processing Task. Mr Peters, the man who runs this particular Samsung store ...

    =([Subtotal]+[VAT]+[Delivery Price]) VAT This is calculated by multiplying the subtotal by 0.2 =[Subtotal]*0.2 Subtotal This is multiplying the quantiy by the total price. This will be done by using a text box in the subform. The textbox is called Text16 =[frmOrderDetails Subform].[Form]![Text16] Data dictionary: Primary key field: Provides information about an entity and uniquely identifies the entity.

  1. report for organisation

    * Add more information and details to it so the letter becomes more informative and suit the purpose of it. * Make the background and foreground more colourful to match with the aim of the letter. * Change the font size and style so the text becomes more fascinating.

  2. Database Coursework on a Rental System: Design

    Entity Relationship Modelling: - Relationships between entities will be created using Access's relationship function. There are various degrees of entity relationships that can be designated; One-to-one, one-to-many and many-to-many. In one-to-one entity relationships, for every instance that one of the entities in the relationship occurs once, the other entity occurs once as well.

  1. Various computing questions

    It could be a built in feature as is in laptops or can be attached externally. Mouse has three main functions, Left key, right key and Drag. The information or command made through mouse is treated as input and is sent to the operating system which accept that input as

  2. Evaluate the use of e-commerce in a brick and click organisation

    It is relatively easy to navigate around a store but it?s much easier online as you can search for the specific item in the search bar which you cannot do in a store, you have to find it yourself. However, brick stores do have an advantage for their layout.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work