Thursday, June 20, 2019

The security technology of e-commerce Essay Example | Topics and Well Written Essays - 2000 words

The security technology of e-commerce - Essay ExampleMost reputable financial institutions and e-commerce service providers take all measures to protect the selective information and transactions online and simultaneously they provide the details to the customers, how to protect their transaction. Although the risks are generally avoided while dealing with internet transactions, even then the threats are enormous. The various threats take cyber terrorism, credit card number may be intercepted, cyber attacks during the war on terrorism, viruses and worms, hacking and malware techniques, one of the service providers may deny that the deals ever took place, hackers may exploit information from web page due to some improper security measures, hackers may gain access to the system. nearlytimes customers may also become a victim of identity theft. According to a survey conducted by the US Department of Justice (DOJ), identity theft is affecting millions of household in the US and cost an estimated $ 6.4 billion per year. To avoid all these consumers must take some proactive steps and practices to access the computer before carrying out any financial transaction. Some of the most common practices include the use of updated versions of packet and operating systems, ensure proper network security, avoid opening unknown emails and attachments, use of passwords, use of updated antivirus software and use of encryption.In the present paper, the author attempts to deal with the type of risks purchasable to the internet user, the present security system available to the consumers and future security trends. trends. The finding of available security system has been summarized.3.0 RESEARCH HYPOTHESIS STATEMENTWhile going before the literature as cited in bibliography, author made an attempt to a hypothetical statement as , Are the current security systems able to provide security to the e-commerce users4.0 EXPLANATION OF THE TECHNOLOGY4.1 BACKGROUNDIn the early 1990s dig ital break-ins, kidnapping were the terms used by many popular journals to hackers. The early targets were educational institutes and

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.