Friday, May 24, 2019

E-Commerce Security Issues

pic INTERNAL ASSIGNMENT Name of the candidate ISHA Enrollment no. 01215903911 Course MBA stack 2011-13 Subject E-business Subject code MS-114 Topic of assignment Is credential system a real or perceptual hassle in Web doctor. Subject teachers name Ms. Sneha Chopra ABSTRACTThis project report contains the sketch of is earnest a real or perceptual problem in sack avocation. The heart includes the security related issues creation faced by the companies or organizations in their business through e- doctor. The tools being available in market to oversee with such issues and a company named ZANTAZ being involved in solving such issues like threats, hacking, frauds, and theft etc. The example of such company face hacking issues (Facebook) is also included in the study.The emerging security related issues how been tackled and their impact on the business transactions are being discussed. Table of content S. no Content Pg no 1. Introduction 4 2 Advantages & disadvant ages of e- doctor 5-7 3 Security a real problem 7-9 4 Security issues 10-11 5 Security tools 12 6 Ex-Facebook 13-14 7 Conclusion 15 8 Viper report 16 9 Source 17 INTRODUCTIONAccording to Wiegand (1997) Any form of scotch activity conducted via electronic connections is called e-commerce. Web commerceis a form ofelectronic commercethat is conducted primarily through theWorld Wide Weband other aspects of theInternet. In e-commerce the business transactions are carried out on internet and includes purchase and selling of goods and services. Many business firms set up their website in order to bring out their products & services for consumers to purchase or to get admission fee by using web browser. Websites present the consumer with various options for seeing and selecting products and services, which gloweringer speed and convenience of shop from home or the office. The consumer gains benefits of shopping 24 hours a day. picRecently the Worldwide E-Commerce Fraud Preve ntion Network was formed by American Express and e-tailers such as Amazon. com and Buy. com to establish common grounds for reducing the threats created by increasing reliance on the Internet for commerce. Membership has expanded swiftly to now include 375 large and small players united to promote the growth of e-commerce in large part by keeping fraud to a minimum. Consumer privacy is becoming the roughly publicized security issue replacing theft and fraud as top cites in e-commerce. The DDOS attacks demonstrated that business sites did non maintain adequate security apology and intrusion detection measures.Security, however, is non just a matter of technology implementing technology without the proper organizational processes will not solve security problems. There are a number of critical social and organizational issues with security. The first is that the weak link in security is often users or employees, quite a than the technology. The second is software engineering man agement, or managing how security technology is deployed. The third is the development of adequate organizational processes for risk management, separation of duties, and development of security policies, access control, and security assurance. Advantages of E-commerce Lower CostDoing e-business is cost effective it reduces logistical problems and set asides a small business with competitive advantage with giants such as Amazon. com or ecumenic Motors. E commerce helps in reducing cost of business as it enables to get access to large population. Economy It helps in development of economy. It provides the business an internationalistic platform to do transactions and get a competitive advantage in the economy and increase the productivity. Higher Margins E-business a dour with higher margins helps in gaining more control and flexibility and enables to save time when manual transactions are done electronically. Better Customer Service Ecommerce means go bad and quicker customer s ervice.Online customer service makes customers happier. Instead of calling your company on the phone, the web merchant gives customers direct to their personal account online. This saves time and capital Quick Comparison Shopping Ecommerce helps consumers to comparison shop. Automated online shopping assistants called hop bots scour online stores and find deals on everything from apples to printer ribbons. Productivity Gains Implementing the web throughout an organization means improved productivity. For example IBM incorporated the web into every corner of the firm products, marketing, and practices. Teamwork It has made the interaction easier through e-mails.It has transformed the modality organizations interact with suppliers, vendors, business partners, and customersmail is one example of how people collaborate to exchange information and work on solutions Information Sharing, Convenience, and Control Electronic commerce improves information sharing between merchants and cust omers and promotes quick, justintime deliveries. They can interact at any time through internet without any occupation jams, no crowds etc. Disadvantages of Ecommerce Security Security come ups to be a problem for online businesses. A customer does not nip confident roughly the secrecy of the payment process before they purchase anything. unaccredited access and hacking of information are the major(ip) concern. System and Data Integrity Data protection and the integrity of the system are serious concerns. Viruses cause unnecessary delays, file backups, storage problems, danger of hackers and other similar difficulties. System Scalability A business develops an synergistic interface with customers with a website. A website must be scalable, or upgradable on a regular basis to make sure customers remain with them. Ecommerce is not free Establishing a web based organization involves huge funds or investment by the management. Brands are expected to lower search costs, build trust, and communicate type. Customer Relations ProblemsIt is the foremost objective of the organization to maintain the customers loyalty with them because they cannot survive in the market for long term without them. Products People wont buy online People mostly dont prefer to buy furnitures for ex, online because they want to sit on it feel the texture of the fabric and therefore a website called furniture. com or living. com, have failed. Fake sites There are many bad sites which eat up customers money. Product quality There is no guarantee of product quality as customers cannot touch or test the product before the deal. pic Security is a real problem in web commerce. Security issues are rising day by day in web commerce and have become a major problem in the economy.The opaqueness of data collection methods on the World Wide Web has given rise to privacy concerns among Internet users. The number of hacking cases has locomote and fake sites are countless on net. From this we can ass ume how secure our business transactions on the internet. To overcome this problem many software such as firewall, etc has been developed and installed in the organizations database so that the information is been secured from outside users. Security means freedom from risk and danger. In e-business security is the main concern of the business. How safe you are while conducting business on internet is the issue of nowadays. Consumers fear the loss of their financial data, and e-commerce sites fear the financial losses.Studies have shown that consumers are interested about the lack of privacy on the Web. For example, Ryker et al. 2002 quote a Price Water House Coopers study indicating that 92% of consumers are worried about privacy, with 61% refuses to shop online. Forrester research has found that privacy fears inhibit nearly 50% of consumers from shopping online and suggests that consumers often decline to provide data requested by websites and provide false information. Online pri vacy and online security are distinct. Privacy concerns arise when consumers personal information is retrieved online without the consumers consent or knowledge and is sold to third parties without the consumers consent or knowledge.Whereas, online security relates to the confidentiality of the information, systems ability to secure itself against the conduct of unauthorized third parties, such us hackers, who attempt to access the Web sites stored information. Security Issues in web commerce- Three types of security threats 1. Denial of service, 2. Unauthorized access, and 3. Theft and fraud 1). Denial of Service (DOS)- Two primary types of DOS attacks spamming and viruses a) Spamming Sending unsolicited commercial emails to individuals e-mail bombing cause by a hacker targeting one computer or network, and sending thousands of email messages to it. Surfing involves hackers placing software agents onto a third-party system and setting it off to send requests to an intended target.D DOS (distributed denial of service attacks) involves hackers placing software agents onto a number of third-party systems and setting them off to simultaneously send requests to an intended target. b) Viruses self-replicating computer programs designed to complete unwanted events c) Worms special viruses that spread using direct Internet connections d) Trojan Horses disguised as legitimate software and trick users into running the program 2). Unauthorized access a) Illegal access to systems, applications or data b) Passive unauthorized access listening to communications channel for finding secrets. May use content for damaging purposes c) Active unauthorized access. Modifying system or data. Message stream modification Changes intent of messages, e. g. to abort or delay a negotiation on a contract d) Masquerading or spoofing sending a message that appears to be from someone else. Impersonating another user at the name (changing the From field) or IP levels (changing the them e and/or destination IP address of packets in the network) e) Sniffers software that illegally access data traversing across the network. 3). Theft and fraud a. Fraud occurs when the stolen data is used or modified b. Theft of software via illegal copying from companys servers c. Theft of hardware, specifically laptops, pen drive, cds, hard disk etc. E-COMMERCE protective covering TOOLS- 1. Firewalls- software and hardware 2. digital certificates 3. digital signatures 4. ublic key infrastructure 5. encryption software 6. Biometrics- retinal scan, fingerprints, voice, etc. 7. passwords 8. Locks and bars- network operations centers. An example- Driven by information preservation rules, corporations within the financial services sector have begun to seek assistance from companies such as ZANTAZ, a leading provider of conformation Technology Solutions. With the help of companies like ZANTAZ, a corporation can deploy proactive compliance initiatives that a) Automatically capture, arch ive and instantly retrieve email, attachments, and IM b) Monitor and get by email, IM and other electronic communication and ) Quickly restore data from back-up tapes in the event of an audit, litigation or investigation. Companies like ZANTAZ have gone to great lengths to adorn a corporation to quickly, efficiently, and cost effectively deploy proactive compliance solutions associated with electronic communication preservation, supervision, and record-keeping regulations. Example- Facebook security issues One of the example of the company facing security issue worldwide is Facebook. Facebook has been under heavy attack since the last two year as the popular social networking site has become the victim of a severe hacking spree affecting nearly every user on the site. it has become a severe problem worldwide and is still increasing.The hacks do not seem to have specific targets but happen at random with some users parolefeeds being littered with objectionable content and others not seeing anything. This led to the temporarily blocking of site and unable to access the information by the users. Some of the hacks happen in the form of click spam being sent out. A popular spam involves Kim Kardashian with a link to a video. It will say something like After watching this video I lose all respect for Kim. Upon clicking, the link takes the unsuspecting person nowhere, and hacks the account sending the same spam to all of the users friends. Other spams include ken messages and tagged photos leading people to believe they are in the link or involved with it because it is not personalized.Those will also have the same result, and continue the spamming of others walls. Impact on customer Users are outraged and some are considering deleting their profiles. Actress and director, Courtney Zito, told The ChristianPost, I have 5000 friends. My feed is littered with porn. I cant even check my news feed with anyone around because of it. This led to the decrease in the ma rket share and people have removed their pictures and are now afraid of posting anything on profile. Computer hackers attempt to break into at least 600,000 Facebook accounts using stolen username and password details every day, the social networking giant have revealed.The latest revelation came after(prenominal) Facebook issued a security announcement promoting its new Trusted Friends password restoration technique. Many of the hackers are caught out by additional authentication questions, such as asking users to identify friends in pictures, but many attempts are successful. this problem has helped contribute to the demise of Myspace a couple of years ago. The spam ran rampant at last causing many of the users to switch to the safer Facebook. pic Conclusion Security is now understood to be largely imperfect, the continual cat-and-mouse game of security expert and hacker. Important technical developments have been deployed in the last five years however, it is clear that organi zational policies may play as an important role in site security.The results of this study provide support for the assumption that consumer e-commerce adoption/rejection decisions are determined by rational behavior in terms of channel net value seen as the perceived balance of power between the overall benefits that are likely to accrue by using the Internet, and the overall barriers encountered to using it or to deriving the seek benefits Internet adopters, and especially the consumers who have embraced online shopping, perceive the total benefits of e-commerce as exceeding the total impediments to embracing/using e-commerce, whereas Internet non-adopters consider the impediments to e-commerce as drastically exceptional(a) the benefits offered by the commercial Internet. VIPER REPORT pic SOURCES 1. http//www. allbusiness. om/technology/software-services-applications-online-security/11565464-1. htmlixzz1kNGJjj94 2. http//www. allbusiness. com/technology/software-services-applicat ions-online-security/11565464-1. html 3. www. manjeetss. com/articles/advantagesdisadvantagesecommerce. htm 4. http//www. allbusiness. com/technology/software-services-applications-online-security/11565464-1. htmlixzz1kNOllPwd 5. http//www. pcworld. com/article/160545/facebook_hit_by_five_security_problems_in_one_week. html 6. http//www. dailymail. co. uk/sciencetech/article-2054994/Facebook-hackers-attempting-crack-600-000-accounts-day. html 7. http//www. eecs. umich. edu/ackerm/pub/03e05/EC-privacy. ackerman. pdf

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.