Sunday, May 12, 2019

The security technology of e-commerce Essay Example | Topics and Well Written Essays - 2000 words

The security technology of e-commerce - Essay ExampleMost reputcapable financial institutions and e-commerce service providers fuck off all measures to protect the data and transactions online and simultaneously they provide the details to the customers, how to protect their transaction. Although the risks are in the main avoided while dealing with network transactions, even then the threats are enormous. The various threats include cyber terrorism, credit post horse number may be intercepted, cyber attacks during the war on terrorism, viruses and worms, hacking and malware techniques, one of the service providers may deny that the deals ever took place, hackers may exploit data from web page due to some improper security measures, hackers may gain access to the body. Sometimes customers may also become a victim of identity theft. tally to a survey conducted by the US Department of Justice (DOJ), identity theft is affecting millions of sign of the zodiac in the US and costin g an estimated $ 6.4 billion per year. To avoid all these consumers must take some proactive steps and practices to access the computer before carrying out any financial transaction. Some of the most communal practices include the use of updated versions of software and operating systems, ensure proper network security, avoid opening unusual emails and attachments, use of passwords, use of updated antivirus software and use of encryption.In the present paper, the germ attempts to deal with the type of risks available to the internet user, the present security system available to the consumers and future security trends. trends. The finding of available security system has been summarized.3.0 RESEARCH HYPOTHESIS STATEMENTWhile going before the literature as cited in bibliography, author made an attempt to a hypothetical statement as , Are the current security systems able to provide security to the e-commerce users4.0 EXPLANATION OF THE TECHNOLOGY4.1 BACKGROUNDIn the early 1990s digital break-ins, kidnapping were the price used by many popular journals to hackers. The early targets were educational institutes and

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.