StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Academic Paper Review - Assignment Example

Cite this document
Summary
In order to progress their businesses, distributors, suppliers and manufacturers interact by using an e-commerce system. Many…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.1% of users find it useful
Academic Paper Review
Read Text Preview

Extract of sample "Academic Paper Review"

Information Security E-commerce Security Exchanging of information and financial transactions in procuring goods and services by using the internet is referred to as e-commerce activity. In order to progress their businesses, distributors, suppliers and manufacturers interact by using an e-commerce system. Many organizations in the modern world of technological developments have a noticeable presence on the internet. There are several brands that do not need to ascertain their prosperous market presence.

The commonly used e-commerce form was limited to procuring goods and services online whereby consumers ordered these goods online and received the goods and services at their homes. In addition, consumers can also purchase these commodities by using online transactions. This paper will look on the various security issues relating to e-commerce system (Al-Slamy, 2008). Apart from hardware or physical damages threats, e-commerce system is seriously influenced by the perils associated with its software and technical mechanism.

The software and technical mechanism rely on three security components. The security concept entails three vital components including availability, integrity and confidentiality (McKegney & Khusial, 2005). Authorized individuals are permitted to access the highly confidential data and information connected to consumers. Leaking this confidential information to an unauthorized individual is breaching confidentiality. Data integrity is safeguarded by preserving the precise information contained in it even though the integrity may be violated by adding more payment demands in statements and bills (Gollmann, 2000).

Availability makes sure that access to resources is safe and incase of any delays, availability may be influenced negatively. The main security features of e-commerce system include authorization, auditing, authentication and encryption. Encryption is created in enhancing maximum security measures by preserving private information (McKegney & Khusial, 2005). It prevents unauthorized individuals from accessing financial transactions occurring on the internet. Authentication is the act of making sure that a user retrieving information from the system is the same one and prevents unauthorized users from the log in.

Another security feature is auditing. It is used by businesses in keeping online transaction records. This information is used by companies in proving the validity of transactions. In addition, authorization is taking command over personal resources found online and manipulating them through an exact mechanism. This enables people to track their invoice system and account balances with no hassle (Furnell, 2006). There are different security issues that affect e-commerce. Making a web based transactions to be safe is the main problem that progresses activities on the internet.

By implementing secure internet solutions in protecting an e-commerce system, it may have potential financial benefits. E-commerce systems are mainly affected by computer viruses and Trojan horses, which are the critical threat to transactions done online (McKegney & Khusial, 2005). Due to technology advancement, hackers access easily to online transactions. Another problem is network sniffing whereby the private information of the user is stolen by checking data exchange between the user’s server and system (Al-Slamy, 2008).

The other problem is denial of service attack whereby hackers compel servers by suing excessive computational resources. In conclusion, despite various security issues associated with online transactions, it is a sustainable way of conducting business worldwide. In making online transactions safer, businesses can employ tough password policies in making sure there is maximum protection. Organizations need to install firewalls to limit the traffic directed to the computer and confidential information needs to be encrypted.

Computer users need to be educated on the importance of using strong passwords. In maximizing security, organizations need to use encrypting streams that have Secure Socket Layer (SSL) protocol (McKegney & Khusial, 2005). References Al-Slamy, D. N. M. (2008). E-Commerce security. IJCSNS International Journal of Computer Science and Network Security, 8(5), 340-344.Furnell, S. (2006). E-commerce security. Enterprise information systems assurance and systems security, 131-147.Gollmann, D. (2000).

E-commerce security. Computing & Control Engineering Journal, 11(3), 115-118.McKegney, R., & Khusial, D. (2005, April 13). E-commerce security: Attacks and Preventive strategies. Developer works. Retrieved April 22, 2014, from http://www.ibm.com/developerworks/websphere/library/techarticles/0504_mckegney/0504_mckegney.html?ca=drs

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Academic Paper Review Assignment Example | Topics and Well Written Essays - 500 words”, n.d.)
Academic Paper Review Assignment Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/information-technology/1641180-academic-paper-review
(Academic Paper Review Assignment Example | Topics and Well Written Essays - 500 Words)
Academic Paper Review Assignment Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1641180-academic-paper-review.
“Academic Paper Review Assignment Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1641180-academic-paper-review.
  • Cited: 0 times

CHECK THESE SAMPLES OF Academic Paper Review

Causal Analysis of Will Dropouts Save America

Maybe it is through this curricular flexibility that we can opt to find hope and realize that exploring beyond the conventional academic realms enables studying individuals to learn the remarkable key to economic potentials and thereby succeed with the targeted growth in professional goals.... No matter how much we admit on not having a choice but to deal with academic tasks that take up considerable time and energy from us, at some point later, wherever we are or howsoever we come to be, a spur of wisdom pops to us and renders us capable of drawing inexplicable insights....
3 Pages (750 words) Research Paper

Responsive Classroom Approach: A Literature Review

Responsive Classroom Approach Responsive Classroom Approach's Effects on Academic Learning (Insert Author's Name) (Insert Author's Affiliation) Outline Introduction Background of the Study (Literature review) Significance of the Study Responsive Classroom Approach Introduction Background of the Study Responsive classroom approach is defined by Rimm – Kaufman (2006) as an educational intervention that employs developmentally suitable teaching practices that help children learn at their best because it nurtures the academic and social growth of children....
4 Pages (1000 words) Research Paper

Play And Childrens Development

The paper "Play And Children's Development" describes that the play is important for healthy growth and development of children's psychological, spiritual, social, and physical spheres.... Some of the plays that children can use freely to express themselves and enhance development are drawing, collages, using paper mache and block games where children arrange blocks to form different patterns.... In a study that measured the rate of video game playing by students compared to their academic performance, video gaming or passive gaming was found to have negative effects on the cognitive ability of students....
6 Pages (1500 words) Research Paper

Left versus Right Brain and How It Can Impact Learning

This research paper primarily attempts to contemplate a variety of momentous effects of brain hemisphere dominance implemented on the learning process by reviewing what modern research has to say on the subject.... 3) and such people digest new academic information in a better way when it is delivered through exciting visual media....
4 Pages (1000 words) Research Paper

Review of an academic research paper

Stainton, Johnson and Borodzicz were the first to provide an insight regarding construction and implementation of business simulation, so that the participants could learn most out of it.... The previous studies have focused only on learning during simulation.... No work has been done… The article has covered various aspects of business simulation games and their effectiveness....
4 Pages (1000 words) Literature review

Argument For The Dumbest Generation by Mark Bauerlein

This paper is an agreement with the above thesis and is aimed at proving the thesis right.... The paper argues for the thesis of the book: “The Dumbest Generation”.... The digital age that we live in today has made life easier.... There are numerous advantages of this digital revolution....
7 Pages (1750 words) Term Paper

The Design and Development of a Scaleable E-learning Authoring System

Based on the paper “The Design and Development of a Scaleable E-learning Authoring System”, online academies and other educational institutions that can be availed of online are now viable options in the furtherance of knowledge and of the proliferation of education.... The author of the paper tells that the vast knowledge literally at our fingertips creates a whole new dimension in how we interact and simultaneously, how we acquire information....
5 Pages (1250 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us