Jack_square.png

LIKE THE BLOG? DID MY COURSEWORK HELP YOU?

Feel free to donate to support me and be able to host this site as a free educational tool for everyone to use.

Any amount is appreciated and is not required!

  • Nov 14, 2014

Unit 8 (M2): Security in E-Commerce Systems

Discuss how security issues in e-commerce can be overcome (M2)

Protection of Hacking

To avoid being hacked, make sure you do the following points to be secure:

Before connecting your computer to the Internet, it's important to install a firewall.

Install antivirus software and keep it up-to-date.

Consider using an Internet email account as your primary email account instead of using an email program on your computer.

Only open email attachments from people you know; even then, you should scan the attachment with an antivirus program before opening it.

Choose better passwords.

Computer viruses are small software programs that are designed to spread from one computer to another and to interfere with computer operation. A virus might corrupt or delete data on your computer, use your email program to spread itself to other computers, or even erase everything on your hard disk. Computer viruses are often spread by attachments in email messages or instant messaging messages. That is why it is essential that you never open email attachments unless you know who it's from and you are expecting it.

To help avoid computer viruses, it's essential that you keep your computer current with the latest updates and antivirus tools, stay informed about recent threats and that you follow a few basic rules when you surf the Internet, downloading files and opening attachments.

Identity Theft

Identity theft is any kind of fraud that results in the loss of personal data, such as passwords, user names, banking information, or credit card numbers. Thieves have always found ways to illegally acquire people's personal information through confidence scams, stealing mail from mailboxes, or even looking through trash cans or dumpsters. Now that identity theft has moved online criminals can scam greater numbers of people, which makes it much more profitable.

A firewall is a software program or piece of hardware that helps screen out hackers, viruses, and worms that try to reach your computer over the Internet. If you can’t start Windows Firewall or you are getting an error, use our free tool to diagnose and fix problems.

If you use a computer at home, the most effective and important first step you can take to help protect your computer is to turn on a firewall. Windows Vista or higher have a firewall built-in and turned on by default. If you have more than one computer connected in the home, or if you have a small-office network, it is important to protect every computer. You should have a hardware firewall (such as a router) to protect your network, but you should also use a software firewall on each computer to help prevent the spread of a virus in your network if one of the computers becomes infected.

If your computer is part of a business, school, or other organisational network, you should follow the policy established by the network administrator.

HTTPS / SSL

HTTPS is short for Hypertext Transfer Protocol over Secure is a secure method of accessing or sending information across a web page. All data sent over HTTPS is encrypted before it is sent, this prevents anyone from understanding that information if intercepted. Because data is encrypted over HTTPS, it is slower than HTTP, which is why HTTPS is only used when requiring login information or with pages that contain sensitive information such as an online bank web page.

SSL is short for Secure Sockets Layer, a protocol developed by Netscape for transmitting private documents via the Internet. SSL uses a cryptographic system that uses two keys to encrypt data − a public key known to everyone and a private or secret key known only to the recipient of the message. Both Netscape Navigator and Internet Explorer support SSL, and many Web sites use the protocol to obtain confidential user information, such as credit card numbers. By convention, URLs that require an SSL connection start with https instead of http.

RSA Certificates

The RSA algorithm is based on the fact that there is no efficient way to factor very large numbers. Deducing an RSA key, therefore, requires an extraordinary amount of computer processing power and time. The RSA algorithm has become the de-facto standard for industrial-strength encryption, especially for data sent over the Internet. It is built into many software products, including Netscape Navigator and Microsoft Internet Explorer. The technology is so powerful that the U.S. government has restricted exporting it to foreign countries.

Strong Passwords

An ideal password is long and has letters, punctuation, symbols, and numbers. These are some other recommendations for a strong password:

Whenever possible, use eight characters or more.

Don't use the same password for everything. Cyber criminals steal passwords on websites with very little security, and then they try to use that same password and user name in more secure environments, such as banking websites.

Change your passwords often. Set an automatic reminder for yourself to change your passwords on your email, banking, and credit card websites about every three months.

The greater the variety of characters in your password, the better. However, password hacking software automatically checks for common letter-to-symbol conversions, such as changing "and" to "&" or "to" to "2."

Use the entire keyboard, not just the letters and characters you use or see most often.

Alternate Authentication Methods

The challenge-response method uses passwords, but the password is never sent. Instead, an authentication centre sends a random number to the user. The user then responds by combining the password with the random number and then using a hash function to create the equivalent of a digital fingerprint. The authentication centre, which knows the password, random number and hash function, is able to produce the same fingerprint and compare them. If they match, then the user is authenticated. This system is secure because even if an attacker knows the random number and hash function used, it is not enough to calculate the password.

Public key encryption is based on mathematical operations that are easy to perform but very difficult to undo. Multiplying very large prime numbers is the most common example. While multiplying them is easy, if a second person were given the product, it would be nearly impossible to then determine which two primes had been multiplied together. These one-way functions create a public key and a private key. Anyone can use the public key to encrypt information, which can only be decrypted with the private key. In the public key authentication protocol, user A encrypts a random number with user B's public key. User B decrypts the number, encrypts it with user A's public key and then sends it back. It is user B's ability to decrypt the original message that proves his identity.

Biometrics, the direct measurement of a physical or behavioural characteristic, can also be used for authentication. Fingerprinting, DNA tests and retinal scans are among the most familiar biometric methods, while written signatures can be considered a biometric method, as well. Less commonly, systems that recognise a person's voice, walking gait or typing cadence are all used as biometric authentication methods.

Don’t Skip These Steps When Starting a Business

COMP1682: Developing a Game using Techniques in Game Design to Motivate Players

Abstract Gaming has been a popular trend over the last decade with constant improvements and an evolution which test the bounds of technology. Due to the popularity, developing games has branched out

COMP1635: Group Business Plan

Executive Summary In the following business plan, we outline our business plan for Lyme charge - considering the idea behind the conceptual design of the products and services that will be provided. W

IMAGES

  1. Assignment 2 E-Commerce in Business Organization List of Topics

    unit 8 assignment 2 e commerce

  2. E-Commerce Assignment 1.docx

    unit 8 assignment 2 e commerce

  3. Chapter 9 e-Commerce Systems

    unit 8 assignment 2 e commerce

  4. Unit 8 btec business level 3 assignment 2 helpsheet

    unit 8 assignment 2 e commerce

  5. Assignment on E Commerce System Free Essay Example

    unit 8 assignment 2 e commerce

  6. E commerce assignment 1

    unit 8 assignment 2 e commerce

VIDEO

  1. NTA UGC NET 2022 COMMERCE PAPER-2 |Unit 1| Concepts and Elements of Business Environment |Lecture-1

  2. UNIT 1 E COMMERCE INTRODUCTION TO E COMMERCE B COM HONS / PROGRAMME

  3. CIS110 Unit 8 Assignment Overview

  4. Unit 2 Lesson 8 Practice Problems

  5. std 8 english sem 2 unit 2 activity 8 The Babool is beautiful, isn't it ?

  6. STD 8 ENGLISH SEM 2 UNIT 4 ACTIVITY 6

COMMENTS

  1. Assignment 2

    Assignment 2. Produce a blog from the customers point of view focusing on the effects of e-commerce. Use the title "Shopping and handling money online" The purpose of the blog is to give the reader a balanced view of e-commerce so they can be more informed when deciding if they will shop online. P5. Examine the social implications of e ...

  2. Unit 8 E-commerce Assignment 2

    This bundle is for unit 8 - e-commerce assignment 2, including my ecommerce strategy (P6, M3, D2) and the social implications of ecommerce (P5), as well as the assignment criteria/brief. 100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached.

  3. Unit 8

    Unit 8 - Assignment 2 - P2. Course. Unit 8 - e-Commerce. Institution. Pearson (PEARSON) Unit-8 E-Commerce , P2 - Explain the impact of introducing an e commerce system to an organisation. Preview 1 out of 2 pages.

  4. Discussion Unit 8

    Written Assignment Unit 2 E Commerce Bus 2202; Discussion Forum Unit 4 Ecommerce; Learning journal Unit 1 Emotional Intellingence subm; LJ 8 E-Commerce - Do not copy and paste. DF 6 E-Comm - Do not copy and paste. Related Studylists Ecommerce 2024. Preview text.

  5. Discussion Assignment Unit 8

    Written Assignment Unit 2 E Commerce Bus 2202; Discussion Forum Unit 4 Ecommerce; Learning journal Unit 1 Emotional Intellingence subm; LJ 8 E-Commerce - Do not copy and paste. Related documents. In three complete and well composed paragraphs; BUS 2202 - CH - LJ - 2- Learning Journal Week 2 BUS 2202 E Commerce;

  6. 1st task unit 8 e commerce p2

    Nov 8, 2012 • Download as PPT, PDF •. 1 like • 27,807 views. I. IronCheese. ecommerce, p2. 1 of 13. Download now. 1st task unit 8 e commerce p2. Unit 8 e-Commerce P2.

  7. Unit 8

    Unit 8 - E-commerce. Introduction. E-Commerce has changed the way business is done and the way customers shop online. There are more opportunities to do business, for those established businesses and those that are new to the market. In this unit you will investigate the different types of e-commerce and their benefits and drawbacks.

  8. E-commerce Unit 8 DF

    E-commerce Unit 8 DF - This is the assignment of the discussion form of unit 8 of bus 2202. Course: E-Commerce (proctored course) (BUS 2202) 675 Documents. Students shared 675 documents in this course. University: University of the People. AI Chat. Info More info. Download. AI Quiz. Save.

  9. Unit 8- E-Commerce

    Assignment 2; Assignment 3 ; Submissions; P5; Unit 8 - E-Commerce. Welcome to your course online. Click on the Assignment you are doing and scroll down to the task number you need to find out about. To submit your work click on the Submissions Page and type in the required informationa and upload your document.

  10. Unit 8 Assignment 2

    All of my work was to distinction standard throughout the 2 year course. BTEC LEVEL 3 UNIT 8 E-COMMERCE P1,P2,P3,P4,P5,P6,M1,M2,M3,D1,D2. ... BTEC LEVEL 3 UNIT 8 E-COMMERCE P1,P2,P3,P4,P5,P6,M1,M2,M3,D1,D2. 100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached. Previously searched by you.

  11. P2 P3 M1 M2 & D1 resub.docx

    BTEC Level 3 BTEC Diploma in Web and Games Design Unit 8 - Ecommerce Assignment 2 - The impact of e-Commerce Ryan. AI Homework Help. Expert Help. Study Resources. ... Page Assignment 2 - The impact of e-Commerce V0.2 By Ryan Parry. Recommend methods to promote an e-commerce system ...

  12. Unit 8 Assignment 2

    Unit 8 Assignment 2 Evaluation report. Introduction. In this assignment 2 for UNIT 8, I will evaluate the interview that I conducted with Sue and Abby. This assignment involves a SWOT analysis along with a skills analysis of what and how I used my skills and finally, a personal development plan. I also include an analysis how Best Practice is ...

  13. Unit 8

    Whoops! There was a problem previewing Unit 8 - E Commerce (Assignment 3) P6 & M3.doc. Retrying.

  14. Unit 8

    Unit-8 E-Commerce, D1 - Evaluate the use of e-commerce in a 'brick and click' organisation. 100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached. ... Unit 8 - assignment 2 - p2 2. Essay - Unit 8 - assignment 3 - d2 ...

  15. Unit 8 (M2): Security in E-Commerce Systems

    Unit 8 (M2) This report discusses the security in an e-commerce and how a business can improve their security. Discuss how security issues in e-commerce can be overcome (M2)Protection of HackingTo avoid being hacked, make sure you do the following points to be secure: • Before connecting your computer to the Internet, it's important to ...

  16. Discussion assignment unit 2 e- commerce

    Discussion assignment unit 8 E-commerce; Discussion assignment unit 4 e- commerce; Discussion assignment unit 6 e-commerce; Security - Written Assignment; BUS 2202 Unit 7 Learning Journal; Learning Journal Unit 8 E-commerce

  17. e-Commerce unit 8 p5 by Rebecca Hindmarch on Prezi

    e-Commerce unit 8 p5. I have talked about e-commerce and how you can use it in a business. The advantages and the disadvantages providing added value. providing added value is where you are providing the added value of all the stock for the customers or businesses. you can add thing on for the bussines or businesses or other companies.

  18. Unit 8

    Unit-8 E-Commerce, P3 - Explain the potential risks to an organisation of committing to an e-commerce system. 100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached. Previously searched by you. Previously searched by you. Sell.

  19. Assignment 8.2

    This document includes the grades needed for Unit 8 Assignment 2 E-Commerce being P3 and M2. This document includes the grades needed for Unit 8 Assignment 2 E-Commerce being P3 and M2. 100% Money Back Guarantee Immediately available after payment Both online and in PDF No strings attached. Sell. Where do you study.

  20. Written Assignment

    University of the People. E-Commerce - BUS 2202 Written Assignment - Unit 2 Instructor : David Hale February 2021. Do some research to examine the differences between the business-to-business (B2B) and the Business-to-Customer (B2C) business models.

  21. Written Assignment Unit 2 BUS 2202 E-commerce

    University of the People Written Assignment Unit 2 BUS 2202 E-commerce September 14, 2021. Do some research to examine the differences between the business-to-business (B2B) and the Business-to-Customer (B2C) business models.

  22. ECommerce 4

    Unit 2 Assignment E unit written assignment university of the people bus april 17th, do some research to examine the differences between the (b2b) and the. Skip to document. ... E-Commerce (proctored course) (BUS 2202) 999+ Documents. Students shared 1742 documents in this course. Academic year: 2022/2023. Uploaded by Sonia S. Grant.