Introduction: Hire is an online purchase application that lets user to view and buy stuffs online. The products range from simple goods to expensive equipments at a reasonable price where user can register an account, search and view the items, post the general information of the article and buy the products. On registering for the first time, the user should provide general information like Name, Email Id, Username and a self generated password given automatically to the user in their corresponding email. Apart from the admirable functionality of the site, users should always be concerned about the security issues of the system. The massive increase in the drift of e-Commerce has led to a new generation of associated security threats and thus, the site focuses on major security issues like- Availability − Information on the site should always be available 24*7. Reliability − Information should not be distorted during its transmission. Also, the transaction process should be reliable. Confidentiality − Information during transaction shouldn’t not be accessible to 3rd person. Midway interception is unacceptable. Non-Reputability − Once a message is sent by the correspondent, he/she should not be able to refrain sending the message. Similarly the receiver or the recipient of message should not be able to reject. Authenticity − There should be an authenticating mechanism for user before giving him/her access to required information. Encryption – Encryption and decryption should
The proficiency and efficacy of the cyberspace in its application in accounting, finance, system designs, manufacturing etc., cannot be denied nor neglected. The reality of the twenty-first century is simple; no organization can survive without the adoption and implementation of the mechanism of information technology to their area of business. On the contrary perspective, there are several challenges that are associated with the cyberspace, among which is majorly cyber security. Recently the hackers’ activity has really skyrocketed and has become a major concern for organizations, states and federal governments and even international organizations. Several regulatory schemes are put in place to mitigate the activities of hackers across the globe.
Some security risks involved with conducting business online are imposters, eavesdroppers and thieves. Also, there are crackers or hackers, which are people who write programs and manipulate technologies to obtain unauthorized access to computers and networks. The elements of computer security are secrecy, integrity and necessity. Secrecy is protecting against unauthorized data disclosure. Integrity is preventing data from being modified by someone who is unauthorized and ensuring that the contents of emails aren’t changed before they get to he recipient. Necessity is preventing data delays or denials. It is important to establish a security policy to protect assets, to define acceptance and unacceptable behavior and to review physical and
E-commerce security threats and technology solution dimensions consist of integrity, authenticity, confidentiality, privacy, availability, etc. (Laudon & Traver, 2012, p.268). The internet can serve as a very useful tool or it can be a tool manipulated to perform unethical actions. Its function as tool all depends on what the user and what they intend to do with the information they download, view or share. Many analysts trace the increase in the number of issues faced by consumers today to the internet. Internet access has transitioned from a luxury to a common household utility. This shift in demand makes it increasingly easy for criminals such as hackers to gain access to a larger pool of information. This growing pool of
In this era of globalization and cut-throat world of competition, it is virtually impossible to do business without using the internet and web applications. Internet gets used for processing the credit card or debit card sale and even for using to save the data of customers to the merchant’s database for future reference and to send promotional offers to the previous and patron customers. And on the other hand, hackers are trying their best to get the data stored on the merchant’s server by spoofing
As the world has come into the 21st century, there is one prominent and constant fact - everyone is on the internet. Whether willingly or not, information like house addresses, social security numbers, and credit card numbers can be put out and obtained through the internet. It is unusual for a business, even an individual person, to not have a website. Knowing the types of threats that are out there is the first step to implementing protection measures. While there are many types of well-known threats in existence, there are even more types of common, yet less well-known threats out there.
Reliability refers to information the user can depend upon to be materially accurate and to faithfully represent the information that
The data information needs to be kept secure and making sure that the information is only used by the correct person and in the manner in which it should be used.
Online Shopping is a current phenomenon which is fast attaining a great importance in the modern business environment and opening new vistas for marketers. Online shopping has not only made life easier for the consumers but also has thrown numerous opportunities for marketers to address existing customer better and taping new ones. Online shopping defined as the process of shopping where consumers buy products or services from any vendors through internet, it also known as e-shopping / internet shopping (MasterCard Worldwide Insights 2008). In other words, online shopping is the procedure in which a customer purchases a service or product online or through internet. A customer may at his or her leisure ,with comfort of their home buy products
“Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system.” (NIST SP 800-37)
There are many security organizations and associations all around the world that strive to make the cyber world and the physical world a safer place. Each of these organizations and associations offer their own solutions for security threats. These organizations and associations are helpful in preventing many different types of security breaches and are necessary for the continual protection of both business and people as they continue to develop more advanced technology. Without these organizations and associations, security would be a very disconcerting topic for many individuals.
There should be controls in place to ascertain that no misuse of information prevails and at the very least, misuse of information should be detected as early as possible to limit the damage that could be caused to the system. Integrity is further subdivided as follows:
Safety of information is the most valuable asset in any organization particular those who provide financial service to others. Threats can come from a variety of sources such as human threats, natural disasters and technical threats. By identifying the potential threats to the network, security measure can be taken to combat these threats, eliminate them or reduce the likelihood and impact if they should occur.
Now a days businesses rely mostly on technology. However, there are risks that business information systems face such as human input errors, transactions or data input that are improperly approved prior to data input, and input controls that do not provide assurance that all transactions are initially captured and recorded; these risks are all categorized as data origin risks. Business organizations combat this and other risks using General Controls and Application Controls. Please keep reading to find out what this controls are and how this controls are used, as well as learn about other risks that business face and their respective categories.
The scheme validation is dependent on the security of the sender’s private key, which the sender can later claim lost or stolen and that the signature was forged when trying to deny sending a particular message.
Online shopping is considered to be more time saving (Khalifaand Limayem, 2003) (Gurvinder and Chen, 2004). Therefore, online shopping has become an important consideration for consumers as they tend to want to get their items quickly without bargaining on price or quality plus consumers can order a variety of products via the Internet (Yomnak,