100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Unit 8 - Assignment 2 - M2 £5.99   Add to cart

Essay

Unit 8 - Assignment 2 - M2

 2177 views  6 purchases

Unit-8 E-Commerce, M2 - Discuss how security issues in e-commerce can be overcome

Preview 1 out of 3  pages

  • February 24, 2017
  • 3
  • 2016/2017
  • Essay
  • Unknown
  • Merit (m2)
All documents for this subject (36)
avatar-seller
RolandUdv
Roland UDVARLAKI


Unit 8 – Assignment 2 – M2

M2 - Discuss how security issues in e-commerce can be overcome

Firewall: Firewalls can be either software or hardware (both can be used/implemented at the same
time). It’s created to prevent users without permissions to gain access to a system, server. All
information that the system receives will go through the firewall that will check if the file has met
with the security requirements, if not, it will block it, preventing the computer from any malicious
files. If it passes the requirements the computer will let the user interact with the documents.

Strong Password + Alternatives:
-Password: A strong password must contain at least six or more letters in order to give hackers a
really hard job to crack them. It is recommended to use capital letters and numbers and perhaps
symbols when possible to have a strong password. A strong password will not contain any personal
information and or description such as: names, favourite numbers, address, tel. numbers etc.
-Fingerprint: Fingerprint protection is one of the most popular way to keep information safe
nowadays. Every single person has a unique fingerprint which makes it nearly impossible for people,
with unauthorised access to gain information to private documents.
-Face Recognition: It works by scanning someone’s face. It is safe to use inside a company, however
there are some downsides of using it. The scanned face must be the same when trying to gain access
to a e.g.: computer. (So if someone made a funny face or wore glasses when the scanning was on,
they must do and wear the same thing they did during scanning in order to gain access).
-Iris Recognition: It scans the eye’s irises which is like a fingerprint – unique, and every people has a
different one. The downside of using this is that it’s a very expensive technology to use (yet), and
glasses can reflect the light, so the scan might not be successful giving users access to the computer.

VPN (Virtual Private Network): VPN is created to protect users on the internet. All in-out going
information are encrypted on the network, and only authorised users will be able to get access to
information. E-commerce websites are using VPNs to protect their users online activities and their
personal information. This is a really safe way to protect both the customers and the company itself
as the exchanged data will be protected automatically by encrypted connections.

Encryption: It transfers data into a code that can only be read if the user has the right password or
key to decrypt it. If users (hackers) has none of the mentioned ways then they will not be able to get
access to the information, so it will show them a junk of codes, files that will be useless to them. It is
a safe way to protect websites and its information by encrypting them over SSL and other useful
protocols. E-commerce website must use it in order to keep their user’s information safe and
private, so hackers that try to steal data from their servers will not be able to get access to these
critical documents, even if they can get access to key elements of the website’s server.

Certificates: Authentication or certificates are made by different Authorities who identify if a
website is actually protected and safe, or not. Authorities will overlook the security that the website
is using in order to protect the users information. The certificates will be visible to users by looking
at the address bar. If the address bar has a green bar, and or shows https in a green colour, it’ll mean
that the website has received a certificate and is safe to use as information will be secured.




Roland UDVARLAKI – Unit 8 – M2 - Page 1 of 3

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller RolandUdv. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for £5.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

60904 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy revision notes and other study material for 14 years now

Start selling
£5.99  6x  sold
  • (0)
  Add to cart