100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Unit 8 - Assignment 2 - P3 £4.49   Add to cart

Essay

Unit 8 - Assignment 2 - P3

 2232 views  1 purchase

Unit-8 E-Commerce, P3 - Explain the potential risks to an organisation of committing to an e-commerce system

Preview 1 out of 2  pages

  • February 24, 2017
  • 2
  • 2015/2016
  • Essay
  • Unknown
  • Pass (p3)
All documents for this subject (36)
avatar-seller
RolandUdv
Unit-8 E-Commerce Assignment-2

P3 - Explain the potential risks to an organisation of committing to an e-commerce system

Hacking:
Hackers get access to places where other people would not have access and or, permission to get in.
These hackers usually use this opportunity to make a website unusable and or steal data from it.
Data can be used against the company, could be sold or could be used against the company’s users.
Hackers will have the permission to edit, delete any documents as if they were the admin, which
could cause a lot of troubles such as: losing money, customer trust, leaking confidential information.
Hackers could steal private data such as: user’s private information (credit card details, addresses
etc. or confidential or critical data that includes the company’s management and or their staff
information). Hacks can be prevented by having a good Anti-Virus, having everything up-to-date,
frequent maintenance, backing-up data to another server frequently (hourly for example), having
strong passwords etc.

-Trojan Horses: A Trojan virus can get on the computer without the Anti-Virus and the user noticing
it. It could get on it as a harmless file such as an image, video or a music file. This virus could delete
files and change things in the computer’s directories which could eventually break the computer, so
it would not even boot up the next time you turn it on. Trojans usually get on user’s computers by
opening up random emails and or downloading various harmless ‘looking’ files.

-Worms: Worms usually run in the background making the user really hard to notice the harmful
malware program. This virus is created to spread, and mostly spreads through networks making it
really hard to see. It could steal private information such as: credit card details. Worms can get on a
pc by opening an unwanted email and its attached files, that might or will contain the malicious
codes.

-Viruses: It’s created to steal personal data and to infect the computer with harmful software that
could break the computer and make it unusable. It is usually a computer code that is made to sneak
into the computer system avoiding Anti-Virus applications and the firewall. It infects the computer
with a malicious code that will cause damages to the user’s files, the system, or both at the same
time. If this would happen to a retailer’s website, it could be crucial and would cause a lot of
damages.

-Web Servers: Web servers deliver the requested websites to the users, so they reach it and view it.
Web servers also hold data of the actual website, which can be visited on the internet, if published.
Web servers can run on Windows or Linux, although the least one is more popular as it has a better
security system, and more freedom (Open Source). If the website has the ability to let users upload
their own files to the servers, then the server will be capable of getting a malicious file, that could do
damages to the server (infect it with a virus). Outdated software and codes, plugins, scripts can also
cause damages, as hackers could infect the Web Server’s system with a code or an application that
could harm everything that is stored on the Server and on its system. There are many ways of
preventing an alleged attack against our servers or system, and these include: continuous
maintenance, up-to-date scripts, applications, plugins etc… , Firewall and an Anti-Virus software.
Different protocols can also be used to avoid any attacks, and protect the files that are stored on the
servers.




Roland UDVARLAKI – Unit 8 – P3 – Page 1 of 2

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller RolandUdv. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for £4.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

60904 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy revision notes and other study material for 14 years now

Start selling
£4.49  1x  sold
  • (0)
  Add to cart