Verified Document

E-Commerce Security Measures The Internet Has Positively Essay

E-Commerce Security Measures The Internet has positively created new life in business commerce, through website development. It has also opened up a new way for criminals to steal secret data of businesses and information regarding clients' banks details and contacts. This has made customers to becoming rapidly more aware of the websites they visit and where they input their personal information to avoid fraud cases (Corr S. Pondent, 2009).

However, e-commerce security measures deal with issues such as protecting the integrity of the business network and its internal systems. Besides, it ensures that the customer's information is shielded from everybody else, and must not be open to alteration or tampering, whilst going through the process of authentication and receipt. This ensures that there are secure business transaction between the customer and the business (Randy C. Marchany, 2002).

E-commerce business has put in place several different security measures to protect customers and the business from fraud issues. Such measures are the installation of "Digital Signature" at the virtual storefront. This guarantees that there is digital information which tells clients about the type of security being used by the company. It's like hanging a certificate behind the counter in a physical store (Randy C. Marchany, 2002).

Digital signatures are a way for authenticating the sender and the receiver of information....

When making a transaction a client can ask for a password as a digital signature, to protect the identity and personal data. For example when buying certain product from Amazon.com or Newegg, there are certain boxes with jumbled letters and numbers which you are asked to copy in the box. That is used to verify who you are and to ensure that it's not an imposer who is trying to log in. You put a digital signature on your storefront. This helps customers to be confident that you are who you claim to be. This is a line of defense against being "conned" by would-be impostors, who just want access to your money (Avi Rushinek, Sara Rushinek, 2002).
A cryptographic securities protocol is another security measures being applied by the e-commerce. This operates at different layers of the computer system's communications protocol stack to provide another level of security for e-commerce systems. At the network access layer, a Point-to-Point-Tunneling Protocol (PPTP) could provide security, and at the transport layer, a Secure Sockets Layer (SSL) could help with communication security. There also are other protocols that operate at or above the application layer such as IPSec security protocol and TLS which protect data above the application layer (Randy C. Marchany, 2002).

The secure socket layer (SSL) is visible when the web page is closed or open lock. A client can click on the lock to view certificates and find out if the website…

Sources used in this document:
References

1. Corr S. Pondent, (2009). Security Techniques Used to Protect an E-Commerce System

2. Randy C. Marchany (2002) E-Commerce Security Issues

Proceedings of the 35th Hawaii International Conference on System Sciences

3. Avi Rushinek, Sara Rushinek (2002). E-commerce security measures are they worth it
Cite this Document:
Copy Bibliography Citation

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now