Security System Analysis Term Paper

Download this Term Paper in word format (.doc)

Note: Sample below may appear distorted but all corresponding word document files contain proper formatting

Excerpt from Term Paper:

Security System Analysis


The information era has totally revolutionized our society with its sphere of influence touching every facet of our lives. There is a paradigm shift in our business methodology and ecommerce has evolved as an integral and indispensable aspect of any business venture that wishes to capitalize on the global market that technology promises. Today more and more companies are recognizing the vast potential and the unprecedented customer base of ecommerce which is definitely poised to become the mainstay business medium of the future. With ecommerce exploding like anything there will be more and more transfer of funds online. It stands out clearly that the anonymous nature of the web medium poses issues pertaining to the credibility and authenticity and thus compromises on the flexibility and the comfort of the web. The success of fast online fund transfer very much hinges on implementing effective security measures to thwart the designs of hackers and other snoopers who threaten the whole concept. Paypal is a concept that offers a hassle free and secure solution for online funds transfer. Let us have a brief outlook on the issues pertaining to security on the web and how Paypal, one of the leading online payment networks handles this area of concern.

Paypal Features

Paypal is rapidly developing into one of the easiest methods of transferring funds and making payments online. The Paypal concept allows money to be transferred via email to anybody who has a paypal account. The company has attracted several millions of people in the United States alone and is already accepting international customers. Let us now dwell in depth on Paypal's security features that protect the confidentiality and privacy of the users and how it strives to ensure the authenticity and the credibility of the transactions.

Dangers of Security Lapses

One of the worst fears of people using the Internet is the danger of ending up disclosing (unknowingly) their personal and financial information to a nosey hacker. If information transaction is not sufficiently protected by means of encryption techniques and protocols which ensure authenticity of the transaction the whole concept of web trade will be at a risk. The huge pile of personal data that is stored in the company servers can be accessed or manipulated by these evasive intruders exposing the customers to grave consequences. In fact loss of privacy and impersonation have proved to be the bane of the information highway.

Ensuring Privacy (Isolated Storage)

The main idea behind the birth of the Paypal concept is to get around the hidden dangers involved in the disclosure of sensitive information such as credit card numbers and other personal data without hindering online transactions. Paypal protects the financial as well as the personal information of its members from fellow members. Information pertaining to each customer is stored in an encrypted form in computer systems that are totally isolated from the web. This ensures that information is accessible only to the Paypal staff who need the data to provide the requested services. All transactions and updations of personal information are regulated by a password system and a highly sophisticated encryption mechanism. {Paypal]

The SSL Security (Digital integrity and authenticity)

Paypal is secure with the SSL (Secure Sockets Layer) protocol, which implies that all the transactions between the client and the host are safe as the data which is exchanged is rendered undecipherable and meaningless to anyone who happens to gain unauthorized access. The essential idea of the SSL protocol is to encrypt the information at the sender's end and decrypt the same at the receiver's end. En route the data cannot be extracted in a meaningful form which in effect makes the whole transaction tamper proof. Paypal uses digital signatures to verify each transaction for completeness and authenticity and to identify if information is tampered with or is lost due to some reason while on transit. Digital signatures ensure that the data that is passed on is unchanged and they also have an automatic time stamping facility.

SSL protocol is actually made up of two separate protocols namely the SSL Record Protocol and the SSL Handshake protocol. SSL record protocol looks after the format in which data is transmitted over the web and also manages the…[continue]

Cite This Term Paper:

"Security System Analysis" (2003, July 27) Retrieved December 9, 2016, from

"Security System Analysis" 27 July 2003. Web.9 December. 2016. <>

"Security System Analysis", 27 July 2003, Accessed.9 December. 2016,

Other Documents Pertaining To This Topic

  • System Analysis of T System Because of Its

    System Analysis of T-SYSTEM Because of its ability to improve the quality and delivery of health care services, the Electronic Health Record is becoming a necessity in almost every healthcare organization. The purpose of this paper is to explain the impact of having an electronic health record system in an emergency department. The current computerized system used at Suny Downstate Hospital in Brooklyn is called T-SYSTEM, and has been in operation

  • Security Analysis in Practice Security Risk Analysis in

    Security Analysis in Practice Security Risk-Analysis in Practice Speech The purpose of this work is to write a speech in relation to "Security Analysis in Practice' and to identify the most common theoretical basis or foundation of the models used by practitioners. Secondly this work will identify the types of practical adjustments financial analysts might consider in order to arrive at a more accurate security valuations. Speech The subject that is in focus today is

  • Business Systems Analysis

    Business Systems Analysis Business System Analysis In the wake of technological advancements, there is a remarkable development and progression in all sectors of life. Education, political, social and business systems are among the latest inventions in the technological sector. An industry ripping immense benefits from the technological development is the business sector. It provides a vast market for the system developers who work tirelessly to develop systems that perform various activities. The

  • Vivint Home Security System Security Systems Development

    Vivint Home Security System Security Systems Development Life Cycle In the system development cycle, certain precise steps are accountable and they are all integrated into phases. As mentioned in the abstract earlier, five stages/phases are used as guidelines when developing the security system, or any other system. In the planning system, the project is reviewed to realize its applicability. In the case of Vivint home security system, the proposal of the system

  • U S Social Security System Editorial U S Social

    U.S. Social Security System Editorial: U.S. Social Security System Precisely, Social Security is called Old Age, Survivors, and Disability Insurance (OASDI) government program that provide financial benefits to retirees, spouses/children of deceased workers, and disabled workers (Aaron 2011). This U.S. program is financed through a payroll deduction (FICA) tax imposed upon eligible workers. Interestingly, the first social security program originated in Germany in 1889 by Chancellor Otto von Bismarck (Kotlikoff 2011). Although

  • Social Security System Is Designed

    ("Canada Social Security and Welfare," 2012) (Aaron, 1999) (Livingston, 2007) This is different from Social Security as these areas are not covered. Any kind of assistance for health care would fall under other programs (i.e. Medicare and Medicaid). However, these are only designed to protect those individuals who meet the age and income requirements. To provide assistance for low income families, this would fall under the WIC program (which is

  • Vonnie s Distribution Services Network Security Systems

    Network Security for Vonnie's Distribution Services Objective of this project is to design network solution and security system for the Vonnie's Distribution Services. The company is considering expanding from the first floor to the third floor within the next few years and the management asks the company Chief Information Officer (CIO) to design a stable, scalable and reliable network security and infrastructure. However, justification of the relationships between security and infrastructure

Read Full Term Paper
Copyright 2016 . All Rights Reserved