Security System Analysis Term Paper

PAGES
5
WORDS
1413
Cite

Security System Analysis Paypal

The information era has totally revolutionized our society with its sphere of influence touching every facet of our lives. There is a paradigm shift in our business methodology and ecommerce has evolved as an integral and indispensable aspect of any business venture that wishes to capitalize on the global market that technology promises. Today more and more companies are recognizing the vast potential and the unprecedented customer base of ecommerce which is definitely poised to become the mainstay business medium of the future. With ecommerce exploding like anything there will be more and more transfer of funds online. It stands out clearly that the anonymous nature of the web medium poses issues pertaining to the credibility and authenticity and thus compromises on the flexibility and the comfort of the web. The success of fast online fund transfer very much hinges on implementing effective security measures to thwart the designs of hackers and other snoopers who threaten the whole concept. Paypal is a concept that offers a hassle free and secure solution for online funds transfer. Let us have a brief outlook on the issues pertaining to security on the web and how Paypal, one of the leading online payment networks handles this area of concern.

Paypal Features

Paypal is rapidly developing into one of the easiest methods of transferring funds and making payments online. The Paypal concept allows money to be transferred via email to anybody who has a paypal account. The company has attracted several millions of people in the United States alone and is already accepting international customers. Let us now dwell in depth on Paypal's security features that protect the confidentiality and privacy of the users and how it strives to ensure the authenticity and the credibility of the transactions.

Dangers of Security Lapses

One of the worst fears of people using the Internet is the danger of ending up disclosing (unknowingly) their personal and financial information to a nosey hacker. If information transaction is not sufficiently protected by means of encryption techniques and protocols which ensure authenticity of the transaction the whole concept of web trade will be at...

...

The huge pile of personal data that is stored in the company servers can be accessed or manipulated by these evasive intruders exposing the customers to grave consequences. In fact loss of privacy and impersonation have proved to be the bane of the information highway.
Ensuring Privacy (Isolated Storage)

The main idea behind the birth of the Paypal concept is to get around the hidden dangers involved in the disclosure of sensitive information such as credit card numbers and other personal data without hindering online transactions. Paypal protects the financial as well as the personal information of its members from fellow members. Information pertaining to each customer is stored in an encrypted form in computer systems that are totally isolated from the web. This ensures that information is accessible only to the Paypal staff who need the data to provide the requested services. All transactions and updations of personal information are regulated by a password system and a highly sophisticated encryption mechanism. {Paypal]

The SSL Security (Digital integrity and authenticity)

Paypal is secure with the SSL (Secure Sockets Layer) protocol, which implies that all the transactions between the client and the host are safe as the data which is exchanged is rendered undecipherable and meaningless to anyone who happens to gain unauthorized access. The essential idea of the SSL protocol is to encrypt the information at the sender's end and decrypt the same at the receiver's end. En route the data cannot be extracted in a meaningful form which in effect makes the whole transaction tamper proof. Paypal uses digital signatures to verify each transaction for completeness and authenticity and to identify if information is tampered with or is lost due to some reason while on transit. Digital signatures ensure that the data that is passed on is unchanged and they also have an automatic time stamping facility.

SSL protocol is actually made up of two separate protocols namely the SSL Record Protocol and the SSL Handshake protocol. SSL record protocol looks after the format in which data is transmitted over the web and also manages the data integrity. SSL handshake protocol on the other hand determines the…

Sources Used in Documents:

Bibliography

Bplnet.com, "Internet Technology Primer: Secure With SSL ' Chip Magazine, November 2000

Paypal Inc., "FDIC pass Through Insurance," Accessed on July 26th, 2003, http://www.paypal.com/cgi-bin/webscr?cmd=p/gen/fdic-outside

Designed by Faqs.org, "Advantages and Disadvantages of Kerberos Vs SSL," Accessed on July 26th, 2003, http://www.faqs.org/faqs/kerberos-faq/general/section-31.html

Paypal Inc., "Privacy Policy," Accessed on July 26th, 2003, http://www.paypal.com/cgi-bin/webscr?cmd=p/gen/ua/policy_privacy-outside


Cite this Document:

"Security System Analysis" (2003, July 27) Retrieved April 24, 2024, from
https://www.paperdue.com/essay/security-system-analysis-150863

"Security System Analysis" 27 July 2003. Web.24 April. 2024. <
https://www.paperdue.com/essay/security-system-analysis-150863>

"Security System Analysis", 27 July 2003, Accessed.24 April. 2024,
https://www.paperdue.com/essay/security-system-analysis-150863

Related Documents

System Analysis of T-SYSTEM Because of its ability to improve the quality and delivery of health care services, the Electronic Health Record is becoming a necessity in almost every healthcare organization. The purpose of this paper is to explain the impact of having an electronic health record system in an emergency department. The current computerized system used at Suny Downstate Hospital in Brooklyn is called T-SYSTEM, and has been in operation

Security Analysis in Practice Security Risk-Analysis in Practice Speech The purpose of this work is to write a speech in relation to "Security Analysis in Practice' and to identify the most common theoretical basis or foundation of the models used by practitioners. Secondly this work will identify the types of practical adjustments financial analysts might consider in order to arrive at a more accurate security valuations. Speech The subject that is in focus today is

Auditing, Monitoring, Intrusion Prevention, Detection, and Penetration Testing The network vulnerability is a major security weakness that allows an attacker reducing computer information assurance. Vulnerability intersects three elements: a system flaw, the attacker is having access to the flaw, and ability to exploit the flaw. Thus, a security risk is classified as a vulnerability that is tied to a great significant loss. The vulnerability can erode data confidential, system integrity and

Business Systems Analysis
PAGES 5 WORDS 1348

Business Systems Analysis Business System Analysis In the wake of technological advancements, there is a remarkable development and progression in all sectors of life. Education, political, social and business systems are among the latest inventions in the technological sector. An industry ripping immense benefits from the technological development is the business sector. It provides a vast market for the system developers who work tirelessly to develop systems that perform various activities. The

Vivint Home Security System Security Systems Development Life Cycle In the system development cycle, certain precise steps are accountable and they are all integrated into phases. As mentioned in the abstract earlier, five stages/phases are used as guidelines when developing the security system, or any other system. In the planning system, the project is reviewed to realize its applicability. In the case of Vivint home security system, the proposal of the system

U.S. Social Security System Editorial: U.S. Social Security System Precisely, Social Security is called Old Age, Survivors, and Disability Insurance (OASDI) government program that provide financial benefits to retirees, spouses/children of deceased workers, and disabled workers (Aaron 2011). This U.S. program is financed through a payroll deduction (FICA) tax imposed upon eligible workers. Interestingly, the first social security program originated in Germany in 1889 by Chancellor Otto von Bismarck (Kotlikoff 2011). Although