Skip to main content

How is data and message security ensured in e-business?

The data and message security ensured in e-business via:

  • Encryption: This technology deploys a public key and a private key infrastructure to ensure security. The public key can be distributed but the private key remains only with the user and the service provider. So, it works just like the username and password system of your e-mail account.
  • Digital signatures: This technology requires a recipient’s password to decode the encrypted data. The sender’s authentication gets confirmed through a digital certificate, issued by credible authorities such as Verisign and Thawte.
  • Secure socket layers (SSL): This process involves both public key and digital certificate technologies to ensure privacy and authentication. To initiate the process, a client asks for authentication from the server, which is done through a digital certificate. Then, both the client and server design session keys for data transfer. The session will expire following any modification or prolonged period of inactivity.
  • Firewalls: This includes both software and hardware that protects the network against hackers and viruses. Installing premium quality anti-virus programs and spyware helps to fortify e-commerce protection from malicious threats.
  • Access control: Restricting user access to information on the site is an effective way to control the site’s security. Researches show that most e-commerce malfunctions occur due to users’ ignorance. Access control measures can include:
    • Restrictions on the use of CDs/DVDs or USB storage devices in the company.
    • Limit over opening of personal accounts, such as Gmail, Yahoo or MSN, through official network.
    • Network restrictions to regulate access to external network or system resources.
    • Application control to restrict entry into sensitive environment.
  • Detection programs: These programs monitor network operations for any suspicious activity. They will generate an alert if a potential attack is suspected.
  • Revising for new threats: Business enterprises must constantly update e-commerce security plans to remain protected from new threats.

Comments

  1. You have listed all the main and popular form of securing information. I am familiar with only one or two methods mentioned above. Thank you for this informed article, I will search for more information about each one of them.
    digital signature FAQ

    ReplyDelete

Post a Comment

Popular posts from this blog

Discuss the relationship between economics and management functions. How does the former contribute to the latter?

Economics and Management are ideal intellectual partners, each particularly fitted to strengthen and cross-fertilize the other. Economics provides the broader understanding of economic activity within which all organizations function; management in turn analyses the character and goals of that functioning. The management economics is often a subsection of the economic science and thus in broader sense a special form of the social, culture and Geisteswissenschaften. Like the economic science it is based in principle on the fact that most goods are limited and must by the participants be managed. It describes the economic functions of the enterprise within a national economy. In addition above all the optimal organization of the factors of production belongs apart from the company targets and the economical functions. In the broader sense also all households are enterprises.

Case Study: A perfect competition

In 1997, over $700 billion purchases were charged on credit cards, and this total is increasing at a rate of over 10 per cent a year. At first glance, the credit card market would seem to be a rather concentrated industry. Visa, MasterCard and American Express are the most familiar names, and over 60 per cent of all charges are made using one of these three cards. But on closer examination, the industry seems to exhibit most characteristics of perfect competition. Consider first the size and distribution of buyers and sellers. Although Visa, Mastercard and American Express are the choices of the majority of consumers, these cards do not originate from just three firms. In fact, there are over six thousand enterprises (primarily banks and credit unions) in the US that offer charge cards to over 90 million credit card holders. One person's Visa card may have been issued by his company's credit union in Los Angeles, while a next door neighbour may have acquired hers from a Miami B

Case Study: Bhopal Gas Tragedy - Communication Failures #1

On 3 December 1984, a runaway reaction had occurred in a storage tank of methylisocyanate (MIC), which was used to manufacture a pesticide. The valves of the tank had burst, and a cloud of poisonous gas had escaped. The winds carried it to nearby shanty towns and the populous city of Bhopal, where thousands of people either died in their sleep or woke and died while fleeing. Those who survived suffered from burning eyes and lungs. Local medical facilities were not equipped for the disaster, and over the next few weeks thousands more died. Due to production problems, the plant was under a great deal of pressure to cut costs. A number of shortcuts had thus been taken with such items as crew training, staffing patterns and maintenance schedules. The original procedure called for upto two years of training for employees in critical superintendent capacities, but the plant operators had received about a month long training, using classroom materials developed in the US and printed in Eng