Skip to main content

How is data and message security ensured in e-business?

The data and message security ensured in e-business via:

  • Encryption: This technology deploys a public key and a private key infrastructure to ensure security. The public key can be distributed but the private key remains only with the user and the service provider. So, it works just like the username and password system of your e-mail account.
  • Digital signatures: This technology requires a recipient’s password to decode the encrypted data. The sender’s authentication gets confirmed through a digital certificate, issued by credible authorities such as Verisign and Thawte.
  • Secure socket layers (SSL): This process involves both public key and digital certificate technologies to ensure privacy and authentication. To initiate the process, a client asks for authentication from the server, which is done through a digital certificate. Then, both the client and server design session keys for data transfer. The session will expire following any modification or prolonged period of inactivity.
  • Firewalls: This includes both software and hardware that protects the network against hackers and viruses. Installing premium quality anti-virus programs and spyware helps to fortify e-commerce protection from malicious threats.
  • Access control: Restricting user access to information on the site is an effective way to control the site’s security. Researches show that most e-commerce malfunctions occur due to users’ ignorance. Access control measures can include:
    • Restrictions on the use of CDs/DVDs or USB storage devices in the company.
    • Limit over opening of personal accounts, such as Gmail, Yahoo or MSN, through official network.
    • Network restrictions to regulate access to external network or system resources.
    • Application control to restrict entry into sensitive environment.
  • Detection programs: These programs monitor network operations for any suspicious activity. They will generate an alert if a potential attack is suspected.
  • Revising for new threats: Business enterprises must constantly update e-commerce security plans to remain protected from new threats.

Comments

  1. You have listed all the main and popular form of securing information. I am familiar with only one or two methods mentioned above. Thank you for this informed article, I will search for more information about each one of them.
    digital signature FAQ

    ReplyDelete

Post a Comment

Popular posts from this blog

Case Study: A perfect competition

In 1997, over $700 billion purchases were charged on credit cards, and this total is increasing at a rate of over 10 per cent a year. At first glance, the credit card market would seem to be a rather concentrated industry. Visa, MasterCard and American Express are the most familiar names, and over 60 per cent of all charges are made using one of these three cards. But on closer examination, the industry seems to exhibit most characteristics of perfect competition. Consider first the size and distribution of buyers and sellers. Although Visa, Mastercard and American Express are the choices of the majority of consumers, these cards do not originate from just three firms. In fact, there are over six thousand enterprises (primarily banks and credit unions) in the US that offer charge cards to over 90 million credit card holders. One person's Visa card may have been issued by his company's credit union in Los Angeles, while a next door neighbour may have acquired hers from a Miami B

Discuss the relationship between economics and management functions. How does the former contribute to the latter?

Economics and Management are ideal intellectual partners, each particularly fitted to strengthen and cross-fertilize the other. Economics provides the broader understanding of economic activity within which all organizations function; management in turn analyses the character and goals of that functioning. The management economics is often a subsection of the economic science and thus in broader sense a special form of the social, culture and Geisteswissenschaften. Like the economic science it is based in principle on the fact that most goods are limited and must by the participants be managed. It describes the economic functions of the enterprise within a national economy. In addition above all the optimal organization of the factors of production belongs apart from the company targets and the economical functions. In the broader sense also all households are enterprises.

Case Study: Human Resource Planning - What is that?

You are a human resource consultant. The newly appointed president of a large paper manufacturing firm has called you: President : I have been in this job for about one month now, and all I seem to do is interview people and listen to personal problems. You : Why have you been interviewing people? Don't you have a human resource department? President : Yes, we do. However, the human resource department does not hire top management people. As soon as I took over, I found out that two of my vice presidents were retiring and we had no one to replace them. You : Have you hired anyone? President : Yes, I have, and that is part of the problem. I hired a person from the outside. As soon as the announcement was made, one of my department heads came in and resigned. She said she had wanted that job as vice president for eight years. She was angry because we had hired someone from outside. How was I supposed to know she wanted the job? You : What have you done about the other vice pre