100% (1)
Pages:
3 pages/≈825 words
Sources:
3
Style:
APA
Subject:
Business & Marketing
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 14.58
Topic:

ELEMENTS OF COMPUTER SECURITY

Essay Instructions:
- Elements of Computer Security Research and apply the content from recent articles about the elements of computer security. You must cite at least 3-5 sources outside of the class textbook. Write a minimum of 3 to 5 pages for the body of the research paper (using APA writing style format) discussing your viewpoint on the topic and refer to the content from the articles to support your findings. Write in 3rd person. For APA writing style formatting see the APA style guide at the resources tab for APA formatting guidelines. APA writing style requires in-text citations and references support the citations on the references page as needed throughout the document. Schneider, G. P. (2015). Electronic Commerce (11th ed.). Stamford, CT: Cengage Learning. ISBN: 978-1-285-425436 - Chapter 10 - Chapter 11
Essay Sample Content Preview:
Elements of Computer Security Name Institutional Date Elements of Computer Security Electronic-commerce is the process that involves buying and selling services over the internet. It also includes performing other commercial transactions online. It takes care of distance, transparency, knowledge provision and support systems (Schneider, 2015). However, the key to understanding the concept is e-commerce security. For all its advantages, its users are always at risk of having their confidential details or identity stolen for criminal activities. The main reasons for such attacks lie in software and hardware. One requires technical skills to fend off potential attackers, but many are unwilling to restrict functionality of their systems; this makes them vulnerable (Storey, Kane, & Schwaig, 2009). Attacks in e-commerce are something corporations and individuals will have to start getting used to and to deal with. This paper seeks to discuss the elements of computer security in relation to e-commerce, focusing on the benefits of e-commerce, vulnerabilities, threats and harm, attacks and attackers, and how they can be possibly countered. Electronic Commerce Security Online security has several security issues. The first is computer security where the system is concerned with the protection of assets from unlawful access, alteration, use, or destruction (Storey, Kane, & Schwaig, 2009). The second is physical security; the part of protection that deals with the tangible aspects of devices. Thirdly, logical security uses nonphysical means to protect assets. Another is that online security also deals with threats, which are objects, or acts that are a risk to computer assets (Schneider, 2015); all these privacy concerns fall under computer security. Privacy is taken care of by the Internet Crime Complaint Center (IC3). Its objectives were to serve as a go between to obtain process and refer complaints that are criminal in nature in the fast growing culture of cybercrime. In 2008, 275,284 complaints were received by IC3 website (Kraft & Kakar, 2009). The major mediums in which these frauds took place were web pages (28.9%) and E-mail (74.0%). Estimations found that internet and online services made up 90% of all complaints (Kraft & Kakar, 2009). Security of personal information is, in addition to other internet crime concerns, worrisome to customers. One important privacy threat is the collection of information discreetly without the user’s agreement and having it potentially used for malicious purposes. In consequence, the information may be sold to third parties. Theft of a customer’s identity may result to the theft of credit cards. In 2007, for example, T.J. Maxx stated in Securities and Exchange Commission that 45 million debit and credit card numbers may in an 18 month period been taken from its IT systems (Kraft & Kakar, 2009). Privacy can also be invaded using cookies. Cookies are programs that monitor the user’s movements while on the web, storing them to be identified later. When combined with mailing lists, information in cookies can be used with damaging consequences. Web bugs also have the ability to intrude to users’ privacy. Bugs are effective in privacy invasion as they can be used to steal the users’ Internet Protocol (IP) address or install malicious files on their hard drives. However, there are those that argue against privacy concerns stating that customer data is essential in trend analysis. Companies provide customized services, ascertain purchasing trends, and target specific markets for goods and services. Consumers are presented with a choice on type of privacy they are willing to let known as well as how much of it in return for the results that will suit them (Storey, Kane, & Schwaig, 2009). At the same time, it is difficult to justify individual privacy therefore hard to defend since corporate gains are crucial to the economy compared to individual gains (Smith & Shao, 2007). With this data, retailers can use the information to improve their sales. This information still does not comfort would be online shoppers from the fear of online fraud. Payment Systems for Electronic Commerce Electronic Payment Systems (EPS) have operated since the 1960s rapidly expanding and growing in complexity within this time (Schneider, 2015). Electronic Fund Transfer (EFT) came into existence after the conventional payment sy...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:
Sign In
Not register? Register Now!