• الصفحة الرئيسية
  • إتصل بنا
  • سياسة الخصوصية
Logo
  • الرئيسية
  • أفكار
  • صحة
  • معلومات
  • عجائب وغرائب
  • تكنولوجيا
الصفحة الرئيسية E-commerce E-commerce Security Issues

E-commerce Security Issues

الكاتب ahmed في 12:46 AM E-commerce
First of all e-commerce is surrounded by different issues such as commercial, Network infrastructure, Social and Cultural and Security issues are presented below which are important for successful business. E-commerce security issues are frequently aired in the press and are certainly important. Customers are concerned that the item ordered won’t materialize, or be as described. As (much worse) they worry about their social security number and credit card details being misappropriated. However rare, these things do happen, and customers need to be assured that all e-commerce security issues have been covered. Your guarantees and returns policies must be stated on the website and they must be adhered to. Let us first state the security attacks on e-commerce process and Security goals we want to achieve for successful e-commerce.

Attacks on Security
Security attacks can be classified in the following categories depending on the nature of the attacker.

a)      Passive Attacks
The attacker can only eavesdrop or monitor the network traffic. Typically, this is the easiest form of attack and can be performed without difficulty in many networking environments, e.g. broadcast type networks such as Ethernet and wireless networks.

b)      Active Attacks
The attacker is not only able to listen to the transmission but is also able to actively alter or obstruct it. Furthermore, depending on the attackers actions, the following subcategories can be used to cover to cover the majority to cover the majority of attacks.

c)       Eavesdropping
This is attack is used to gain knowledge of the transmitted data. This is passive attack which is easily performed in many networking environments as motioned above. However, this attack can easily perform in many networking environments. However this attack can easily be prevented by using an encryption scheme to protect the transmitted data.

d)      Traffic Analysis
The main goal of this attack is not to gain direct knowledge about the transmitted data, but to extra information from the characteristics of the transmission, e.g. amount of data transmitted, identity of the communicating nodes etc. This information may allow the attacked to deduce sensitive information, e.g., the roes of the communicating nodes, their position etc. Unlike the previously described attack, this one is more difficult to prevent.

e)      Impersonation
Here, the attacker uses the identity of another node to gain unauthorized access to resource or data. This attack is often used as a prerequisite to eavesdropping. By impersonating a legitimate node, the attacker can try to gain access to the encryption key used to protect the transmitted data. Once, this key is known by the attacker, she can successfully perform the eavesdropping attack.


f)       Modification
This attack modifies data during the transmission between the communicating nodes, implying that the communicating nodes do not share the same view of the transmitted data. An example could be when the transmitted data represents a financial transaction where the attacker has modified the transactions value.

g)      Insertion
This attack involves an unauthorized party, who inserts new data claiming that it originates from a legitimate party. This attack is related to that of impersonation.

You may also wanted to view the following related posts

  • Defining e-commerce
  • Development of e-commerce
  • Classification of E-commerce by transaction partners
  • Definition of E-Government
  • Challenges and Opportunities for Developing a Successful E-Government
  • Factors Affecting the Success of E-Government
  • E-commerce Security Issues
  • Risk of e-commerce
  • Benefits of e-commerce

You can view the following other posts

  • List of bad ways for building backlinks
  • List of good ways of building quality backlinks
  • List of top .edu forums or sites to create quality backlinks
  • Solved MCQ of Database Management System (DBMS) Set - 3
  • Solved MCQ of System Analysis and Design Set-3
  • Solved MCQ of Data Structure Set - 2
  • Solved MCQ of Java for Java Proficiency test set-3
  • MCQ of C++ with answer Set-2
  • MCQ of Computer Networking with answer set-4
    شارك المقال :
    Tweet
    ✚

    مقالات ذات صلة

    التالي
    المشاركةالتالية
    السابق
    المشاركة السابقة

    1 تعليق لـ "E-commerce Security Issues"

    1. SYEDNovember 26, 2012 at 1:47 AM

      although i ahve fair idea about the security on E commerce, but could you please help us with some kind of fixes for these bugs, like my site needs

      SSL
      and other such security measures,
      Please help.

      ReplyDelete
      Replies
        Reply
    Add comment
    Load more...

    تحويل كودإخفاء محول الأكواد الإبتساماتإخفاء

    Subscribe to: Post Comments (Atom)
    • Facebook
    • twitter
    • googleplus
    • youtube
    • linkedin

    الأكثر زيارة

    • What is Information ?
      Information  can be defined as data that has been processed into a form that is meaningful to the recipient and is of real or perceived valu...
    • What is Information Technology?
      Definitions of  Information technology  ( IT ) It is a branch of engineering dealing with the use of computers and telecommunications equipm...
    • بالصور الفائزة بمسابقة ملكة جمال مصر 2017
      بالصور الفائزة بمسابقة ملكة جمال مصر 2017
      بالصور الفائزة بمسابقة ملكة جمال مصر 2017 لن تصدق من هي فرح صدقي ↓↓  لمشاهدة الصور والخبر كامل اضغط هنا  ↓↓ رابط المو...
    • Interview Questions on Stack and Queue in Data Structure set-2
      1) The queue in which the insertion takes place in the first position after of last element is a ...... A. priority B. dequeue C. circular D...
    • List of Top 65 Search Engine Submission Add URLs.
      List of Top 65 Search Engine Submission Add URLs.
      To get your site on the top ranking on the search engine results, Your site or URL must be indexed by Search Engines. For that you have to s...
    • List of Best Keyword Research Tools for Better SEO
      List of Best Keyword Research Tools for Better SEO
      Everyone needs to do keyword research work for the site before starting search engine optimization work as the first and most essential tas...
    • What are the different types of scheduling methods?
      Process scheduling is one way for a processor to handle n processes , by scheduling the execution process. Each process is executed one by ...
    • Solved MCQ on Database Backup and Recovery in DBMS set-1
      1) Which of the following is not a recovery technique? A. Deferred update B. Immediate update C. Two-phase commit D. Recovery management 2)C...
    • Solved MCQ on Distributed Database Transaction Management set-4
      1) Commit and rollback are related to .......... A. data integrity B. data consistency C. data sharing D. data security 2) The transaction w...
    • Solved MCQ on Fundamental of DBMS set-10
      1) Which of the following is not a characteristic of a relational database model? A. Table B. Tree like structure C. Complex logical relatio...

    الأقسام

    • Artificial Intelligence(AI)
    • Backlinking
    • Basic IT
    • Best List
    • Blogging Tips
    • C
    • C#
    • C++
    • Computer Architecture
    • Computer Fundamental
    • Computer Security
    • Computer/IT Officer Exam
    • CSS
    • Data Mining and Warehousing
    • Data Recovery Tools
    • Data Structure
    • Database Management System
    • E-commerce
    • E-government
    • Internet & Web Designing
    • IT Law
    • IT Tips and Tricks
    • IT Tutorials
    • Java
    • JavaScript
    • Keyword Research Tools
    • MIS
    • Multiple Choice Question (MCQ)
    • Networking
    • Online Earning
    • Online IT Jobs
    • Operating System
    • Oracle Forms and Reports
    • Programming Guide
    • Programming Language
    • SEO
    • Social Networking Sites
    • Software Download
    • Software Engineering
    • System Analysis and Design
    • Top List
    • VB.Net
    • صحة
    • عجائب وغرائب

    الأرشيف

    • ►  2017 (4)
      • ►  November (3)
      • ►  October (1)
    • ►  2016 (5)
      • ►  April (5)
    • ►  2015 (87)
      • ►  August (1)
      • ►  July (8)
      • ►  June (13)
      • ►  May (2)
      • ►  April (2)
      • ►  March (4)
      • ►  February (20)
      • ►  January (37)
    • ►  2014 (77)
      • ►  December (31)
      • ►  November (4)
      • ►  September (4)
      • ►  August (11)
      • ►  July (8)
      • ►  June (2)
      • ►  May (2)
      • ►  April (2)
      • ►  March (2)
      • ►  February (7)
      • ►  January (4)
    • ►  2013 (132)
      • ►  December (11)
      • ►  November (6)
      • ►  October (4)
      • ►  September (6)
      • ►  August (16)
      • ►  July (9)
      • ►  June (9)
      • ►  May (12)
      • ►  April (13)
      • ►  March (23)
      • ►  February (6)
      • ►  January (17)
    • ▼  2012 (59)
      • ►  December (15)
      • ▼  November (20)
        • Secure Socket Layer (SSL)
        • Internet Security & IP Security (IPSec)
        • Solved MCQ of System Analysis and Design Set-3
        • Solved MCQ of System Analysis and Design Set-2
        • Solved MCQ of System Analysis and Design Set-1
        • Data model and Relational Database Model
        • Database Management System (DBMS)
        • E-commerce Security Issues
        • Risk of e-commerce
        • Benefits of e-commerce
        • Development of e-commerce
        • Graph Definition
        • Definition of Tree
        • Definition of Queues
        • Definition of Stack
        • Fundamental of data structures
        • Programming Language Definition
        • Network Reference Models (Network Architectures)
        • Network Functions
        • Network Topology
      • ►  October (21)
      • ►  September (3)

    إنضم لنا

    © 2017 أفكار جميع الحقوق محفوظة