E-CoMm3eRcE

W3 BeL0nG ToG3tHeRz...

Nowadays, computers become the most common technology devices for individuals, businesses and organizations. People use computers to create, store and manage information or data. Therefore, the basic computer security plays an important role in protecting our information or data from losses, damages or misuse by others. Similarly, securities toward online internet are also important. Organizations which conduct their businesses through internet are often attacked by certain security threats. Since the internet is available for everyone, so people can access easily to the internet in order to download or upload any software programs they desire; or communicate with others through social networking. Thus, organization should always ensure that their internet security protection is up-to-date in order to protecting their system from potential threats and attacks.


The following are some of the examples of potential threats and attacks:

1. Phishing is like a theft attempts to obtain your personal information and financial information by sending fraudulent e-mail messages that appear to come from legitimate business.


2. Virus is a piece of software, it will simply infect and spread over the operating system and consequently break down the server system.


3. Worm is a software program that can spread itself without any human intervention and also infect a computer or hand held device or instant messages.


4. Trojan Horse is a program that appears to have a useful function but that contains a hidden function that presents a security risk.


5. Denial of Service is an attack on web site which sends a flood of data packets to the target computer and inflects the network to shut down.


Basically, online security can be classified into three main security concepts which are as follow:

1. Confidentiality – the users such as individuals or companies should protect their private or sensitive information and allows only the authorized users to access into the system.


2. Integrity – to ensure that data or information is able to defend from misuse, damage or loss.


3. Availability – to ensure that the users are able to access the information which is authorized and from a reliable and timely sources.


References:

Turban, E., King, D., McKay, J., Marshall, P., Lee, J., & Viehland, D., (2008). Electronic Commerce: A Managerial Perspective 2008 (International Edition). Upper Saddle River, NJ: Pearson-Education International, pg 522, 524, 526.

1 comments:

it is clear and well organized...

Post a Comment

Powered By Blogger

No. of Visitors

web counter

Time and Date

About This Blog

~ W3 B3L0nG ToG3tHeRz ~

We are from UTAR BAC 11, this blog set up is of course for the purpose of blogging. But it is all about E-COMMERCE.
Our group members included:

1) Clara Cheng Hwee Ling
2) Quek Chaw Mien
3) Sia Chee Ying
4) Yap Wei Chien

好开心

好开心

Lovely ~~

Lovely ~~

Lets Chat


ShoutMix chat widget

Followers

Music Player