J.S.S.Y's E-Commerce World

Embark on our e-commerce world and enjoy your learning process...



In this fast moving world, everyone tends to depend on computers and internet. They buy and sell products online, and services over electronic systems such as the Internet and other computer networks. The amount of trade conducted electronically has grown extraordinarily with widespread Internet usage. It is well known that by using E-commerce, things can be done fast and accurately. Besides that, customers can also reduce cost because there's no extra cost incurred such as travelling cost, surcharge and so on. Although E-commerce has alot of advantages, it also has its drawback. Customers tend to trust internet and reveal their personal information such as, bank account number, handphone number and so on. Are these information being protected? There are certain ways that can violate the customers personal and financial information. Hackers can steal customers' information and misuse it. In order to prevent this situation the internet security should be increased.

There are number of ways to safeguard our financial and personal data.

1. Use password protection.

Password protection is one of the most commonly used method to safeguard our financial and personal data. Apassword is a secret word or string of characters that is used for authentication, to prove identity or gain access to a resource. The password must be kept secret from those not allowed access. The passwords should be chosen so that they are hard for an attacker to guess and hard for an attacker to discover using any of the available automatic attack schemes.

2. Use Biometric System
Biometrics refers to methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. In information technology, in particular, biometrics is used as a form of identity access management and access control. It is also used to identify individuals in groups that are under surveillance. Biometric characteristics can be divided in two main classes which are physiological and behavioral.





  • Physiological are related to the shape of the body. Examples include, but are not limited to fingerprint, face recognition, DNA, hand and palm geometry, iris recognition, which has largely replaced retina, and odor/scent.

  • Behavioral are related to the behavior of a person. Examples include, but are not limited to typing rhythm, gait, and voice. Some researchers have coined the term behaviometrics for this class of biometrics.


3. Encryption
Encryption is the process of transforming information that is known as plaintext using an algorithm to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is encrypted information is known as ciphertext. Encryption is now commonly used in protecting information within many kinds of civilian systems.Encryption can be used to protect data "at rest", such as files on computers and storage devices (e.g. USB flash drives). Encryption is also used to protect data in transit, for example data being transferred via networks (e.g. the Internet, e-commerce), mobile telephones, wireless microphones, wireless intercom systems, Bluetooth devices and bank automatic teller machines. Encryption will keep the information integrated and confidential.


4. Install Anti-virus Software and Firewall
Anti-virus software is used to prevent, detect, and remove malware including computer viruses, worms and trojan horses. Such programs may also prevent and remove adware and spyware and other forms of malware. Examples of notable anti-viruses are, Avira, Norton Antivirus,
Panda and Bitdefender.


Firewall Diagram

A firewall is a part of a computer system or network that is designed to block unauthorized access while permitting authorized communications. It is a device or set of devices configured to permit, deny, encrypt, decrypt, or proxy all (in and out) computer traffic between different security domains based upon a set of rules and other criteria. Firewalls can be implemented in either hardware or software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria. A firewall's function within a network is similar to physical firewalls with fire doors in building construction. In the former case, it is used to prevent network intrusion to the private network. In the latter case, it is intended to contain and delay structural fire from spreading to adjacent structures.


REFERENCE
http://en.wikipedia.org/wiki/List_of_antivirus_software
http://www.businessdictionary.com/definition/biometric-authentication.html

0 comments:

Post a Comment

Search This Blog

About Us

Hi! Welcome to our E-Commerce Blog. We are students from University Tunku Abdul Rahman, BAC Group 12. Starting from today, we will be sharing our knowlegde about E-Commerce by posting some related blogs. Hope it will be informative to you. Do send us your comments. Thank You.