The merits associated with e-commerce has therefore resulted to rapid adoption of the concept with a heavy reliance on various encryption techniques such as SLL as well as username and password based authentication techniques that rely on authentication files contained within the file named .htaccess.
The simplicity of adopting and implementing both methods is therefore a merit as both can be achieved through the use of various components that are readily available to be used on the various web browsers. Their availability is however marked with cases of attacks fuelled majorly by the very nature of the common protocol used (TCP/IP). The availability of numerous points of attacks in terms of ports presents an excellent opportunity for would-be attackers to plan as well as to execute their attacks unabated. In order to achieve maximally secured e-business framework all the communication ports which run in the thousands must be watched every millisecond of their use.
All enterprises on the face of this earth have come to learn that is utterly impossible to eliminate all the risks associated with business. The best that can be done however is to manage the level of damage that can possible occur as a result of a risk affecting the operation of any business. The appropriate technologies must therefore be adopted in order to ensure that the processes that occur at then various e-business portals are secured to the acceptable standards. This is achieved through the installation of various technologies such as firewalls, encryption techniques, use of key card as well as the rolling out of properly managed Virtual Private Networks. These technologies are however no match for the current rate of attacks which exploit the fact that the technologies can only be implemented on certain parts of the network only. The use of obvious passwords as well as improperly configured network terminals is a recipe for unauthorized e-business portal control and data breach. The fact that the data being transmitted can be easily intercepted and even corrupted is a major blow to the e-business data integrity.
Ensuring e-business success through the reduction of online risks and cost
The concept of e-business is mainly faced with two types of risks in its implementation through both the open systems as well as networks ( Lasheng and Placide, 2009). The initial risk is associated with the opportunity cost related with the lack of implementing an overall connection which links a particular e-business with the rest of the world. There is also a great number of success statistics regarding the operations of various business-to-business (B2B) commerce activities in the online context. This is because the various B2B networks help in reducing the cost of sales as less staff is required in order to take care of the various business activities in the organizations.
Various firms therefore require the security and reliability that comes with the implementation of the various e-business platforms. The whole idea of e-business should be crowned and presented in a model which is encompasses the various functions of manufacturing, warehousing as well as enhancing the customer experience and relationship. Apart from the common lack of trust among the various persons who use the e-commerce platforms on the reliability and security of the technology, there is also the risk associated with the lack of flexibility that is necessary to offset the impending challenges that dog this form of doing business. There is therefore a need for an efficient risk management technique that is necessary to ensure that the key parameters of an e-business platform are properly taken care of and accounted for. The availability of proper and secure e-business platforms is crucial for winning the trust of the clients. In order to design a system that can appropriately meet the demand of the clients, it is crucial to properly identify the key factors that customers are concerned about in order to mend them as an effort to winning their trust in engaging with the e-commerce system it has been pointed out by Lasheng and Placide (2009) that a secured e-business environment helps firms in learning about their existence as well as their operations. They also gain a perspective regarding their potential and current client base.
There are various metrics that constitute a secure e-business environment. These metrics are essential to the achievement of success by the firms that adopt them because of the following reasons. The successful adoption and implementation of a secure e-business environment must meet the following conditions.
Must ensure that the data being exchanged is available with the highest level of both integrity and confidentiality (Information Assurance key...
Role of Time in Information Assurance The society at large is on the verge of a new era. This new era is the information age which is marked with a major paradigm shift in the area of information assurance. Information assurance has three main attributes: confidentiality, integrity, and availability. All the three tenants of information assurance must be well guarded and maintained in order to bring a marked improvement of both
Federal Plans NICE Plan Development and Research Challenge Future Plan This paper discusses what is referred to as the Federal Plan is for Cyber Security and Information Assurance (CSIA- R&D) Research and Development. Details of the federal government's plan will be discussed as well as what is expected and can be done about cyber security in the long-term. In this federal plan, the terms 'information assurance' and 'cyber security' refer to measures put in place to
Assurance Program Why/How to create an Information Assurance Just as paramount as the availability and access to information is significant in every company or business outfit, certain concerns always come to the fore: the kind of information is to be made. How the information is going to be organized? How will it be possible to ensure that the information released represents the judgment of the management of the company and gives
IT Governance lays special emphasis on the system of information technology, along with the performance and risk management of the IT infrastructure in an organizational context. The primitive focus of IT Governance is the assurance of the fact that investment in the Information technology infrastructure is contributing to generate business value and at the same time lessen the potential risks pertaining to the Information Technology. This objective is attained by
Security A broad definition of information security is given in ISO/IEC 17799 (2000) standard as: "The preservation of confidentiality (ensuring that information is accessible only to those authorized to have access), integrity (safeguarding the accuracy and completeness of information and processing methods), and availability (ensuring that authorized users have access to information and associated assets when required" (ISO/IEC 17799, 2000, p. viii). Prior to the computer and internet security emerged as we
Migrate off of any individualized content management systems and processes not integrated to a single portal platform for greater cost and time savings in administration. Olson (32) provides an excellent case study on how universities are making use of open source portal applications to alleviate redundant and often conflicting data in multiple portals on an IBM WebSphere platform Define and build out a portal development plan that encompasses all shared processes
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now