Denial-of-service attacks, fraud, information destruction, and a host of other kinds of crimes are routinely committed via Internet/Intranet systems. Up-to-date security measures and policies are detailed in such an environment. Many corporations and businesses breathed a suspire of relief with the advent of radio technologies. Many felt that these devices offered a higher security than traditional Internet/Intranet connections and devices. However, this is a romance because wireless applications have as many if not much security concerns than their conventional counterparts. As one technophile relates "In wireless we have created another access and somebody in that gateway has access to all the traffic. It doesn't matter if the information is encrypted on your cellular phone phone. If someone gets into the Internet, you might as well through the security out. It's not the air waves that are the problem. It's the gateway" (Giarraputo 83). As E-commerce increases, accredit card companies like Visa are working on merchant security measures to help prevent fraud.
Hackers and crackers are capable of
Collett, S. Card issuers compel security plan. Computerworld. May 17, 1999, 4.
Dugan, S. M. What are the lessons of business-to-consumer electronic commerce? protective cover and security. InfoWorld. Jan 31, 2000, 60.
The first line of defense for most systems, either outfit or wireless, are known as access security measures. These include the need for a Username and Password without which users cannot access the network, files, or Web site. Skilled hackers can typically get some access security measures, from booting the computer up with a floppy and chaining it to another drive, or because once they break the password or username there are no further security checks.
The advent of more businesses utilizing the Web only makes it more vulnerable to security threats "Since the Web is being utilized by both dainty and large corporations, and by governments for conducting their business electronically, people with malicious emotional state do not have to leave their computers to bring a business to its knees" (Bashir, Serafini, and Wall 1).
Schwartz, M. Trust but verify. Computerworld, Inc.. Feb 12, 2001, 1-2.
Sean M. Dugan's (60) article in a recent edition of InfoWorld begins with a title that asks the interrogative: "What are the lessons of business-to-consumer electronic commerce?" His answer to the question? ? " gage and security." (Dugan 60). As more and more businesses wish to participate in the economic boon represented by E-commerce, security experts reprimand that E-commerce security is the top issue on the Information engine room agenda. As one worried IT specialist notes "Businesses built on a digital backbone able to turn on a dime in response to changing trade conditions ? is a nightmare security scenario" (Dugan 60). As more and more business is conducted over the Internet, security measures designed to make E-commerce minutes secure for businesses and consumers will continue to emerge and remain a top focus of security managers.
Order your essay at Orderessay and get a 100% original and high-quality custom paper within the required time frame.
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.