Facebook Pixel Code
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.


This is a preview of the 12-page document
Read full text
Thus with the traditional security issues related to the fraud and theft the use of e-commerce is observed nowadays to become a platform wherein consumer security and privacy is largely compromised. Data integrity is observed to be at stake owing to the rise of insecurity related to conducting of transactions in the e-commerce sites. Intrusion of Viruses and Trojan horse attacks creates potential disruption in the activities conducted along the e-commerce plane. The above featured problems along the e-commerce plane thereby affect the efficacy of the system and make it vulnerable to external attacks and growth of malicious activities (Marchany & Tront, 2002).Khusial and McKegney (2005) reflect on the different security issues affecting the e-commerce activities on a global plane. One of the most common security attacks countered by the users of the e-commerce sites is referred to as social engineering. Through the use of the social engineering techniques hackers’ endeavor on retrieving the personal information of the users relating to passwords and also of other data related to registration and authentication information of the users to different sites. Illegitimate sites are created by the hackers to help retrieve the personal information of the users which are then used for manipulation purposes. Further different tools like SATAN are used by hackers to generate entry into the personal computers of the users which in turn contributes in gaining confidential information like passwords to different potential sites. Similarly other types of security problems occur related to sniffing activities such that the credit card number of the users or customers is hacked through the monitoring of data related to transactions carried out between the user’s computer and that of the shopper’s server. Existence of unencrypted information relating to the transactions carried out in a wireless hub is prone to such attacks. Other types of attacks carried out by the hacker relate to making the server computer attack prone through the mode of exhausting its capacity to conduct a number of mundane and useless tasks (Khusial & McKegney, 2005).Niranjanamurthy and Chahar (2013) identify virus and Trojan horse attacks as the most vulnerable security threats that tend to affect the activities conducted along the e-commerce plane. The intrusion of Trojan horse
This is a preview of the 12-page document
Open full text

Related Topics

Close ✕
Tracy Smith Editor&Proofreader
Expert in: Business, Management, Finance & Accounting
Hire an Editor
Matt Hamilton Writer
Expert in: Business, Macro & Microeconomics, Marketing
Hire a Writer
preview essay on E-commerce
WE CAN HELP TO FIND AN ESSAYDidn't find an essay?

Please type your essay title, choose your document type, enter your email and we send you essay samples

Contact Us