Facebook Pixel Code
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.


This is a preview of the 12-page document
Read full text

Thus with the traditional security issues related to the fraud and theft the use of e-commerce is observed nowadays to become a platform wherein consumer security and privacy is largely compromised. Dta integrity is observed to be at stake owing to the rise of insecurity related to conducting of transactions in the e-commerce sites. Itrusion of Viruses and Trojan horse attacks creates potential disruption in the activities conducted along the e-commerce plane. Te above featured problems along the e-commerce plane thereby affect the efficacy of the system and vulnerable to external attacks and growth of malicious activities (Marchany & Tront, 2002).

Kusial and McKegney (2005) reflect on the different security issues affecting the e-commerce activities on a global plane. Oe of the most common security attacks countered by the users of the e-commerce sites is referred to as social engineering. Trough the use of the social engineering techniques hackers’ endeavor on retrieving the personal information of the users relating to passwords and also of other data related to registration and authentication information of the users to different sites are created by the hackers to help retrieve the personal information of the users which are then used for manipulation purposes.

Frther different tools like SATAN are used by hackers to generate entry into the personal computers of the users which in turn contributes in gaining confidential information like passwords to different potential sites. Smilarly other types of security problems occur related to sniffing activities such that the credit card number of the users or customers is hacked through the monitoring of data related to transactions carried between user’s computer and that of the shopper’s server.

Eistence of unencrypted information relating to the transactions carried out in a wireless hub is prone to such attacks. Oher types of attacks carried out by the hacker relate to making the server computer attack prone through the mode of exhausting its capacity to conduct a number of mundane and useless tasks (Khusial & McKegney, 2005). Nranjanamurthy and Chahar (2013) identify virus and Trojan horse attacks as the most vulnerable security threats that tend to affect the activities conducted the e-commerce Te intrusion of Trojan horse. ..

This is a preview of the 12-page document
Open full text

Related Topics

Close ✕
Tracy Smith Editor&Proofreader
Expert in: Business, Management, Finance & Accounting
Hire an Editor
Matt Hamilton Writer
Expert in: Business, Macro & Microeconomics, E-Commerce
Hire a Writer
preview essay on E-commerce
WE CAN HELP TO FIND AN ESSAYDidn't find an essay?

Please type your essay title, choose your document type, enter your email and we send you essay samples

Contact Us