Page 75 - DCAP306_DCAP511_E-COMMERCE_AND_E-BUSINESS
P. 75

E-Commerce and E-Business



                          A secured system functions  without displaying unintentional bugs. Let us now focus on the likely
                          attacks that can take place in an e-commerce system. We shall also consider the preventive strategies to
                          be implemented.
                          6.1   Security Concerns
                          In e-commerce, all the transactions are carried out over the Internet. Though the process seems to be
                          interactive and convenient, there are certain risks inherent to the process such as, duplication of bills are
                          difficult to detect and the transaction information  can be altered without leaving any hint. Whereas,
                          when the transactions take  place using paper, the purchase documents cannot be modified as there
                          would be some evidence such as signatures and trademarks that are left behind to trace it down.


                                           Anup and Asha are the transacting partners in an online trading site, who are
                                           aware of each other’s identity. When Anup sends a confidential document such as
                                           a purchase order to Asha, Anup must make sure that, the purchase order is
                                           receivable only by Asha and not by any other third party.
                          An efficient e-commerce system should bring in reliability in identifying and tracing any modifications
                          done to transaction documents such as bank cheque, purchase order, and replacement bills.

                          Whether the transactions are carried out  using paper documents or electronic media, they should
                          ensure that the information is not destroyed, and any other third party user or hackers do not use it
                          inappropriately.  An efficient e-commerce system should guarantee:
                          1.  Confidentiality: The transaction information should be  protected from unauthorized access by
                              internal users and hackers, as it is vulnerable to be intercepted during transmission over several
                              networks. The information should  be encrypted to make it difficult for attackers to  trace the
                              algorithm.

                                          If your friend reads mails that are sent to you, then it is a breach of your confidential
                                          information and privacy.

                          2.  Integrity: The transaction document when retrieved from any communication network must be
                              reliable and  should resemble the transmitted  document without any addition, deletion, or
                              modification.

                                           If a vendor adds extra amount to the bill in addition to your purchase price, then
                                           the vendor has violated integrity with respect to bill charges.

                          3.  Availability: The transaction information communicated across several networks should be
                              available when required. There are several reasons for the unavailability of transaction
                              information such as, virus attacks, abrupt shutdown of systems due to electricity failure, network
                              errors, and errors in product software and hardware.


                                          When your friend sends an SMS and you do not receive it or it may be delivered to
                                          you after a day, then it is termed as unavailability of information at the right time.


                          4.  Authenticity: The retrieved transaction information needs verification to check whether it was sent
                              by the sender or by any other source claiming to be the sender. Likewise, it is also essential to
                              check if the information was delivered to the intended recipient.

                                          When you forget your e-mail password the server asks for your e-mail ID and few
                                          security questions that you had answered while creating an account. This process is
                                          carried out to check whether you are the authenticated person to access the account.





                          68                  LOVELY PROFESSIONAL UNIVERSITY
   70   71   72   73   74   75   76   77   78   79   80