Sign In
Not register? Register Now!
Pages:
4 pages/β‰ˆ1100 words
Sources:
Check Instructions
Style:
APA
Subject:
Business & Marketing
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 17.28
Topic:

Technological Tools Used in Protecting the Network, Data Integrity, and Patent

Essay Instructions:
Essay Sample Content Preview:

Assignment 3 – E-commerce
Student’s Name
Institution
Assignment 3 – E-commerce
Part A: Short-Answer Questions
The right amount of expertise and computer tricks can facilitate one's anonymity on digital platforms, granting them an opportunity to carry out fraud unnoticed. The digital footprints that the e-commerce apps and technologies leave behind also pose a threat to privacy, putting personalized information at the disposal of cybercriminals. Furthermore, cyber threats like spyware, malware, bots, DDoS attacks, ransomware (Laudon & Traver, 2016) are only possible due to the advent of e-commerce systems, and malicious experts can easily hijack e-commerce systems for malicious reasons.
Antimalware and antispyware software are at the heart of communication security systems to protect against malware and spyware respectively. Firewalls and proxy servers are other technological tools used to protect the network. A firewall filters the traffic entering and exiting a server while a proxy server limits the number of internet users accessing a server at a go (Laudon & Traver, 2016). The firewall is effective at managing malicious programs while proxy servers protect against DDoS attacks. Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) are installed to detect and block any suspicion in a network. End to end encryption is another security protocol that ensures the information shared is familiar to the sender and receiver only.
Symmetric encryption is an encryption scheme where the key used by the sender to encrypt the message is shared with the recipient to use it to decrypt the message (Yassein et al., 2017). Public key encryption, otherwise called asymmetric encryption, uses the public key that is openly available to encrypt the message, and a private key familiar to the sender and receiver only is used to decrypt the message (Yassein et al., 2017). Cryptography plays a vital role in ensuring that the confidentiality and integrity between buyers and sellers in an e-commerce environment are upheld. Encryption schemes protect malicious hackers from accessing personal data and credit card information.
Intellectual property refers to the possessions that exists primarily as a result of cognitive reasoning. Works of art, inventions, designer names, and logos all qualify as intellectual property. These kinds of property are subject to intellectual property rights just like any other property and are in four broad categories: copyright, patents, trademarks, and trade secrets (Laudon & Traver, 2016). The internet is full of copycats, pirates, and other users full of malice. It is crucial to have internet content copyrighted to prevent unauthorized copying, reuse, or resell of personalized data and tools.
Big data is a technical term used to refer to the vast amounts of digital data produced and accrued in the digital space. With appropriate analytic tools, businesses can make optimal decisions and benefit immensely with big data. Marketing relies on big data and analytics to enhance personalized targeting and increase sales by effectively examining customer data and establishing a positive customer relationship. Consumer behavior can also be easily depicted with the rig...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

πŸ‘€ Other Visitors are Viewing These APA Essay Samples:

HIRE A WRITER FROM $11.95 / PAGE
ORDER WITH 15% DISCOUNT!