Sign In
Not register? Register Now!
Pages:
3 pages/≈825 words
Sources:
3 Sources
Style:
APA
Subject:
Business & Marketing
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 14.58
Topic:

ELEMENTS OF COMPUTER SECURITY

Essay Instructions:
- Elements of Computer Security Research and apply the content from recent articles about the elements of computer security. You must cite at least 3-5 sources outside of the class textbook. Write a minimum of 3 to 5 pages for the body of the research paper (using APA writing style format) discussing your viewpoint on the topic and refer to the content from the articles to support your findings. Write in 3rd person. For APA writing style formatting see the APA style guide at the resources tab for APA formatting guidelines. APA writing style requires in-text citations and references support the citations on the references page as needed throughout the document. Schneider, G. P. (2015). Electronic Commerce (11th ed.). Stamford, CT: Cengage Learning. ISBN: 978-1-285-425436 - Chapter 10 - Chapter 11
Essay Sample Content Preview:
Elements of Computer Security Name Institutional Date Elements of Computer Security Electronic-commerce is the process that involves buying and selling services over the internet. It also includes performing other commercial transactions online. It takes care of distance, transparency, knowledge provision and support systems (Schneider, 2015). However, the key to understanding the concept is e-commerce security. For all its advantages, its users are always at risk of having their confidential details or identity stolen for criminal activities. The main reasons for such attacks lie in software and hardware. One requires technical skills to fend off potential attackers, but many are unwilling to restrict functionality of their systems; this makes them vulnerable (Storey, Kane, & Schwaig, 2009). Attacks in e-commerce are something corporations and individuals will have to start getting used to and to deal with. This paper seeks to discuss the elements of computer security in relation to e-commerce, focusing on the benefits of e-commerce, vulnerabilities, threats and harm, attacks and attackers, and how they can be possibly countered. Electronic Commerce Security Online security has several security issues. The first is computer security where the system is concerned with the protection of assets from unlawful access, alteration, use, or destruction (Storey, Kane, & Schwaig, 2009). The second is physical security; the part of protection that deals with the tangible aspects of devices. Thirdly, logical security uses nonphysical means to protect assets. Another is that online security also deals with threats, which are objects, or acts that are a risk to computer assets (Schneider, 2015); all these privacy concerns fall under computer security. Privacy is taken care of by the Internet Crime Complaint Center (IC3). Its objectives were to serve as a go between to obtain process and refer complaints that are criminal in nature in the fast growing culture of cybercrime. In 2008, 275,284 complaints were received by IC3 website (Kraft & Kakar, 2009). The major mediums in which these frauds took place were web pages (28.9%) and E-mail (74.0%). Estimations found that internet and online services made up 90% of all complaints (Kraft & Kakar, 2009). Security of personal information is, in addition to other internet crime concerns, worrisome to customers. One important privacy threat is the collection of information discreetly without the user’s agreement and having it potentially used for malicious purposes. In consequence, the information may be sold to third parties. Theft of a customer’s identity may result to the theft of credit cards. In 2007, for example, T.J. Maxx stated in Securities and Exchange Commission that 45 million debit and credit card numbers may in an 18 month period been taken from its IT systems (Kraft & Kakar, 2009). Privacy can also be invaded using cookies. Cookies are programs that monitor the user’s movements while on the web, storing them to be identified later. When combined with mailing lists, information in cookies can be used with damaging consequences. Web bugs also have the ability to intrude to users’ privacy. Bugs are effective in privacy invasion as they can be used to steal the users’ Internet...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

👀 Other Visitors are Viewing These APA Essay Samples:

HIRE A WRITER FROM $11.95 / PAGE
ORDER WITH 15% DISCOUNT!