Sign In
Not register? Register Now!
Essay Available:
Pages:
1 page/≈275 words
Sources:
1 Source
Level:
APA
Subject:
Business & Marketing
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 4.32
Topic:

Week 7 - Forum: Security and Encryption (Essay Sample)

Instructions:

Effective Texts for Your Program II—Post a New Topic that discusses a text that you have found to be effective in your program of study. Provide a very brief synopsis and explain why you consider this text as effective or valuable. I choose the topic Security and Encryption to discuss. The reference to use is by Laudon, K., Traver, C. (2014). E-Commerce, (10th ed). Upper Saddle River, NJ: Pearson/Prentice Hall

source..
Content:

Security and Encryption
Student's Name
Professor's Name
Course Name
Date
The 21st century has witnessed significant technological advancement in various fields especially e-commerce. E-commerce is transforming the world by making transactions easier, faster and efficient and promoting the luxury of not having to be inconvenienced by time or place. Although, with the luxury, e-commerce welcomes security threats such as identity theft, hacking on the consumers and e-commerce sites. Adequate security mechanisms are vital to mitigate e-commerce threats. In light to these, I found the topic of Security and Encryption in my program of study very effective.
The chapter cites that as of 2013 there were more than 1 billion internet consumers in the world making online theft a rather lucrative business in which hackers can thrive in. Identity theft and credit card fraud today are due to the systematic hacking and looting of corporate servers where data of millions of credit card information are stored. The chapter sees the central security issue in e-commerce as the difficulty in identifying customers' identity since there is no new technology to identify people with certainty CITATION Lau14 \l 1033 (Laudon & Traver , 2014). This scenario makes it easier for hackers to obtain valuable information. The authors in this chapter continue to affirm that most e-commerce sites also face threats of inside attacks from trusted employees who cause disruption of service, diversion of customer credit data and other sensitive information. These employees have easy access to this privileged information and due to the inadequate security as well as the lack of encrypted networks CITATION Lau14 \l 1033 (Laudon & Traver , 2014).
Cybercrime is a complex phenomenon that keeps on changing every time due to the constant technological advancement and improvement which makes it very challenging to curb. To that end, the chapter provides two part solution :( a) the need to encrypt channels of communication to ensure that sensitive information is secure. It will further help to protect data servers and customers fully from different forms of cyber-attacks. (b) The G...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

Other Topics:

  • QFD Assignment: Quality Function Deployment
    Description: What are the most significant benefits of using a QFD approach to product design? (Be specific and include ethical issues in your answer.)...
    2 pages/≈550 words | 5 Sources | APA | Business & Marketing | Essay |
  • Yeezy Boost 350 vs Nike Airmax: Current Market Situation
    Description: The sneakers market is quite large and by 2013 it was worth more than $23 billion dollars with positive growth trend in the United States, ...
    10 pages/≈2750 words | 6 Sources | APA | Business & Marketing | Essay |
  • MKTG 400 Marketing Assignment Paper: Dove Case Study
    Description: Using the full spectrum of segmentation variables, describe how Dove segments and targets the market for personal care products...
    2 pages/≈550 words | No Sources | APA | Business & Marketing | Essay |
Need a Plagiarism Free Essay?
Submit your instructions!