E Commerce Assign
E Commerce Assign
The term e-commerce was introduced in the 1960s, E-commerce has become one of the most
popular methods of making money online and an attractive opportunity for investors. For
those interested in buying an e-commerce business, this article serves to provide an
introduction to e-commerce, covering the reasons for its popularity, the main distribution
models and a comparison of the major e-commerce
platforms available.
‘E-commerce’ and ‘online shopping’ are often used interchangeably but at its core e-
commerce is much broader than this – it embodies a concept for doing business online,
incorporating a multitude of different services e.g. making online payments, booking flights
etc. Basically e-commerce is considered to be the activity of selling and purchasing products
using a website, or online platform.
E-commerce has experienced rapid growth since its humble beginnings. The power of e-
commerce should not be underestimated as it continues to pervade everyday life and present
significant opportunity for small, medium and large businesses and online investors. You
don’t need to look far to see the potential of e-commerce businesses. Amazon, for example,
which set the standard for customer-orientated websites as well as a lean supply chain.
THREATS TO E-COMMERCE
E-commerce threat is occurring by using the internet for unfair
means with the intention of stealing, fraud and security breach.
There are various types of e-commerce threats. Some are accidental,
some are purposeful, and some of them are due to human error. The
most common security threats are
An electronic payment system has a huge risk of fraud. The computing devices use an
identity of the person for authorizing a payment such as passwords and security questions.
These authentications are not full proof in determining the identity of a person. If the
password and the answers to the security questions are matched, the system doesn't care who
is on the other side. If someone has access to our password or the answers to our security
question, he will gain access to our money and can steal it from us.
The Internal Revenue Service law requires that every business declare their financial
transactions and provide paper records so that tax compliance can be verified. The problem
with electronic systems is that they don't provide cleanly into this paradigm. It makes the
process of tax collection very frustrating for the Internal Revenue Service. It is at the
business's choice to disclose payments received or made via electronic payment systems. The
IRS has no way to know that it is telling the truth or
not that makes it easy to evade taxation.
1
In electronic payment systems, the payments are handled by an automated electronic system,
not by humans. The system is prone to errors when it handles large amounts of payments on a
frequent basis with more than one recipients involved. It is essential to continually check our
pay slip after every pay period ends in order to ensure everything makes sense. If it is a
failure to do this, may result in conflicts of payment caused by technical glitches and
anomalies.
E-cash
Backdoors Attacks
Direct access attack is an attack in which an intruder gains physical access to the computer to
perform an unauthorized activity. These types of software loaded with worms and download
a huge amount of sensitive data from the target victims.
2
Eavesdropping
This is an unauthorized way of listening to private communication over the network. It does
not interfere with the normal operations of the targeting system so that the sender and the
recipient of the messages are not aware that their conversation is tracking.
Some of the important threats associated with the debit/credit card are-
Skimming-
Phishing
Phishing is an activity in which an intruder obtained the sensitive information of a user such
as password, usernames, and credit card details, often for malicious reasons, etc.
Online Transaction
Some important ways to steal our confidential information during an online transaction are-
By downloading software which scans our keystroke and steals our password and card
details.
By redirecting a customer to a fake website which looks like original and steals our sensitive
information.
By using public Wi-Fi
POS Theft
It is commonly done at merchant stores at the time of POS transaction. In this, the
salesperson takes the customer card for processing payment and illegally copies the card
details for later use.