This website uses cookies to ensure you have the best experience. Learn more

Internet And A Business' Information Security

1945 words - 8 pages

Ensuring the security of a businesses’ information and assets is a critical part of a company’s success. The many facets of the World Wide Web have made protecting data a critical function for companies world-wide. Companies owe it to their customers to maintain proper security regarding sensitive information obtained when processing services or storing sensitive data. Electronic commerce, or E-Commerce for short, is a type of industry where consumers buy or sell goods and services, by using the web and other computer networks during the life-cycle of a transaction, from start to finish. As various schemes are being developed by hackers as well as others with malicious intent to breach a wide array of security measures put in place by companies conducting e-commerce, we will look at ways that companies are battling these threats with the use of firewalls, proxy servers, and other forms network security.
Companies have made note that the internet has eliminated the limits by which they are able to reach consumers, something that has always traditionally plagued businesses trying to reach a broader audience. An economic idea, also known as the “law of diminishing returns,” which states that business realize smaller, incremental gains for each new consumer, either does not apply in the realm of e-commerce, or sets it at a very high level. The internet also provides flexibility when facilitating transactions with vendors, employees as well as other stakeholders, thus decreasing the number of staff needed to perform these functions.
Security threats that e-commerce businesses face on a daily basis, can fall into several categories, which can be tied motives behind a security breach. Some threats are designed to funnel money from one account to another or to cover up an unethical or illegal act. This type of data manipulation can prove to be very harmful to a company’s bottom line. Other types of threats can also include spoofs, Trojan horses, worms and viruses.
Trojan horses, worms and viruses are typically designed to destroy important data. A Trojan horse is a program that disguises itself as a safe, known function and designed to copy and/or destroy data when ran. Worm threats inflict their damage by spreading from one computer to another, when sent by an unsuspecting user via email. A virus is a type of code that fragments and copies itself, ultimately infecting a larger portion of the system it resides in.
Companies who conduct e-commerce must also be concerned with protecting the integrity of the data used by their company, their vendors, and other 3rd party entities that conduct business with them. Consumer data, marketing information and sales are among some of the most sensitive data that must be accurate in order for a business to function, at even the most fundamental level. This type of data integrity allows for information to be kept secure from prying eyes or from people with more depraved purposes.
Businesses also...

Find Another Essay On Internet and a Business' Information Security

Internet Privacy and Security Essay

1113 words - 5 pages of our technology. Internet privacy and security may be different but share a responsibility, but it is up to us to take personal responsibility to protect ourselves on the internet. We should pick unique, carful passwords, and never share this sensitive information, and encrypt our data when online. When it comes to social media, I found this information that explains it well. (Endangering their right to privacy 2010) states “Communications and

Viruses and Internet Security Essay

2763 words - 11 pages question to consider when dealing with virus control is: Is it unethical to take extreme measures to avoid hacker attacks, even when we are taking away people’s autonomy and obstructing their privacy? What is a Computer Virus? In order to consider the ethical issues involved with Internet security, we need to understand exactly how computer viruses work and how they can affect their victims. A computer virus is a small, yet highly

Ethics and Information Security

1074 words - 4 pages ethics and technology conflicts in the United States are privacy issues and how we cite, distribute and publish intellectual property on the internet. For instance, many corporations and people take advantage of the open access of the internet and the lack of legislation governing the right to post and upload information to the internet. Today, nearly every household in the United States has a computer with internet access and faces the challenge of

Information Security: Security Acts and Effectiveness

2438 words - 10 pages and information security awreness. MIS Quarterly, 34(3), 523-A7. Retrieved from http://www.misq.org/ Crawford, C. (2011). The repeal of the Glass-Steagall Act and the current financial crisis. Journal of Business & Economics Research, 9(1), 127-133. Retrieved from http://journals.cluteonline.com/index.php/JBER Farn, K.-J., Shu-Kuo, L., & Fung, A. R.-W. (2004). A study on information security management system evaluation—assets, threat and

The Internet and Business

720 words - 3 pages It is virtually impossible to run a successful business without taking advantage of the internet and information technology. With so much competition in today’s marketplace, many businesses are here today and gone tomorrow. The companies that have staying power are the ones who utilize the internet and information technology. The internet supports today’s business world by offering effective communications. Communicating by email is not

Business and the Internet

720 words - 3 pages that one year on the Internet is like seven years in any other medium. Fifteen million households connected to the 'Net' can be a large market for any business willing and ready to scoop it up. By the year 2000, the projection is that North America will have 38 million online households, one third of all households.The reasoning, or thesis, of the article is the question of whether the Web should be used for information purposes, or for a new

Internet Technologies and Business

1232 words - 5 pages Research Project The application of Internet technologies has been a growing trend in the business world for nearly a decade. More and more companies are realizing the benefits of using the web. Web use has morphed from information exchange only to enhancements for collaboration, customer service and customization. These applications now lead to increasing profits; cutting costs, minimizing production, and customer satisfaction in all areas

Cryptography and the Issue of Internet Security

937 words - 4 pages questioning the fact that both the growth of the Internet and the number of sensitive transactions which occur on it are exponential. In order to ensure the safety of Internet transactions, whether public or private, methodologies must be identified to safely and effectively encrypt information. Two methodologies are particularly associated with the issue of Internet security and deserve both an explanation and a contrast. These two methods are TCP/IP

Security And Privacy On The Internet

1470 words - 6 pages Many users are subject of Security and Privacy on the Internet issue. The term "information" now is more used when defining a special product or article of trade which could be bought, sold, exchanged, etc. Often the price of information is higher many times than the cost of the very computers and technologies where it is functioning. Naturally it raises the need of protecting information from unauthorized access, theft, destruction, and

Threats to Internet Privacy and Security

950 words - 4 pages organization, then later uses the stolen credentials to steal proprietary information to be sold on the black market. Unmanned Threats There are many threats to privacy and security on the Internet which are automated in nature or inherently insecure, and generally do not require the active intervention of a hacker once in place. Java applets are a convenient way for websites to implement applications which are not specific to a particular

Lack of Internet Security and Privacy

1035 words - 4 pages Internet privacy and security has become the concern of many individuals throughout recent years. There are a very limited amount of laws that have been enacted to combat computer or cyber related crimes. This has become an issue because as the internet grows increasingly popular so does the criminal and immoral behavior that abounds on it. With these crimes gaining in impact, effectiveness, and frequency, there needs to be more repercussions

Similar Essays

Impact Of The Internet On Information Technology Security

1185 words - 5 pages the disadvantages businesses face due to the Internet include viruses, security vulnerability, hacking, and an increase in identity and information theft. The ability to access the Internet through various wireless media such as cell phones increases its availability within the business environment. Therefore, security is a natural reality.In order to guarantee the protection of information sent through the Internet, the following criteria must

Protection Of Information: One Of The Internet Security Topics

1656 words - 7 pages security level of information systems.In the current situation, data processing has moved the problems of information security forward to the rank of most important problems of national economy. Solving the problem of poor information security presupposes a complex of measures. First of all, such actions of government as development of classification system, documentation of information and protection methods, data access regulations and punishing

Internet And Internet Security Essay

1127 words - 5 pages The Internet is an awesome way of contact and a great source ofinformation that is becoming a lot more popular for people who are interested in, and have the time to surf the 'information superhighway'.The major problem with this much information being reachable to thismany people is that a lot of it is called inappropriate for young people. Thegovernment wants censorship, but a small amount of the population does not.Legislative regulation of

Internet Security And Confidentiality Essay

2102 words - 8 pages business users • Based on my analysis of the findings, I will recommend the methods of connecting to Internet. I will produce a report of the findings including the details of my Methodology, findings and URLs of websites used in the bibliography.   Methodology: For this research, I used primary and secondary sources to carry out my report for this information. Then I asked used primary sources to ask people, shops about the broadband packages