Systems For Ensuring Secure Electronic Transactions (Set)

819 words - 3 pages

Systems for Ensuring Secure Electronic Transactions (SET)

Attacks earlier in the year on major e-commerce sites, including E*Trade; Amazon.com, the leading e-tailer; eBay, the online auction house; CNN, the news service; Yahoo!; Buy.com; and Zdnet, a technology news and information web site, have heightened the awareness of securing e-commerce sites (“E-Commerce Sites,” 2000, p.106). This is just the first example of a rampant problem that has cost e-tailing companies millions of dollars in losses.
THE PROBLEM
Hackers, using a denial of service (DoS) technique, caused the aforementioned e-tailers to temporarily shut down. By repeatedly loading hundreds of web pages to the companies’ servers from computers on the Internet, the hackers flooded the servers of the e-tailers. These attacks ultimately crashed the company’s server or denied access to normal users (“E-Commerce Sites,” 2000, p.106). These flood attacks are relatively easy to carry out with software such as Stacheldaht or Tribal Flood, which are publicly made available on the Internet (“E-Commerce Sites,” 2000, p.106). Once a hacker has one of these programs in his possession, he simply installs the software on several computers connected to the Internet and triggers the flooding from a central computer. Since the flooding comes from a variety of different sources, it is nearly impossible to identify the origin of the attack (“E-Commerce Sites,” 2000, p.106).
THE DAMAGE
A joint survey, conducted in 1999 by the computer Security Institute and the FBI, of major US companies, revealed that tampering with company’s online operations is becoming a mundane occurrence (Courtney, 2000, p.84). The survey polled 640 corporations, banks, and government organizations on the conditions of their computer systems (Courtney, 2000, p.84).
•     Of the responding companies, 90% had detected security breaches (Courtney, 2000, p.84).
•     70% of the companies reported serious security breaches (Blotzer, 2000, p99). These included theft of proprietary information, financial fraud, system penetration by outsiders, data or network sabotage, and denial of service attacks (Courtney, 2000, p.84).
•     Quantifiable losses totaled $265 million, 115% higher than in 1999 (Courtney, 2000, p.84).
•     The most serious breach resulted in a loss of $66 million, 55% higher than the most serious loss of 1999 (Courtney, 2000, p.84).
•     59% of the companies cited their Internet connection as a frequent point of attack (Courtney, 2000, p.84).
•     The total cost to these companies was $266 million (Blotzer, 2000, p99).
This survey illustrates the seriousness of attacks and the importance of proper security to defend against those attacks.
THE SOLUTION
For every company doing business on the Internet, security should be a top priority. Gibson Research Corporation has a...

Find Another Essay On Systems for Ensuring Secure Electronic Transactions (SET)

E-Commerce Fraud Essay

2118 words - 8 pages As internet use develops, both businesses and consumers are utilizing this opportunity to achieve their goals. Some of these goals include expanding into greater markets for businesses and shopping online for consumers. These online transactions now encompass much more than the traditional online banking. They represent the billions of merchants and consumers whom take part in online transactions twenty-four hours a day. With this, credit cards...

Electronic Signature Technology Essay

1646 words - 7 pages Subject: Electronic Signature TechnologyAbstract: During our February 3 meeting, upper level management expressed concerns about not being able to deal with customer accounts online. We discussed some of the problems they encounter when trying to process transactions online. We agreed some changes needed to be made and that new technology needs to be researched for our online business transactions. An electronic signature program can provide this...

Electronic Portfolio

9725 words - 39 pages 3 1. INTRODUCTION Greece will become part of the Euro Zone in 2001. This means that the Hellenic Republic will have only one year to prepare the introduction of eurodenominated banknotes and coins on the 1st of January, 2002. For the Greek banking system, the year 2001 will thus be a year of intense activity. Even if it was already clear, at the end of 1999, that Greece would succeed in complying with the major criteria to become member of the...

Electronic Data Interchange

1866 words - 7 pages Definition Electronic Data Interchange (EDI) can be formally defined as 'The transfer of structured data, by agreed message standards, from one computer system to another without human intervention'(Wikipedia, 2007). It represents the application of computer and communications technology to traditional paper-based business processes, supporting innovative changes in those processes. It involves the exchange and transmittal of business documents,...

Bus/415 Legal Issues Final Research Project Paper

3262 words - 13 pages Business Entities and the Impact of E-Business on the Global Legal EnvironmentBusiness entities are an organized group of people who come together for a profitable or charitable purpose. In today's business world, there are a number of ways in which to legally organize and structure a business. Carefully choosing and creating the correct legal entity will ultimately have a huge impact on the success and profitability of the business venture. The...

Electronic & Telebanking

4460 words - 18 pages 1. Electronic/Tele Banking1.1. Overview of Electronic/Tele BankingFrom a general perspective electronic/Tele banking means the ability to have 24-hour access to the bank either through web based services, mobile services such as SMS banking or simply be able to transact through an automated teller machine (ATM).Electronic/Tele banking, also known as Electronic Fund Transfer or Electronic Financial Telecommunication, uses computer and electronic...

INTERAL CONTROL AND RISK EVALUATION

942 words - 4 pages Running head: INTERAL CONTROL AND RISK EVALUATION Internal Control and Risk Evaluation Patricia Coleman ACC/542 April 7, 2014 Maryln Fisher In today's society, internal controls are applied to support an organization's managers to become more successfully to release the responsibilities by applying and understanding internal control concepts. Internal controls are most frequently saw as "a lot of red tapes"; however, internal controls have...

Business Writing on Electronic Signature Technology

2022 words - 8 pages Business Writing on Electronic Signature Technology During our February 3 meeting, upper level management expressed concerns about not being able to deal with customer accounts online. We discussed some of the problems they encounter when trying to process transactions online. We agreed some changes needed to be made and that new technology needs to be researched for our online business transactions. The use of electronic signatures was at...

computer security

546 words - 2 pages Define computer security (2mks)Computer security refers to techniques for ensuring that data stored in a computer cannot be read or compromised by any individuals without authorization. The ability of a system to protect information and system resources with respect to confidentiality and integrityOutline the goals of computer security (5mks)- Confidentiality: verifying that information is private and therefore seen and accessed only by intended...

Electronic Transmission Standards

1188 words - 5 pages Electronic Transaction Standards The protocols for sending and receiving ‘private’ information over the internet are ever changing. In the healthcare industry, particularly, privacy is a key issue. The Health Insurance Portability and Accountability Act of 1996 (HIPPA), requires the Department of Health and Human Resources (HH S) to adopt standards that must be used when conducting certain health care administrative transactions...

mobile commerce

1712 words - 7 pages What is M-commerce? The last decade has witnessed a lot of growth of mobile communication devices and wireless technologies across the globe. This has led to a change in the way many activities are conducted and opened the way for m-commerce, which is e-commerce's next evolutionary stage. The significant power of m-commerce is primarily as a result of the ability to connect wireless devices anytime, anywhere (The Future of Mobile Payment Systems...

Similar Essays

"Secure It Systems For An Airline Company"

2375 words - 10 pages IntroductionThe report is based on the assumption that the company is a budget airline which has online booking facilities and a call centre, these being the basic requirements for this type of organisation. There are various elements that can be seen as contributing to profitability and competitiveness in the e-business paradigm. For example, the company should inspire confidence from the supplier to the customer, be more easily available than...

Implementation Strategies For Electronic Document Management Systems (Edms)

3391 words - 14 pages Implementation Strategies for Electronic Document Management Systems (EDMS) An electronic document management system (EDMS) is a computer-based system used to track and store electronic documents and/or images of paper documents, electronic documents, and other knowledge used by the organization. According to Johnston and Bowen (2005) EDMS is "…an automated system which supports the creation, use and maintenance of paper or electronic...

Business Continuity Resources Essay

901 words - 4 pages Kudler Fine Foods is an upscale specialty food store with three locations in the San Diego Metropolitan area. As with any other company, Kudler must have a business continuity plan to enable the company to resume operations after occurrence of a disaster event. The first step in developing a business continuity plan is to identify risks. Risks to Kudler's operations fall into three categories consisting of natural, system/technical, and supply...

Electronic Payment System Essay

1598 words - 6 pages Electronic Payment System I. Introduction With the continuing rapid growth of E-commerce, transactions on the Internet have been increasing exponentially. And such transactions require some reliable and secure payment systems. In fact, one of the key factors in the success of E-commerce is the development of convenient, reliable and secure electronic payment system. To understand...