Systems For Ensuring Secure Electronic Transactions (Set)

819 words - 3 pages

Systems for Ensuring Secure Electronic Transactions (SET)

Attacks earlier in the year on major e-commerce sites, including E*Trade; Amazon.com, the leading e-tailer; eBay, the online auction house; CNN, the news service; Yahoo!; Buy.com; and Zdnet, a technology news and information web site, have heightened the awareness of securing e-commerce sites (“E-Commerce Sites,” 2000, p.106). This is just the first example of a rampant problem that has cost e-tailing companies millions of dollars in losses.
THE PROBLEM
Hackers, using a denial of service (DoS) technique, caused the aforementioned e-tailers to temporarily shut down. By repeatedly loading hundreds of web pages to the companies’ servers from computers on the Internet, the hackers flooded the servers of the e-tailers. These attacks ultimately crashed the company’s server or denied access to normal users (“E-Commerce Sites,” 2000, p.106). These flood attacks are relatively easy to carry out with software such as Stacheldaht or Tribal Flood, which are publicly made available on the Internet (“E-Commerce Sites,” 2000, p.106). Once a hacker has one of these programs in his possession, he simply installs the software on several computers connected to the Internet and triggers the flooding from a central computer. Since the flooding comes from a variety of different sources, it is nearly impossible to identify the origin of the attack (“E-Commerce Sites,” 2000, p.106).
THE DAMAGE
A joint survey, conducted in 1999 by the computer Security Institute and the FBI, of major US companies, revealed that tampering with company’s online operations is becoming a mundane occurrence (Courtney, 2000, p.84). The survey polled 640 corporations, banks, and government organizations on the conditions of their computer systems (Courtney, 2000, p.84).
•     Of the responding companies, 90% had detected security breaches (Courtney, 2000, p.84).
•     70% of the companies reported serious security breaches (Blotzer, 2000, p99). These included theft of proprietary information, financial fraud, system penetration by outsiders, data or network sabotage, and denial of service attacks (Courtney, 2000, p.84).
•     Quantifiable losses totaled $265 million, 115% higher than in 1999 (Courtney, 2000, p.84).
•     The most serious breach resulted in a loss of $66 million, 55% higher than the most serious loss of 1999 (Courtney, 2000, p.84).
•     59% of the companies cited their Internet connection as a frequent point of attack (Courtney, 2000, p.84).
•     The total cost to these companies was $266 million (Blotzer, 2000, p99).
This survey illustrates the seriousness of attacks and the importance of proper security to defend against those attacks.
THE SOLUTION
For every company doing business on the Internet, security should be a top priority. Gibson Research Corporation has a...

Find Another Essay On Systems for Ensuring Secure Electronic Transactions (SET)

Electronic Payment System Essay

1598 words - 6 pages transactions In February 1996, Visa and MasterCard announced their joint support of a standard protocol, dubbed Secure Electronic Transactions (SET), for presenting credit card transactions on the Internet. SET is designed to operate both in real time, as on the World Wide Web, and in a store-and-forward environment, such as e-mail. As an open standard, it is also designed to permit consumer, merchant, and banking software companies to

E-Commerce Fraud Essay

2118 words - 8 pages . Now, payment systems have become more advance, allowing vendors to withdraw money directly from the buyers’ bank account. Companies have gone to great extents ensuring that online transactions are safe, convenient, and reliable. Perhaps the most well known electronic payment system is Paypal. They are an “industry leader in fraud prevention and risk management” and “has one of the lowest loss rates in the online retail industry” . Paypal boasts

Electronic Signature Technology

1646 words - 7 pages technology needs to be researched for our online business transactions. The use of electronic signatures was at the top of our list. Many of our competitors have already built-in e-signature verification within their systems for online business and for handling their financial records. Using this innovative, high-ranking technology can significantly cut down on the time it takes to process online business. Consequently, it is urgent that we take rapid

Electronic Portfolio

9725 words - 39 pages pay for electronic purse transactions is extremely low: this price has been estimated at less than 10 Euros per year.The reaction of the commercial sector varies following the nature of the transaction: easy acceptance is assured if the EP is used as a substitute in automatic machines such as parking meters. In these cases, the use of a 8 chipcard is immediately more efficient and secure than a payment in cash. In a point-of-sale terminal

web seal

1833 words - 8 pages services as well is issuing digital certificates for websites, which are almost impossible to copy or manipulate. When the web seal is clicked, it opens links for the auditor report and some other documents related to management processes and operations. BACKGROUND The rapid evolution of internet technology led to huge changes in the way of conducting business transactions. As a result, electronic commerce was emerged in which customers can

Electronic Data Interchange

1866 words - 7 pages Message replay Application controls Message delay User procedures Repudiation Electronic signatures Internal fraud Reasonability checks (Ian Walden, 1993) Audit Impact EDI can be a culture shock for auditors. The change in business practices caused by the use of EDI significantly increases the dependence of organizations on computer-based information systems for essential operations. Paper documents are not likely to be available to

Bus/415 Legal Issues Final Research Project Paper

3262 words - 13 pages electronic transactions. In 1984 the Accredited Standards Committee X 12 (ASC X 12) developed a set of standards that were stable and reliable in transferring large amounts of transactions, and when Netscape arrived in 1994, it provided users with a simple browser to surf the Internet, and a safe way in which to conduct online transactions through Secure Sockets Layer. The advent of broadband access encouraged people to spend more time and money

Electronic & Telebanking

4460 words - 18 pages as in cards issued by certain telephone companies to pay for telephone calls and prepaid mass rapid transit cards. In these systems, the user buys a claim on the merchant-issuer with traditional money and receives electronic cash in return. When the user buys goods or services from the merchant-issuer, special point of sale (POS) devices record the transactions with the merchant, reducing the value of the electronic cash recorded on the card by

INTERAL CONTROL AND RISK EVALUATION

942 words - 4 pages , misdirected, and could cause damage to the combativeness of the organization. Internal Risks and Controls In the society today many hackers are known to have both external and internal risks that can ruin an organization security systems. Therefore, the collection of data is critical to establishing virtuous security controls for external and internal that ensure complete secure transactions, verification of the data is valid, and free from errors

Business Writing on Electronic Signature Technology

2022 words - 8 pages embedded in a certificate with personal details about the user. The key is easily distributed through a Web browser. Thus, PKI provides the essential services for managing certificates and encryption keys for the people, programs and systems that use public-key cryptography, states Hammar." Electronic means of communications are a serious challenge for the security and protection of transactions and relations conducted electronically. The

Electronic Transmission Standards

1188 words - 5 pages Electronic Transaction Standards The protocols for sending and receiving ‘private’ information over the internet are ever changing. In the healthcare industry, particularly, privacy is a key issue. The Health Insurance Portability and Accountability Act of 1996 (HIPPA), requires the Department of Health and Human Resources (HH S) to adopt standards that must be used when conducting certain health care administrative transactions

Similar Essays

"Secure It Systems For An Airline Company"

2375 words - 10 pages useful for companies to implement. It covers ten sections of practice, including continuity planning, systems access control and physical and environmental security. Farrow (2003) makes some salient points about the use of web servers for the storage of confidential information. He notes that both web servers and FTP servers can be indexed by scanning tools and therefore cannot be seen as secure. On e-commerce sites, particularly, it is easy to

Implementation Strategies For Electronic Document Management Systems (Edms)

3391 words - 14 pages Implementation Strategies for Electronic Document Management Systems (EDMS) An electronic document management system (EDMS) is a computer-based system used to track and store electronic documents and/or images of paper documents, electronic documents, and other knowledge used by the organization. According to Johnston and Bowen (2005) EDMS is "…an automated system which supports the creation, use and maintenance of paper or electronic

Business Continuity Resources Essay

901 words - 4 pages and their impact on Kudler itself.A business continuity plan can help an organization, like Kudler, in staying in business following an unplanned disaster or interruption by ensuring the availability of resources. Business continuity resources for Kudler include personnel, financial arrangements, supply systems, facilities, goods, and infrastructure. It is important to identify key resources that are instrumental in the case of a disaster. There

Automated Clearing House (Ach) Essay

1693 words - 7 pages , and collection of funds, among others. Because it is an electronic system that paves the way for faster processing or turnaround time of financial transactions in a secure environment, it therefore generates significant cost-savings for all sectors availing of its services. History In response to the rapid escalation of check volumes in the U.S., a group of California bankers formed the Special Committee on Paperless Entries (SCOPE). With the