Biometric Security Devices? Each week,?you will be asked to respond to the prompt or prompts in the discussion forum.?Your initial post should be a minimum of?30
Biometric Security Devices
Each week, you will be asked to respond to the prompt or prompts in the discussion forum. Your initial post should be a minimum of 300 words in length, and you should respond to two additional posts from your peers.
Assume you are working for a medium-sized company that sells products on its Web site and that the company keeps the computers that run its Web server, database server, and transaction processing server in the office next to yours. Describe what a biometric security device is and explain how your employer might use one to more of these devices to protect its servers.
Required Text
Schneider, G. P. (2015). Electronic Commerce (11th ed.).
Stamford, CT: Cengage Learning.
Boston, MA. ISBN: 9781285742298
BUS615 Ecommerce
Computer security is the protection of assets from unauthorized access, use, alteration or destruction” (Schneider, 2015). Understanding the risks involved with computer security is essential.
Figure 10-1 (Schneider, 2015), provides an illustration of the risks an impacts associated with computer security.
Security for client computers requires the ability to protect the client “ . . . computer from threats that originate in software and data that are downloaded to the client computer from the Internet” (Schneider, 2015).
Cookies are small files that identify returning visitors to particular web sites. The cookies contain private information about the client and the only means of protecting the client’s information completely is to disable the cookies.
“The problem with this approach is that the useful cookies are blocked along with the others requiring visitors to enter information each time they visit the website” (Schneider, 2015).
Chapter 10
Electronic Commerce Security
Communication channel security entails security between communications layers. The Internet is not meant to be secure (Schneider, 2015) and therefore layers of security must be in place to keep Ecommerce transactions secure.
Threats to secrecy, integrity, necessity, physical communications and wireless communications require encryption as a means of keeping data and information secure.
Encryption algorithms transform “ . . . plan text into cipher text (the unintelligible string of character) . . . “ (Schneider, 2015).
The encrypted text provides for a mathematical pattern that is very difficult to transcribe and thus, renders the information secure.
This form of security is essential for both physical and wireless networks.
Chapter 10
Electronic Commerce Security
Payment methods require the secure transfer of information. Payment cards make up the majority of online payment methods (Schneider, 2015, figure 11-1).
Digital wallets provide means of holding credit card numbers or electronic cash (Schneider, 2015) and making the credit card number or electronic cash securely accessible for online purchases.
Stored value cards include Magnetic strip and smart cards. Stored value cards provide a means of storing information related to financial accounts that can produce funds when funds are available. The difference between magnetic strip cards and smart cards is that the information in a smart card is stored in an encrypted microchip, as magnetic strip cards cannot be encrypted making smart cards more secure that magnetic strip cards.
Banking industries provide technologies for secure storage and transfer of funds and check processing functions. Increased activity from Mobile banking from smart phones and portable electronic devices are requiring banks to add services and security to support these activities. Banks also provide protection from identity theft.
Chapter 11
Payment Systems for Ecommerce
,
CHAPTER 10 ELECTRONIC COMMERCE SECURITY
Summary
Online businesses today must deal with a wide range of security risks. They often create a formal security policy document that identifies risks and countermeasures that will reduce those risks to an acceptable level. Online security elements include secrecy, integrity, and necessity.These three elements are each enforced in the three components of online business transactions, including client devices, the communication channel, and Web server computers. Client devices can be threatened by active content, viruses, or worms delivered throughWeb browsing activity (by means of cookies or Web bugs), e-mail, or other devices on the same network. Antivirus software is an important element in the protection of client computers. The main communication channel used in online business is the Internet, which is especially vulnerable to attacks. Encryption provides secrecy and integrity protection against many of these attacks and can be implemented with private keys, public keys, or a combination of techniques. Digital certificates provide both integrity and user authentication, which can provide non-repudiation in online transactions. Secure Sockets Layer and Secure HTTP protocols can provide secure Web browser connections. Wireless networks are subject to threats of signal interception, but most wireless networks installed in businesses today (and many installed in homes) do use a secure form of wireless encryption.Web servers must be protected from both physical threats and Internet-based attacks on their software. Server protection methods include access control and authentication, which are provided by username and password login procedures and client certificates. Firewalls can be used to separate trusted inside networks and clients from untrusted outside networks, including other divisions of a company’s enterprise network system and the Internet.A number of organizations have been formed to share information about computer security threats and defenses. When large security outbreaks occur, the members of these organizations join together and discuss methods to locate and eliminate the threat. Computer forensics firms that undertake attacks against their clients computers can play an important role in helping to identify security weaknesses.
CHAPTER 11 PAYMENT SYSTEMS FOR ELECTRONIC COMMERCE
Summary
Credit, debit, and charge cards (payment cards) are the most popular forms of payment on the Internet. Processing payment card transactions requires that an online merchant establish a merchant account with an acquiring bank. Merchants can obtain card approval and transaction settlement services using tools included in their electronic commerce software, through a separate payment processing software application, or from a payment process service provider.Digital cash, a form of online payment that is portable and anonymous, has been slow to catch on in the United States. Digital cash could be useful for making micropayments because the cost of processing payment cards for small transactions is greater than the profit on such transactions. Digital wallets can store payment card information, digital cash, and personal consumer identification. Software-based digital wallets eliminate the need for consumers to reenter payment card and shipping information at each business’s Web site. Stored-value cards, including smart cards and magnetic stripe cards, are physical devices that hold information, including cash value, for the cardholder. Magnetic stripe cards have limited capacity. Smart cards can store greater amounts of data on a microchip embedded in the card and are intended to replace the collection of plastic cards people now carry, including payment cards, driver’s licenses, and insurance cards. Smart card use in the United States is not widespread; however, smart cards are popular in other parts of the world. Banks still process most monetary transactions, and a large part of the dollar volume of those transactions is still done by writing checks; however, banks often use Internet technologies to process those checks. Phishing expeditions and identity theft pose a significant threat to online financial institutions and their customers.
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.