Misrepresentation of Identity – Forms of Security Breach | Introduction to E-Business

Misrepresentation of Identity

Misrepresentation of Identity

Businesses can install sophisticated software to verify the authenticity of the people they deal with. In spite of this, firms should remain vigilant so that their credibility is not undermined by security breaches. There is a wealth of information available on a wide range of subjects on the internet. Some of the information, however, may not be reliable. A firm must ensure that the information it uses is accurate and reliable. A failure to perform this can result in embarrassment, diminished reputation, a legal proceeding, or financial loss.  

Read more

Public Key Infrastructure (PKI) – Introduction to E-Business | BBA Notes

Public Key Infrastructure (PKI)

Public Key Infrastructure (PKI)

There is a compelling case for establishing a single standard protocol for the provision of secure systems rather than allowing competition. The Public Key Infrastructure (PKI) provides a generic approach to the issue of security. PKI is an e-commerce architecture which combines specialist authorities, digital certificate management systems, and directory facilities in order to build secure networks over unencrypted networks, such as the internet .

Read more

Secure Electronic Transactions (SET) – Introduction to E-Business | BBA Notes

Secure Electronic Transactions (SET)

Secure Electronic Transactions (SET)

Customer fears of their credit card information being intercepted are one of the biggest obstacles to growth in e-business and e-commerce. The issue has been recognized as a threat to e-business for some time. The Secure Electronic Transaction (SET) protocol was developed jointly by Visa and Mastercard in 1996. By using cryptography, the SET protocol provides confidentiality of information, ensures payment integrity, and verifies the authenticity of the seller and cardholder. A trusted certification authority (CA) issues both the buyer and the seller with a digital certificate (or key). Several certificate authorities operate in the United Kingdom, including the Post Office (ViaCode) and BT (Trust Wise).

Read more

Encryption – Introduction to E Business | BBA Notes

Encryption

Encryption

The most common method of securing transmissions over the internet is encryption. Public key and secret key encryption are the two main methods of encryption. In secret-key encryption, the parties share an encrypted key number that is known only to them. Encrypting and decrypting a message use the same key. Using public-key encryption, the encrypted key numbers used by the sender and receiver are different.

Read more

error: Content is protected !!