z-logo
open-access-imgOpen Access
Security Vulnerability and Possible Attack Methods in e-commerce
Author(s) -
Anjali Jolly
Publication year - 2019
Publication title -
international journal of recent technology and engineering
Language(s) - English
Resource type - Journals
ISSN - 2277-3878
DOI - 10.35940/ijrte.d9095.118419
Subject(s) - encryption , computer security , e commerce , hacker , vulnerability (computing) , business , payment , purchasing , personally identifiable information , internet privacy , computer science , marketing , world wide web
E-Commerce Is The Process Of Selling Or Purchasing Of Goods Via Utilizing Online Services. Nowadays, E-Commerce Has Become An Integral Part Of Business Websites. In This, Third Party Services Are Being Used Most Commonly, Which Offer Ready To Use Setup For The Companies. Numerous Services And Technologies Are Used By The Firms Such As Applications For Payment-Processing (These Can Also Be Offered By Third Parties). Sometimes, Business Companies May Also Develop Their Own Customised Software At Specialised Price Or May Use Their Personal Software By Combining It With Third Party Software. Therefore, E-Commerce Websites May Succeed By Providing Secure Services To Their Customers, Such As Their Personal Information, Cards Details Etc. Must Be Secured With Trusted Encryption Technologies. But, At The Same Time, Widespread Use Of E-Commerce Is Accompanied With Certain Security Related Challenges. Hackers Try To Find Loopholes In The System Using Several Techniques. Hence, Taking The Preventive Measure And Educating Customers About The Threats May Help In Keeping The Customer Faith On Websites. Otherwise, If A Website Has Poor Encryption Technologies, Then It May Fail To Gain Customer Trust.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here