Monday, February 24, 2020

Web security Essay Example | Topics and Well Written Essays - 3250 words

Web security - Essay Example This is because websites, web applications and web services, all being components of web security, create integral part of the daily operations of these industries and organisations. Information sharing or business or service delivery of these organisations now faces a lot of dangers. From invasion of their privacy, information theft, sabotage, black mailing to compromising corporate operation and end user activities. Web security analysis by various stakeholders has established that the web security threats typically result from mistakes in coding or programming the website, poor input and output sanitisation of a website. These mistakes have left a hole exploited by the hackers’ community to launch attacks on websites. The security of the web application, underlying operating system and computer network is at risk. The existence of exploit paths on a web system and the magnitude of that exploit path can be evaluated continuously to assess the risk level to the business. The type of web attack launched by hackers depends on many factors. Most factors are unique to the web attack as will be discussed in this essay. The essay will also examines the nature of these web attacks, details of their vulnerabilities, the risk levels they may raise and how to control or reduce the risk web attacks poses to organisational information and business operations. Web security risks in the name of defaced, hacked or web broken into have increased with the significant increase of the internet usage. A threat is anything that causes worry or fear, especially, because of the events there after (Consequences). Web security threats are increasing and causing big fear in organisations or individuals. According to Stuttard and Pinto (2008), the most serious attacks against web application are those that expose sensitive data or gain unrestricted access to the backend systems on which the application is running. Apparently, the total number of reported web

Saturday, February 8, 2020

One of the most important issues concerning e-commerce is the privacy Assignment

One of the most important issues concerning e-commerce is the privacy and security of one's indentification and financail information - Assignment Example having login or password that enhances the security of the information passed between the customer and the business (McCarthy, Campbell & Brownstein, 2001). An overly secure environment looks into the security of the transaction by creating passwords and logins in order to ensure privacy and confidentiality of the details of the transactions. In cases where e-commerce involves financila transactions, the risk of loss of money becomes high hence making security issues key in e-commerce. However, both an open and overly secure environments have both advantages and disadvantages. There are various advantages of conducting business in open environments. First, users will not require login and passwords in order to navigate on the websites. Paying for items or making orders will not require one to give login for identification purposes. This makes the process easy and faster compared to a secure environment where login is required. The graphical user interface of open environments are simpler and easy to use hence cause customer satisfaction and convenience (Becker, 2008). Cost advantage also arises in an open environment. There is no cost involved in developing a secure environment thereby reducing the need to engage experts in developing the site. The costs of hosting such a website is also lower compared to that of an overly security environment which requires shrewd experts to develop. However, cost may arise where customers sue the business for protection purposes. On the other hand, browsing in an insecure open environment is characterized by various drawbacks. To begin with, the computers can be hacked thus infringing on private information. This may make the future transactions insecure and further cause loss of resources. Moreover, it would be easier to get computer virus attacks, which could stall operations and further cause loss of data that may be expensive to acquire. In addition, a company can be faced by innumerable cases from customers for violation