Friday, October 18, 2019

A meeting with the security auditor of your firm Essay

A meeting with the security auditor of your firm - Essay Example It is every customers concern to visit and work with an e commerce website that guarantees privacy and confidentiality of the data they feed to the websites (Ghosh 2001). Several site security aspects are of great importance in the safeguarding of customers confidential information. Notably, privacy or confidentiality is the most major concern of every online business transaction. In consideration of the emerging limitations, flaws and risks being posed by current state of internet technologies, a great mistrust and confusion is ranging from the customers engaging in e-commerce. This e-commerce website values this key concern to foster the trust of our customers to our business platform. In view of this the website is designed to safeguard the information given by the consumers of our services and goods away from unauthorized parties. Several measures have been taken to ensure the above endeavor is met. A minimum of six character password has provided with an encryption mode to protect against hacking. Though the transactions are carried out in a public key infrastructure, only the authorized recipient has a private key to access the encrypted data. More over high secrecy will be exercised to secure the private keys from being manipulated by unauthorized persons (Ghosh 2001). Authentication of a customer’s data is another significant aspect which has been considered to secure our online customers. We note the extensive threats being posed to e-commerce through SQL Injection and the Cross-site scripting. These are the major applications being used by cyber crime enthusiasts to enhance vulnerability of e-commerce sites. Objectively, Secure Socket Layer certificate has been installed in the website to ensure the security of all financial information entered by the clients. It is a common issue that the clients will need to use their debit cards, credit cards, pay pal and other payments methods which leaves traces of their vital and personal

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.