SECURING ELECTRONIC RETAILING SITES AND TRANSACTIONS Attacks earlier in the year on major e-commerce sites, including E Trade; Amazon. com, the leading e-trailer; e Bay, the online auction house; CNN, the news service; Yahoo! ; Buy. com; and Zdnet, a technology news and information web site, have heightened the awareness of securing e-commerce sites (“E-Commerce Sites,” 2000, p. 106).
This is just the first example of a rampant problem that has cost e-tailing companies millions of dollars in losses. THE PROBLEM Hackers, using a denial of service (DoS) technique, caused the aforementioned e-tailers to temporarily shut down.
By repeatedly loading hundreds of web pages to the companies’s servers from computers on the Internet, the hackers flooded the servers of the e-tailers. These attacks ultimately crashed the company’s server or denied access to normal users (“E-Commerce Sites,” 2000, p. 106).
These flood attacks are relatively easy to carry out with software such as Stacheldaht or Tribal Flood, which are publicly made available on the Internet (“E-Commerce Sites,” 2000, p. 106).
Once a hacker has one of these programs in his possession, he simply installs the software on several computers connected to the Internet and triggers the flooding from a central computer. Since the flooding comes from a variety of different sources, it is nearly impossible to identify the origin of the attack (“E-Commerce Sites,” 2000, p. 106).
The Essay on Electronic Commerce Online Internet Consumers
Electronic Commerce The last decade has seen the rise of many new technological developments, one of the most prominent of these developments has been the internet. The Internet has already managed to weave itself into our daily lives where we use it for the simple communication of e-mail or to retrieving large volumes of information. More recently the Internet has been incorporated into ...
THE DAMAGE A joint survey, conducted in 1999 by the computer Security Institute and the FBI, of major US companies, revealed that tampering with company’s online operations is becoming a mundane occurrence (Courtney, 2000, p. 84).
The survey polled 640 corporations, banks, and government organizations on the conditions of their computer systems (Courtney, 2000, p.
84).
o Of the responding companies, 90% had detected security breaches (Courtney, 2000, p. 84).
o 70% of the companies reported serious security breaches (Blotzer, 2000, p 99).
These included theft of proprietary information, financial fraud, system penetration by outsiders, data or network sabotage, and denial of service attacks (Courtney, 2000, p.
84).
o Quantifiable losses totaled $265 million, 115% higher than in 1999 (Courtney, 2000, p. 84).
o The most serious breach resulted in a loss of $66 million, 55% higher than the most serious loss of 1999 (Courtney, 2000, p. 84).
o 59% of the companies cited their Internet connection as a frequent point of attack (Courtney, 2000, p.
84).
o The total cost to these companies was $266 million (Blotzer, 2000, p 99).
This survey illustrates the seriousness of attacks and the importance of proper security to defend against those attacks. THE SOLUTION For every company doing business on the Internet, security should be a top priority.
Gibson Research Corporation has a website where computers can be checked for vulnerability against hackers. The site is web (Blotzer, 2000, p 99).
There are also certain programs designed to safeguard servers from attack or malicious activity. Without these programs, companies become vulnerable to attack and millions of dollars in losses. Anti-Virus Software At the bare minimum every company should have anti-virus software.
Anti-virus software protects against viruses, worms, and trojan horses. These are “computer programs designed to enter a computer without knowledge or permission of the user” (Blotzer, 2000, p 99).
They perform “undesired, useless, or malicious functions”, which can take up memory thus slowing down the computer or destroying its files (Blotzer, 2000, p 99).
Popular anti-virus software include: o Inoculate IT Personal Edition, which is free for download from web (Blotzer, 2000, p 99).
The Essay on Computer Viruses 2
Computer Viruses Explain the difference between viruses, worms and Trojan horses in the context of computer and data security. Discuss the measures that need to be taken in order to maintain security. There is a type of computer program that is designed and written to destroy, alter or damage data stored on computers without your knowledge or permission. These are some of the problems that these ...
o McAfee Virus Scan, which can be purchased at web (Blotzer, 2000, p 99).
o Norton Anti-Virus, which can be purchased from web (Blotzer, 2000, p 99).
Firewalls firewall is a “system designed to restrict access to a computer or a local area network (LAN) (Blotzer, 2000, p 99).
“The firewall monitors network traffic, blocking any suspicious attempts to access a system” (Blotzer, 2000, p 99).
Some firewalls to be considered are: o Black ICE Defender by Network ICE. This firewall program can be purchased at web (Blotzer, 2000, p 99).
o Zone Alarm 2.
0 from Zone Labs. This program can be freely downloaded at web (Blotzer, 2000, p 99).
o Real secure server Sensor, produced by Internet Security Systems (ISS) is a program, which acts as a firewall and server monitor. It allows businesses to “more proactively protect their mission critical servers by not only detecting attacks, but also preventing system misuse and malicious activity (“Internet Security Systems,” 2000).
To best secure e-tailing sites and transactions, a combination of anti-virus software and one or two different firewalls would work best to ensure e-mail encryption and web-based privacy concerns, since most programs do not offer both these features (Rudich, 1999, p. 6).
ReferencesBlotzer, M. J.
(2000, May).
Computer security. Occupational Hazards, 62 (5), 99-101. (Electronic copy: ABI Inform, 4 pages. ) Courtney, A. (2000, July).
Countering net crime. The Banker, 150 (893), p. 84. (Electronic copy: Business Index, 5 pages. ) E-commerce sites. (2000, Mar.
).
The Banker, 150 (889), p. 106 (Electronic copy: Business Index, 1 page. ) Internet security systems expands protection of e business infrastructure, ships real secure server sensor; first to deliver groundbreaking hybrid intrusion detection solution.
(2000, Oct. 11).
PR Newswire. (Electronic copy: Lexis-Nexis Academic Universe, 3 pages.
The Homework on Web Page Exercise
Using the search engine of your choice, complete the following items. Be sure to copy and paste the URL along with your answer. This activity should be done in Word. 1. The World Wide Web Consortium sets Internet standards. Who is the current CEO of the W3C? Jeffrey Jaffe. Link: http://www.w3.org/People/Jeff/ 2. What cable company was established in 1858 to carry instantaneous communication across ...
) Rudich, J. (1999, Nov. ).
Privacy software.
Link – up, 16 (6), p. 22. (Electronic copy: ABI Inform, 4 pages. ).