Business

Protecting Client Computer
Protecting Client Computer in E-commerce

Protecting Client Computer:- Client computers must be protected from threats. Active contents can be one of the most serious threats to client computers. Another threat to client computers is a malevolent server site masquerading as a legitimate web site. Threats can hide in Web pages, downloaded graphics, and plug-ins, E-mail attachments etc. Anyone can read […]

Protecting E-commerce Assets
Protecting E-commerce Assets

Protecting E-commerce Assets:- Protecting electronic assets that comprise the electronic commerce system is not an option but a necessity it commerce is to grow strong. The electronic world will always have to deal with viruses, worms, Trojan horses, eavesdroppers and destructive programs whose goals are to disrupt, delay or deny communications and information flow between […]

Server Threats in E-commerce
Server Threats in E-commerce

Server Threats in E-commerce:- The server is highly vulnerable and forms the threat link in the Client-Internet Server Group serving the electronic commerce path between the commerce server and a user. Servers can be exploited by anyone determined to cause destruction or to acquire information illegally. Most entry points include the wet server and its […]

Communication Channel Threats in E-commerce
Communication Channel Threats in E-commerce

Communication Channel Threats in E-commerce:- The Internet serves as the electronic chain linking a consumer to an electronic commerce resource. The Internet is not at all secure. Messages travel in any number of different paths from the source node to the destination node. The messages then passed through any number of intermediate computers and the […]