Shopping for Online Security
Since the early 2000’s, people have been shopping online. More and more it has grown where now people are constantly online doing their shopping. Anything and everything is available for purchase. From a piece of fruit from around the world; to a vehicle that is a few states away. Whatever your heart desires, if you have the money for it, you are most likely going to be able to buy it. What happens though when someone else grabs ahold of your information while you are shopping online? It is a lot less noticeable than if you were at the supermarket down the street. There it would be much easier to notice if someone takes your wallet. Online someone can just hack into your account without your knowledge and take all of your information. They could go on an online shopping spree. If this were to happen to you, you’re going to go after the site that let your information slip so easily. This could ruin a business for good. Why then, would a business risk even having an online store, what can they do to protect their consumers and themselves, and what can the consumer do to protect themselves?
Electronic commerce- E-Commerce- is “Business-to-consumer and business-to-business commerce conducted by way of the internet or other electronic networks.” (Merriam-Webster) The online retail business is very profitable. Anyone and everyone can go to a website to view their favorite products and make a purchase. This makes selling products much easier and less expensive than setting up a building to hold those products they wish to sell. This building is much less remote than the online store which will lead to less profit in the long run. For the small business that is just starting out, or even the medium sized b...
... middle of paper ...
...on and decryption algorithms are the same. With asymmetric- public-key- algorithms, there are two different but similar keys. One key is made public and one key is kept secret. In reality, symmetric and asymmetric key algorithms are used together. The reason being is that the symmetric system is much faster. A random key is then generated and encrypted using the asymmetric algorithm. The user then uses the first key that was populated and with the asymmetric algorithm the data is decrypted with the newly created key.
Cryptosystems are not the only component of cryptography. The main areas are cryptosystems, modes, protocols, and key management. Cryptosystems are the basis for cryptography and that it refers to the algorithms to secure data. Modes refer to how the algorithms are used and used to manage the algorithms that are longer than a single block
ingle block
What is encryption? Encryption is a technological technique that protects and secures the transfer of plain text information between two sources through the use of the internet. This is done by rearranging the text using a mathematical algorithm that renovates the message into an indecipherable form, which can only be unlocked and translated with a use of a key. The strength of the encryption key is measured by its length, which is determined by the number of bits and by the type of encryption program.
Asymmetric Key Encryption methods are DSA, Diffie Hellman, RSA, Elliptic Curve and DSA. Asymmetric Encryption
RSA encryption is the foundation of public key cryptography security products. For example, credit card companies use the RSA algorithm for customers’ individual online WebPages. The credit card companies publish a big number on WebPages, which is made by big prime numbers using the RSA algorithm. Since neither computers nor people can factor such big numbers, the RSA encryption system has secured many customers’ information.
The digital era arrives. Blue Book information editorial board and Social Science Literature Publishing House (2010) pointed out that “China's e-commerce transaction volume reached 3.85 trillion yuan in 2009”. Utilisation of e-business services was also high amongst Hong Kong people. About 98.3% of all persons had used e-business services such as Octopus Card and Automatic Teller Machine (Census and Statistics Department, 2009). One of the pitfalls for the development of e-business, however, is the concerns on consumer privacy. According to Green’s (1999) survey, 54% of respondents had decided not to purchase a product because of a concern on overuse of personal information collected in the e-business transaction. This essay examines the circumstance on protection of consumer privacy in e-business. As e-business is surging by astronomical number and consumer information is a kind of property, the protection of consumer privacy in e-business becomes significant. This essay begins with the causes of the problem, and then move on to analyse the effects. Lastly, the essay concludes with the solutions to the problem.
Data Encryption is from the cryptography science, which includes coding and decoding of message to protect the safety. Development computer technology makes the encryption even more complicated. The ability for people to break codes is increasing, so are the ability to guard the codes. Many encryptions are available now. They were developed by some hi-tech company and sold, or you can choose some free service. Actually, when you are using the web browsers, emails, or even the basic system, your information has been automatically encrypted.
Public key encryption is one type of cryptographic mechanism that uses asymmetric key pair to encrypt and decrypt the message which means the key used to encrypt the message differs from the key used to decrypt one. It was first published by Whitfield Diffie and Martin Hellman in the year 1976. A public-key encryption includes six main elements which are as follows-
After watch and listen to this seminar, my perspective to cryptography become more broaden. What I learned in class and what the reality is seems very different. From what I learned in class, cryptography seems very good in terms of securing the data (confidentiality) and doing digital signatures (authentication) which make it become almost impossible for hackers to know the data or information encrypted. But then, I don’t realize that the most important thing in the cryptography is the key itself. Although, it seems very hard to know and get the key, the hackers still manage to do it. And usually the hackers are insiders because insiders usually have more information than outsider, so that it become clear the insiders are the most dangerous intruders.
Computer science is a vast field that includes nearly everything relating to computers. Everyday there is information transmitted all over the Internet. Pictures are uploaded, transactions are made on thousands of online retail websites, and banking transactions take place everyday on the Internet. All of these transactions have created a need for secure communications. People wish to keep things like banking, medical, and political information from the eyes of unwelcome parties. This has created a need for cryptography. Cryptography is the science or study of the techniques of secret writing, especially code and cipher systems, and is used by everyone from the average citizen to the government and military.
Encryption converts a message in such as way that its contents are hidden from unauthorized readers. It is intended to keep messages and information as a secret. Plaintext, also known as clear text, is the plain or original message, which is has not yet been encrypted. Once the message is encrypted it is then called a cipher text. This process is obviously referred as encryption. The exact opposite process is called decryption. Encryption is the most successful way to attain data security. To read an encrypted file, you must have access to a secret key or password that enables you to decrypt it. Data encryption is a means of scrambling the data so that is can only be read by the person holding the key, a password of some sort. Without the key, the cipher cannot be broken and the data remains secure. Using the key, the cipher is decrypted and the data is returned to its original value or state. Each time one desires to encrypt data, a key from the 72,000,000,000,000,000 possible key variations, is randomly produced, and used to encrypt the data. The same key must be made known to the receiver if they ar...
To start off the examination of this complex topic, let’s start with the definition of encryption: a process of disguising a message so that only its legitimate recipient can understand it. There are two steps to the encryption process, the first of which is also called encryption, and the second which is decryption.
Two simple techniques for encrypting information are: symmetric encryption (also called secret key encryption) and asymmetric encryption (also called public key encryption). Symmetric algorithms are faster, but the main problem associated with this algorithm is key distribution. On the other hand, asymmetric encryption eliminates key security problem, but these algorithms take too much time for encryption and decryption. Certain systems use asymmetric encryption for secure key exchange joined with symmetric algorithms for rapid data encryption. One of highly regarded symmetric algorithms is AES (Advanced Encryption Standard), AES is encryption standard recognized by the U.S. National Institute of Standards and Technology (NIST)
E-commerce or electronic commerce is carrying out business communications and transactions through computers and over networks. It involves buying and selling of goods and services through digital communication. E-commerce also includes transactions on the World Wide Web and the Internet and means such as electronic funds transfer, smart cards and digital cash. E-commerce covers outward facing processes that interact with customers, suppliers and external partners such as sales, marketing, delivery, customer service, purchasing of raw materials and supplies for production.
According to the definition of Whatis.com "E-business (electronic business), derived from such terms as "e-mail" and "e-commerce," is the conduct of business on the Internet, not only buying and selling but also servicing customers and collaborating with business partners."[1]
At the very start, internet revolution was known as a world wide web that would change everything. In 1990s, the concept of "online business" was created, this business is known by various names such as dot-coms, e-biz etc. which made easier to start a business on internet and inexpensive as well. Whether it's a big or a small, local or international it can reach infront of the world very easily. Thousands of ventures have been made on internet for online business on the basis of brick and mortar. Online business is not different from any other venture. Same rules and principles are applied. First thing to start up a business is to create a business plan and think of how to make money. Some of the options which should be applied for an online business includes, sell products, sell advertising, sell information, sell services and to become a reseller. All of these options are complied together. For any virtual business an individual should always look for products with high margins, high demand and less competition either for physical or digital manner. However, many services are sold on internet such as web hosting, domain name registration, software applications and comparison of different products and services. Selling information is another basic option in an online business which is done in two forms, one is subscribing on a website where online articles are available for free and on the other hand e-books are popular and are free, they can be downloaded easily plus when the writing is done the cost of subscription is very low. Advertising on internet leads toward a lot of money though it's an expensive procedure, with a lot of traffic on a web site one can make money easily by joining any kind of ad network such as Google. By getting affiliated with another web site can also make a lot of money such as sending a buyer on another merchant's web page, like this one can get a percentage on per sale basis but first an individual needs to get expert in marketing for search engines.
Electronic Commerce as popularly as E-commerce has become a big deal in our growing economy due to the increase use of online systems. E-commerce now of the fastest growing business in the world. The technology has change the way of business. Business that have physical location have now made it an effort to focus their online business. It is the new sort of business platform where you can make use of different technologies like electronic data interchange or transfer document electronically. Online business is an effective of sales.