Internet-Facing Security and E-Commerce

Assignment Help Basic Computer Science
Reference no: EM133048501

Internet-Facing Security and E-Commerce

The convenience and ease of online shopping can be difficult to resist. Being able to access massive retailers, such as Amazon, on any mobile device or computer makes it simple to browse and purchase products. Some retailers allow for 1-click purchases, which enables a user to click a single button to complete a purchase. When users purchase with this option, the retail site has all of the user's personal information stored in its system: name, address, retailer-based subscriptions, credit card information, etc. Many of us are willing to potentially sacrifice the security of our private and sensitive information for ease of use, convenience, and expedited processes.

For this discussion, consider internet-facing security, as well as the risks and vulnerabilities that are associated with internet-facing IT systems. Should you reference any internal or external resource, remember to cite your sources appropriately.

1. Why is it important to secure the internet-facing side of an IT system?

2. Name an internet-facing security component that an e-commerce site could implement to protect and secure its internet-facing IT system.

In response to two of your peers, answer the following:

1. What about your peers' proposed security components makes them viable?

2. Recommend an additional security component to further the dialogue.

Reference no: EM133048501

Questions Cloud

Discuss some of Software Engineering constraints : Discuss some of the "Software Engineering " constraints that must be overcome in order build a successful system.
Own system would perform adequately : Is file deallocation important? Explain your answer and describe how long you believe your own system would perform adequately
Security behavior of Java Enterprise Edition environment : Describe security behavior of Java Enterprise Edition environment by explaining how native authentication and authorization services are deployed step-by-step
Linux and MacIntosh File Systems : Linux and MacIntosh File Systems differ a lot and, therefore, need different tools to adequately analyze them.
Internet-Facing Security and E-Commerce : Why is it important to secure the internet-facing side of an IT system? What about your peers' proposed security components makes them viable?
What is project management : What is project management? Briefly describe the project management framework, providing examples of stakeholders, knowledge areas, tools and techniques
Write about project that you accomplished : Write about a project that you accomplished. Explain what needed to be done, how it got done, who worked on the project,
Culture promotes strong project environment : Describe how organizational culture is related to project management. What type of culture promotes a strong project environment?
Generic software product development : What is the most important difference between generic software product development and custom software development?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Freedom of expression in cyberspace-information society

Write down a 3 pages summary about "Freedom of expression in Cyberspace & Information Society " after reading at least one article in each point of view.

  Discuss the benefits of virtualization software

Discuss the benefits of virtualization software, as described in the text. Do you agree/disagree with these benefits,

  Cameras and scanners being used in some medical offices

How are digital cameras and scanners being used in some medical offices? Can you think of some additional or innovative uses for these device in a medical office?

  Risk sources that emerged repeatedly in evaluating risks

What were some of the risk sources that emerged repeatedly in evaluating the risks? How is this helpful?

  Wireless applications-advances-advantages and disadvantages

The adoption of wireless technologies varies from one industry to another, and is often based on the benefits provided versus the challenges, implementation issues, and security issues associated with wireless technologies. Consider the wireless c..

  What role you think it will play in future of cryptography

In this essay, you will explain how quantum cryptography works and what role you think it will play in the future of cryptography.

  Explain what is meant by value type

Explain what is meant by value type and reference type objects in C#. Explain the differences, providing an example of each. Write the code for an example of each. Develop examples.

  Electronic records management system

Companies create business records of many types and store the electronic files using an electronic records management (ERM) system.

  Discuss whether the display is appropriate for the data

Not a histogram. Find a graph other than a histogram that shows the distribution of a quantitative variable in a newspaper, a magazine, or the Internet.

  Challenge for ebay database management

Identify at least three reasons why continuing business growth has been a challenge for eBay database management

  How far is dead center field from first base

In Wrigley Field in Chicago, dead center field is 400 feet from home plate. How far is dead center field from first base?

  Discussed several different models and archetypes

Discussed several different models and archetypes. Identify the IT Governance archetype and provide an example. Has this model been effective?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd