Discussion leadE Business w6 Discussion

Biometric Security Devices
Each week,you will be asked to respond to the prompt or prompts in the discussion forum.Your initial post should be a minimum of300words in length,andyou should respond to two additional posts from your peers.
Assume you are working for a medium-sized company that sells products on its Web site and that the company keeps the computers that run its Web server, database server, and transaction processing server in the office next to yours. Describe what a biometric security device is and explain how your employer might use one to more of these devices to protect its servers.
Required Text
Schneider, G. P. (2015). Electronic Commerce (11th ed.).
Stamford, CT: Cengage Learning.
Boston, MA. ISBN: 9781285742298
BUS615 Ecommerce
Computer security is the protection of assets from unauthorized access, use, alteration or destruction” (Schneider, 2015). Understanding the risks involved with computer security is essential.
Figure 10-1 (Schneider, 2015), provides an illustration of the risks an impacts associated with computer security.
Security for client computers requires the ability to protect the client“ . . . computer from threats that originate in software and data that are downloaded to the client computer from the Internet” (Schneider, 2015).
Cookies are small files that identify returning visitors to particular web sites. The cookies contain private information about the client and the only means of protecting the client’s information completely is to disable the cookies.
“The problem with this approach is that the useful cookies are blocked along with the others requiring visitors to enter information each time they visit the website” (Schneider, 2015).
Chapter 10
Electronic Commerce Security
Communication channel security entails security between communications layers. The Internet is not meant to be secure (Schneider, 2015) and therefore layers of security must be in place to keep Ecommerce transactions secure.
Threats to secrecy, integrity, necessity, physical communications and wireless communications require encryption as a means of keeping data and information secure.
Encryption algorithms transform “ . . . plan text into cipher text (the unintelligible string of character) . . . “ (Schneider, 2015).
The encrypted text provides for a mathematical pattern that is very difficult to transcribe and thus, renders the information secure.
This form of security is essential for both physical and wireless networks.
Chapter 10
Electronic Commerce Security
Payment methods require the secure transfer of information.Payment cards make up the majority of online payment methods (Schneider, 2015, figure 11-1).
Digital wallets provide means of holding credit card numbers or electronic cash (Schneider, 2015) and making the credit card number or electronic cash securely accessible for online purchases.
Stored value cards include Magnetic strip and smart cards. Stored value cards provide a means of storing information related to financial accounts that can produce funds when funds are available. The difference between magnetic strip cards and smart cards is that the information in a smart card is stored in an encrypted microchip, as magnetic strip cards cannot be encrypted making smart cards more secure that magnetic strip cards.
Banking industries provide technologies for secure storage and transfer of funds and check processing functions. Increased activity from Mobile banking from smart phones and portable electronic devices are requiring banks to add services and security to support these activities. Banks also provide protection from identity theft.
Chapter 11
Payment Systems for Ecommerce
Online businesses today must deal with a wide range of security risks. They often create a formal security policy document that identifies risks and countermeasures that will reduce those risks to an acceptable level. Online security elements include secrecy, integrity, and necessity.These three elements are each enforced in the three components of online business transactions, including client devices, the communication channel, and Web server computers. Client devices can be threatened by active content, viruses, or worms delivered throughWeb browsing activity (by means of cookies or Web bugs), e-mail, or other devices on the same network. Antivirus software is an important element in the protection of client computers. The main communication channel used in online business is the Internet, which is especially vulnerable to attacks. Encryption provides secrecy and integrity protection against many of these attacks and can be implemented with private keys, public keys, or a combination of techniques. Digital certificates provide both integrity and user authentication, which can provide non-repudiation in online transactions. Secure Sockets Layer and Secure HTTP protocols can provide secure Web browser connections. Wireless networks are subject to threats of signal interception, but most wireless networks installed in businesses today (and many installed in homes) do use a secure form of wireless encryption.Web servers must be protected from both physical threats and Internet-based attacks on their software. Server protection methods include access control and authentication, which are provided by username and password login procedures and client certificates. Firewalls can be used to separate trusted inside networks and clients from untrusted outside networks, including other divisions of a company’s enterprise network system and the Internet.A number of organizations have been formed to share information about computer security threats and defenses. When large security outbreaks occur, the members of these organizations join together and discuss methods to locate and eliminate the threat. Computer forensics firms that undertake attacks against their clients computers can play an important role in helping to identify security weaknesses.
Credit, debit, and charge cards (payment cards) are the most popular forms of payment on the Internet. Processing payment card transactions requires that an online merchant establish a merchant account with an acquiring bank. Merchants can obtain card approval and transaction settlement services using tools included in their electronic commerce software, through a separate payment processing software application, or from a payment process service provider.Digital cash, a form of online payment that is portable and anonymous, has been slow to catch on in the United States. Digital cash could be useful for making micropayments because the cost of processing payment cards for small transactions is greater than the profit on such transactions. Digital wallets can store payment card information, digital cash, and personal consumer identification. Software-based digital wallets eliminate the need for consumers to reenter payment card and shipping information at each business’s Web site. Stored-value cards, including smart cards and magnetic stripe cards, are physical devices that hold information, including cash value, for the cardholder. Magnetic stripe cards have limited capacity. Smart cards can store greater amounts of data on a microchip embedded in the card and are intended to replace the collection of plastic cards people now carry, including payment cards, driver’s licenses, and insurance cards. Smart card use in the United States is not widespread; however, smart cards are popular in other parts of the world. Banks still process most monetary transactions, and a large part of the dollar volume of those transactions is still done by writing checks; however, banks often use Internet technologies to process those checks. Phishing expeditions and identity theft pose a significant threat to online financial institutions and their customers.

Place your order
(550 words)

Approximate price: $22

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
The price is based on these factors:
Academic level
Number of pages
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more