A computer system comprises hardware and software components, aiming to offer a powerful computational tool. These systems play a crucial role across diverse domains, aiding us in numerous tasks. The prevalence of the internet has significantly bolstered the utilization of computers for information sharing and communication. Computer systems empower us to store, process, display, and transmit information. Even in a basic modern computer system, multiple programs are typically required to carry out various functions effectively.

Tuesday, March 11, 2014

Cyber crime in E-Business

Cyber crimes are on the increase bringing untold distress. It is a growing threat to society caused by the criminal or irresponsible actions of individuals who are taking advantage of the widespread use and vulnerability of computers and Internet and other networks. It thus presents major challenges to the ethical use of information technologies.

It has become one of the major security issues for the law enforcement community, industry, e-business judiciary and the academia.

Attacks on online banking customers and business by cyber criminals have brought about new security concerns and subsequent legislation to protect both business and the private individuals.

The most distinct nature of cyber crime from traditional one is borderless and anonymous. By the help of pervasive network technology cyber crime is ramping over areas, regions and countries.

Cyber crime is becoming one of the Net’s growth businesses. Today criminals are doing everything from stealing intellectual property and committing fraud to unleashing viruses and committing acts of cyber terrorisms.

Personal information and account details have been stolen over the internet. Illegal transactions have siphoned money from personal and business accounts to foreign third party accounts.

The most popular form of fraud, and one that is difficult for auction website operators to controls, is called shilling. This is the process of bidding up the price of an auction item by people who have no intention of buying it.

Cyber crime poses serious threats to the integrity, safety, and survival of most E-business systems, and thus makes the development of effective security methods a top priority.

In the past, business created private networks, which were secure LAN systems that were closed to outside access. Only computers that were actually connected to the private networked by wires could access the information.

The only real concern was that someone with access to the system, such as employee, might violate the system’s security, copy information and remove it from the business’s premises without authorization. 

Typically, e-business security has focused on protection from cyber crime via a broad range of security means, namely the implementation of firewall, authentication, encryption, antivirus software, intrusion detection and penetration testing.
Cyber crime in E-Business

The Most Popular Posts

  • Genghis Khan, born Temujin in 1162 on the Mongolian steppes, remains one of history's most transformative figures. As the founder of the Mongol Empire, the...
  • Mangosteen juice, derived from the tropical fruit mangosteen, is renowned for its exceptional antioxidant content. Antioxidants are vital compounds that ne...
  • Secondary metabolites are an extraordinary array of organic compounds synthesized by plants that go beyond basic physiological processes like growth, dev...