E-Commerce on the Internet
Main Security Issues

Interception

Data can be intercepted and read while being transmitted between parties.

Redirection

Web service, site, or organization can be impersonated and traffic redirected. Known as "spoofing."

Identification

No standard solution for identification verification, so it is easy to impersonate another.

Exploitable program errors

Programs have bugs or holes that allow outsiders unauthorized access.

Weakest point in security

Although your firm may have good security, since you are linked to others, their weak security can allow unauthorized access into your system.

Source:  Williams, Kathy. (2000, September). Streetwise: Preparing your business for secure e-commerce. Strategic Finance. p. 21.

See also:
        Network Management Services

© Copyright 2000 Raymond S. Kulzick. All rights reserved. 000923.

This publication provides business, financial planning, and/or tax information to our clients. All material is for general information only and should not be acted upon without seeking appropriate professional assistance.

Home

Main Page

Contact

Search

Contact rkulzick@kulzick.com with questions or comments about this web site.
Copyright © 2000 Kulzick Associates, PA - Last modified: September 13, 2008