E-Commerce on the Internet
Main Security Issues


Data can be intercepted and read while being transmitted between parties.


Web service, site, or organization can be impersonated and traffic redirected. Known as "spoofing."


No standard solution for identification verification, so it is easy to impersonate another.

Exploitable program errors

Programs have bugs or holes that allow outsiders unauthorized access.

Weakest point in security

Although your firm may have good security, since you are linked to others, their weak security can allow unauthorized access into your system.

Source:  Williams, Kathy. (2000, September). Streetwise: Preparing your business for secure e-commerce. Strategic Finance. p. 21.

See also:
        Network Management Services

Copyright 2000 Raymond S. Kulzick. All rights reserved. 000923.

This publication provides business, financial planning, and/or tax information to our clients. All material is for general information only and should not be acted upon without seeking appropriate professional assistance.


Main Page



Contact rkulzick@kulzick.com with questions or comments about this web site.
Copyright 2000 Kulzick Associates, PA - Last modified: September 13, 2008