- Activity diagram
- Sequence diagram
What are the different Vulnerable Points in an E-commerce Environment?
An e-commerce environment has many vulnerable points that attackers can get to the system. One of the points of attack is the channel of connection between the client and the ISP provider. The attacker can tap this point and make an attack on the connection. The attacker can intercept the communication between the user and the Internet Service Provider (ISP) and use security threats like spoofing to get data from the client. The client will lose money in the process. Another point of vulnerability is the ISP networks. There could be sniffer programs that are installed maliciously at the ISP premises. Another point vulnerable point is the web server connections and configurations. The other point of vulnerability is the break into the database of the organization. The database is one of the main issues and targets of the attackers. They will want to access the database and get the credentials that do not belong to them. Another point of vulnerability is the attack on the backbone of the internet. This is the case where the attackers will make use of the internet infrastructure and connections to break into the internet backbone. This is a significant place because there is no guarantee that the internet is safe.
If you have to design any E-Commerce application, what steps you will take to protect the Electronic Commerce Application against all of these vulnerable points?One of the steps is to have the applications have enough authentications. This will ensure that valid users will have validation in order to log into the applications securely. If there are failed attempts to log into the systems, then there should be a trigger to alert the owners that there is a risk of attack on the application.
The next step is to ensure that there is enough access control for the application. This will enable the organization using the application to manage the control to the application. This will be incorporated to design with the use of different levels of access. This will enable managers have a different area of access while junior users will access to different areas and functionalities. There should be different usability levels for the application.
Another step would be to integrate session management for the applications. This will ensure that there is enough and better management of the sessions. The brute force attacks will be eliminated if this is incorporated into the application.
Another security step that I will take is to ensure that there is data and input validation to the application. This will ensure that there is validation of the data so that there is controlled input of the data.
There will also be integration of the buffer overflow control mechanisms to the application. This will ensure that there is management and enough security mechanism for the application. Therefore, there will be an alert in cases where large amounts of data are sent to the application.
There are different types of electronic payments that are available on the internet. They serve the same purpose. The first e-commerce payment option is that of PayPal. It is an online payment system which enables people to have credit cards for making the various payments. There are secure payments through banks, account balances, and the smart connect card that is offered by PayPal. This is one of the requirements and capabilities of this payment option. With this payment system, there is no financial information is displayed for security reasons. There are also many merchant services which are available with the use of PayPal payment service. It is offered in more than 55 countries in the world and different currencies.
Another e-commerce payment system is that of Google Checkout. This is a payment option that was developed by Google in order to simplify the payment procedures and processes. The details for the credit and debit card, plus the information for shipping are all stored in the Google account of the user. This system covers fraud protection for the payment services. This is a crucial aspect of the payment process and aspect.
Another payment option for e-commerce is Sage Payment Solutions. With this payment option, there are check processing solutions, gift cards, and debit and credit card. With this payment option, it is possible to have a payment option that will enable the payments to be made.
There are other popular e-commerce payment options that are popular. WebMoney is a payment option that provides money transfer online. Another is Skrill, formerly Moneybookers. It is used to manage internet transactions from credit cards to bank accounts. There is also the use of WorldPay, a payment system for retailers that operate on the internet and also for mail order. Most users of WorldPay are users who operate in small business merchants.
The organization has also asked you to select the best suited E-Payment systems for the Electronic Commerce application in place. Which one will you select and why?
The best of the e-commerce applications that have been mentioned is that of PayPal. This is because of the security mechanism that has been integrated on PayPal. They also have a wide presence and usage in the world. Most clients will be familiar with the use of this payment system. It also has the capability of the merchant connectivity which will enable customers to connect and make processing of the payments using these merchant services. This is a crucial aspect and method of making payments.
How would you rate E-Mail marketing as the option your organization has selected for online advertising?
Make a report explaining various pros and cons of the E-Mail marketing.There are many advantages of e-mail marketing when compared to other forms of marketing online enterprises. One advantage of e-mail marketing is low cost of marketing. This is one of the benefits that are achieved with the use of email marketing. Another advantage is that there is likelihood to have increased sales from the contacts of former customers. E-mail marketing also enables organizations to track the mails. This is an advantage that makes organizations want to use e-mail marketing. It is simple and easier to know how many people opened the emails unlike traditional methods of marketing.
One disadvantage with the use of e-mail marketing is that, in most cases, spam messages have been an issue of concern for marketing. This is a significant development that many clients do not want. Another disadvantage is that the email message may not be delivered to the intended people. Also, there are higher chances of the site being shut down because of spam reporting. If many people report that the email that is used is full of spam, then there are higher chances of the website being shut down.
Being the head of the Electronic Commerce division of your organization, how would you define the following four major categories of issues?
Information rightsThis is the right of information that is used in the site as content materials. The right of this information is that it belongs to the company. If there is some information about something and it originated from a source, then that source will be acknowledged.
Property rightsThe property right is the right of images and other intellectual rights that have been used in the e-commerce website that has been designed. It is a crucial issue while developing the website.
Governance
The governance is the management of all the rights and information of the e-commerce website. This is the process of managing the website for use.
Public safety
Public safety is the safeguard of information so that it does not bring any harm to the people accessing it. It should not be a source of strife and discomfort for the users.
and welfare
This is the general concern of the clients. Their concerns should be addressed in the site.
while designing the Electronic Commerce Systems?
References
Liang, TP, Ho, YT, Li, YW, & Turban, E 2011, What drives social commerce: the role of social support and relationship quality. International Journal of Electronic Commerce, Vol 16, Issue 2, pp 69-90.