Internet Security

 

How to maintain privacy on internet

  • If you don’t take proper precaution any time you send an e-mail , accessing web site ,posting a message to news group or use of internet  banking & shopping
  • Information about internet users is captured automatically each time you visit a web site or news group
  • These things can get protected by using powerful tool called encryption s/w like PGP(Pretty Good Privacy) or RSA(Global brand name) or anonymous remailers
  • Newsgroup posting can be made privately by sending them through anonymous remailers , which will useful to protect your identity
  • You can ask your internet service provider not to sell your personal information to mailing list providers & other marketers
  • Following are some sources for information about privacy on the net

-         Educate yourself about online privacy

-         Center for democratic & technology – http://www.edt.org – This site will give you demo to protect your data

-         Discrete data – http://www.discretedata.com – check out  just how much of your vital data is available online

-         Replay Remailers – http:/www.raplay.com – will shield your identity & protect you from newsgroup

 

 

Secure transaction

Secure Transaction Protocols Used in Current E-commerce

Electronic transactions are the main activities of e-commerce. Electronic transactions here are nothing more than exchanging information or messages between parties involved in transactions. Messages can be anything such as order form, confirmation messages, credit card numbers or documents. Since transactions are actually the main activities of e-commerce, then it is important to secure the transactions from any kind of threat. As stated by Cameron that the most critical factor in success of electronic commerce is transaction security (Cameron, 1997).

The Internet offers no security whatsoever to business transactions. Information travels over the Internet through series of routing, which means information can be routed through many computer systems before it reaches the trusted server. Any one of these computer systems can represent an opportunity for the information to be accessed or even changed. To support secure information exchange (including ecommerce transactions) currently there are several security protocols based on encryption methods discussed in the previous section. In this section, we will discuss two security protocols commonly used in the Internet to support Internet-based ecommerce, namely Secure Socket Layer (SSL) and Secure Electronic Transaction (SET).

 

          Secure Socket Layer

Secure Socket Layer (SSL) is a security protocol developed by Netscape Communications to protect communication over the Internet. Although SSL supports many applications such as FTP, Gopher, NNTP (Usenet news), its most popular use is to secure HTTP (the Web)5

. When SSL is used to secure HTTP, it assures a Web user that he/she communicates with his/her intended Web server and then sends or receives messages securely. To do this, SSL uses the RSA cryptosystem offered by RSA Data

Security Inc.6  for authentication and encryption.

 

Secure Electronic Transaction

Secure Electronic Transaction (SET) was jointly developed by Visa and MasterCard and supported by GTE, IBM, Microsoft, Netscape, RSA, SAIC, Terisa, and VeriSign. The SET’s main objective is to provide secure payment using credit cards over an open network such as the Internet.

 

privacy issues

 

B2B Privacy issues:

Unauthorized access to its sensitive information about business’s proprietary systems, customer names, operations, pricing and deal terms, financial condition and other competitive transaction information might occurs.

B2C Privacy issues:

Customer perspective: This e-commerce environment is often a “one-way mirror effect”. Businesses usually ask customers to provide personal information, but customers have little knowledge about how their information will be used and protected.

Business Perspective: An understanding of customers’ privacy concerns is crucial for learning

how and what personal information is collected, identify the confidential information and provide solutions to secure each customer’s confidential information.

C2C Privacy issues:

C2C websites (ebay.com, amazon.com) enable the sale and purchase of products and services between individual customers. Individual customers frequently buy and sell products and provide private information to complete the transaction. It is the prime responsibility of the C2C e-commerce provider to implement necessary security policies to protect the private information from exchanging between customers and the exchange occurs only under the agreed policies.

 

 

 

 

 

Registration


A password will be e-mailed to you.

Feedback Form

Name (required)

Email (required)

Feedback