The rapid growth of technology
VerifiedAdded on 2022/08/26
|7
|1466
|10
AI Summary
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: CYBER DEFENSE WEB ATTACK
CYBER DEFENSE WEB ATTACK
Name of the Student
Name of the University
Author Note:
CYBER DEFENSE WEB ATTACK
Name of the Student
Name of the University
Author Note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1CYBER DEFENSE WEB ATTACK
Introduction:
Considering the rapid growth of technology it is identified that the usage of e-commerce
websites is also increasing significantly. Thus, being an information security of an e-commerce
company it is my responsibility to enhance the security factors of the company as this will help
to protect the customer data of the company (Gantayat & Giri 2016).
Followed by the above considerations, this document will consists a detailed elaboration
of the web browser security measures, discussion on different types of data as well as detailed
discussion on best practices that will help to protect the customer data.
How to secure Web Browsers?
After analyzing the operational infrastructure of the nominated organization it is
identified that the company has initiated to redesign their website with the purpose to protect
their customer data and this will also help to improve the effectiveness of the website. Thus, in
order to address the above mentioned aspects it is essential to follow the below mentioned
practices:-
Incorporation of SSL certificate will help to protect the customer data present in the company
website. Considering the increasing growth of internet traffic it is very essential to
collaborate SSL certificate with the website of the company. After incorporating this every
customer will be able to see the browser and this will help to protect their data as well (Gupta
& Dubey 2016).
Incorporation of effective data cookies and privacy policy will help to protect the customer
data present in the company website. After analyzing the operational activities of the website
it is identified that the nominated e-commerce website does several global transactions which
Introduction:
Considering the rapid growth of technology it is identified that the usage of e-commerce
websites is also increasing significantly. Thus, being an information security of an e-commerce
company it is my responsibility to enhance the security factors of the company as this will help
to protect the customer data of the company (Gantayat & Giri 2016).
Followed by the above considerations, this document will consists a detailed elaboration
of the web browser security measures, discussion on different types of data as well as detailed
discussion on best practices that will help to protect the customer data.
How to secure Web Browsers?
After analyzing the operational infrastructure of the nominated organization it is
identified that the company has initiated to redesign their website with the purpose to protect
their customer data and this will also help to improve the effectiveness of the website. Thus, in
order to address the above mentioned aspects it is essential to follow the below mentioned
practices:-
Incorporation of SSL certificate will help to protect the customer data present in the company
website. Considering the increasing growth of internet traffic it is very essential to
collaborate SSL certificate with the website of the company. After incorporating this every
customer will be able to see the browser and this will help to protect their data as well (Gupta
& Dubey 2016).
Incorporation of effective data cookies and privacy policy will help to protect the customer
data present in the company website. After analyzing the operational activities of the website
it is identified that the nominated e-commerce website does several global transactions which
2CYBER DEFENSE WEB ATTACK
needs to be protected thus, it is suggested to adopt privacy policy and data cookie policy
(Harshita & Tanwar 2016).
Along with this it is also identified that protecting the customer data restricting the
unauthorized access will be very effective. Thus, it is recommended to the company to add
plugin feature with the purpose to control all the data access from administrator.
Apart from these controls it is also very essential to eliminate the impact of hackers and data
thefts. Thus, it is recommended to install anti-virus software which will help to protect the
website from external threats (Nitnaware & Khedkar 2018).
Development of backup policy will also help to provide support to the organization in case of
any disaster takes place.
Data types:
While analyzing this scenario it is identified that a website of an e-commerce business
consists of several data gathered from the activities of the customers and those collected data
needs to be protected with the basis of their priorities. Hence, it is very essential to classify those
data in order to effectively protect the operational data of the e-commerce website. The identified
data types are mentioned in the below list:-
Location data-
Location data is one of the confidential information that is stored in any web browser,
thus it can be stated that the location data could be easily accessible by the hackers if the website
does not consists any security measures to protect their data (Patro, Padhy & Panigrahi 2016).
needs to be protected thus, it is suggested to adopt privacy policy and data cookie policy
(Harshita & Tanwar 2016).
Along with this it is also identified that protecting the customer data restricting the
unauthorized access will be very effective. Thus, it is recommended to the company to add
plugin feature with the purpose to control all the data access from administrator.
Apart from these controls it is also very essential to eliminate the impact of hackers and data
thefts. Thus, it is recommended to install anti-virus software which will help to protect the
website from external threats (Nitnaware & Khedkar 2018).
Development of backup policy will also help to provide support to the organization in case of
any disaster takes place.
Data types:
While analyzing this scenario it is identified that a website of an e-commerce business
consists of several data gathered from the activities of the customers and those collected data
needs to be protected with the basis of their priorities. Hence, it is very essential to classify those
data in order to effectively protect the operational data of the e-commerce website. The identified
data types are mentioned in the below list:-
Location data-
Location data is one of the confidential information that is stored in any web browser,
thus it can be stated that the location data could be easily accessible by the hackers if the website
does not consists any security measures to protect their data (Patro, Padhy & Panigrahi 2016).
3CYBER DEFENSE WEB ATTACK
Password data-
Along with the above mentioned data type password data is also one of the essential
information as in a website passwords are used for login. Hence, it can be stated that the hacker
cloud try to access the user password with the purpose to steal the user information.
Hardware and Software data-
While using any website it sometimes asks for information about the computer in which
the user is performing the operations. Those data consists of GPU data, OS data, processor data
as well as the IP address.
IP address-
While login to any website it always stores the IP address of the user.
1st and 3rd party cookies-
While using any website cookies are a small set of information that a user leaves after
using the website and that cookie in stored in the web browser database.
Auto fill data-
These types of data are those which has been used most frequently in a website thus,
when the user tries to login it gives auto fill feature to the user.
Log In credentials-
While using any website login credentials are always used thus, a web server always
stores these types of data in their database.
Password data-
Along with the above mentioned data type password data is also one of the essential
information as in a website passwords are used for login. Hence, it can be stated that the hacker
cloud try to access the user password with the purpose to steal the user information.
Hardware and Software data-
While using any website it sometimes asks for information about the computer in which
the user is performing the operations. Those data consists of GPU data, OS data, processor data
as well as the IP address.
IP address-
While login to any website it always stores the IP address of the user.
1st and 3rd party cookies-
While using any website cookies are a small set of information that a user leaves after
using the website and that cookie in stored in the web browser database.
Auto fill data-
These types of data are those which has been used most frequently in a website thus,
when the user tries to login it gives auto fill feature to the user.
Log In credentials-
While using any website login credentials are always used thus, a web server always
stores these types of data in their database.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
4CYBER DEFENSE WEB ATTACK
Best practices to protect customer data:
Considering the above discussion it is observed that it is very essential to protect the user
data with highest priority. Thus, in the below section detailed idea about the practices has been
described which will help to protect the restructured website of the organization with the purpose
to provide safety to the customer data-
Gather only the data that is very essential for the using the website. Since, this is an e-
commerce website thus, this is suggested to the company to gather only the required data
from its users (Khan 2019).
Along with the above practice it is also very essential to avoid taking very confidential
information about the customer such as the credit card data as well as other financial data.
Incorporate the SSL certificate with HTTP which will help to encrypt the transaction data in
order to protect it from external threats. The adoption of SSL will help to prevent the website
from external threats (Nasreen & Purohit 2018).
Along with the above mentioned practices staying up to date with the system and security
patches of the website will help to protect the user data which will directly impact the
effectiveness of the e-commerce website (Hu 2017).
Apart from the above mentioned aspects it is also very essential to demand strong passwords
from the users as this will also help to protect their data.
And last but not the least enhancing the website security with effective security protocol will
help the website to keep all the data safe.
Conclusion:
After completion of this study it can be concluded that this paper has effectively
discussed about all of the possible security aspect present in the e-commerce company with the
Best practices to protect customer data:
Considering the above discussion it is observed that it is very essential to protect the user
data with highest priority. Thus, in the below section detailed idea about the practices has been
described which will help to protect the restructured website of the organization with the purpose
to provide safety to the customer data-
Gather only the data that is very essential for the using the website. Since, this is an e-
commerce website thus, this is suggested to the company to gather only the required data
from its users (Khan 2019).
Along with the above practice it is also very essential to avoid taking very confidential
information about the customer such as the credit card data as well as other financial data.
Incorporate the SSL certificate with HTTP which will help to encrypt the transaction data in
order to protect it from external threats. The adoption of SSL will help to prevent the website
from external threats (Nasreen & Purohit 2018).
Along with the above mentioned practices staying up to date with the system and security
patches of the website will help to protect the user data which will directly impact the
effectiveness of the e-commerce website (Hu 2017).
Apart from the above mentioned aspects it is also very essential to demand strong passwords
from the users as this will also help to protect their data.
And last but not the least enhancing the website security with effective security protocol will
help the website to keep all the data safe.
Conclusion:
After completion of this study it can be concluded that this paper has effectively
discussed about all of the possible security aspect present in the e-commerce company with the
5CYBER DEFENSE WEB ATTACK
purpose to get a detailed information about the security threats. Along with these identifications
it has also discussed about the effective security control measures that will help to enhance the
security of the restructured website of the company. While elaborating it has also helped to
gather a depth knowledge on data types. Thus, it can be concluded that this study has addressed
all aspect required by in the mentioned case scenario.
Reference:
Gantayat, M., & Giri, C. K. (2016). Security issues, challenges and solutions for e-commerce
applications over web. International Journal of Engineering and Management Research
(IJEMR), 6(5), 351-357.
Gupta, M. P., & Dubey, A. (2016). E-commerce-study of privacy, trust and security from
consumer’s perspective. transactions, 37, 38.
Harshita, S. T., & Tanwar, S. (2016). Security Issues and Countermeasures of Online Transaction
in E-Commerce. In Handbook of Research on Modern Cryptographic Solutions for
Computer and Cyber Security (pp. 273-302). IGI Global.
Hu, J. (2017). Research on Security Issues and Strategies of E-commerce. DEStech Transactions
on Engineering and Technology Research, (mcee).
Khan, S. W. (2019). Cyber security issues and challenges in E-commerce. Available at SSRN
3323741.
Nasreen, A., & Purohit, S. K. (2018). Working conditions and social security issues of e-
commerce delivery workers in India: Understanding from Marxian
perspectives. International Journal of Social Science and Economic Research, 3(3),
1049-1067.
purpose to get a detailed information about the security threats. Along with these identifications
it has also discussed about the effective security control measures that will help to enhance the
security of the restructured website of the company. While elaborating it has also helped to
gather a depth knowledge on data types. Thus, it can be concluded that this study has addressed
all aspect required by in the mentioned case scenario.
Reference:
Gantayat, M., & Giri, C. K. (2016). Security issues, challenges and solutions for e-commerce
applications over web. International Journal of Engineering and Management Research
(IJEMR), 6(5), 351-357.
Gupta, M. P., & Dubey, A. (2016). E-commerce-study of privacy, trust and security from
consumer’s perspective. transactions, 37, 38.
Harshita, S. T., & Tanwar, S. (2016). Security Issues and Countermeasures of Online Transaction
in E-Commerce. In Handbook of Research on Modern Cryptographic Solutions for
Computer and Cyber Security (pp. 273-302). IGI Global.
Hu, J. (2017). Research on Security Issues and Strategies of E-commerce. DEStech Transactions
on Engineering and Technology Research, (mcee).
Khan, S. W. (2019). Cyber security issues and challenges in E-commerce. Available at SSRN
3323741.
Nasreen, A., & Purohit, S. K. (2018). Working conditions and social security issues of e-
commerce delivery workers in India: Understanding from Marxian
perspectives. International Journal of Social Science and Economic Research, 3(3),
1049-1067.
6CYBER DEFENSE WEB ATTACK
Nitnaware, D. S., & Khedkar, S. V. (2018). Enhancement of E-commerce security using ETSFS
algorithm: A review.
Patro, S. P., Padhy, N., & Panigrahi, R. (2016). Security issues over ecommerce and their
solutions. Int. J. of Advanced Research in Computer and Communication
Engineering, 5(12).
Nitnaware, D. S., & Khedkar, S. V. (2018). Enhancement of E-commerce security using ETSFS
algorithm: A review.
Patro, S. P., Padhy, N., & Panigrahi, R. (2016). Security issues over ecommerce and their
solutions. Int. J. of Advanced Research in Computer and Communication
Engineering, 5(12).
1 out of 7
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.