1CYBERSECURITY Answer to question 1: The main basis of the e-commerce websites is to gain trust of the consumers such that the products are sold and the benefits can be obtained. Some ways of improving trust of the customers on the E-commerce websites are given here. Firstly, making a good impression is important [1]. The website should be viable in all devices and should have efficient design. Secondly, showing off the products helps in building credibility and trust. The details of the product help the customer in determining the authenticity of the products. The more information on the product makes it more suitable for the customer. Being empathetic to the consumers by understanding the needs of the individuals helps in offering an additional advantage to them, and they put their faith on the website. Maintaining originality by validating the beliefs of the consumer helps in building trusts. Answer to Question 2: Often the attacks through the email results in the phising and spoofing attack in the device or the network. The authentic Email address does not often redirect to different pages which in return ask for the log in credentials for accessing the mail. The attacker may look authentic, although, with the help of the digital certificates the authentic user can be discriminated from the frauds [4]. Thus when someone’s details pops up after the E-mail has been found in the inbox, then we can more or less be convinced that the email is from the authentic user. There are 5 ways in which the social engineering attacks can be prevented and they are, Deletion of the requests regarding the sensitive information in the emails. Reject any sort of mails asking for help or offer to help. Set up a high span filter. Enhance device security
2CYBERSECURITY Raise awareness regarding the risks. Answer to Question 3: Today the Economic sectors are making use of the Computer network more than ever. Thus new technologies are being developed for the protection of the sensitive data that is used by these industries in order to sustain their business, thus the latest technologies the latest technologies that are in use today are mostly developed for the business or the commercial data protection purpose. Most of the industries use the data of the consumer for the purpose of the transaction or improvement of the industry [2]. Those data has to be protected at any cost, thus the technologies have to be made more advanced in order to pace up. So we can say that the data-protection technologies are mostly developed for the use of the industrial and economic purpose. The economic aspect that causes barrier in the development of the privacy is the lack of investment, the lack of innovation and adaptability to the contemporary technologies, the shortage of time of the employees to learn and implement new things and lastly, the privacy policies imposed upon by the websites and the applications are mostly over looked, thus causing a hindrance in the development of the cyber-security [5]. Answer to Question 4: The legal measures are to some extent helpful for the protection of the cyber-security in the society as it imposes punishments and penalties upon breaking them. This helps in generation of a fear amongst the mind of the hacker that if they are caught, there will be consequences [3]. Due to the online interactions in the contemporary world, the flow of information has increased, which have resulted in the formation of more and more information which is not possible to be monitored. Thus following the laws of privacy is difficult in that case. The
3CYBERSECURITY privacy policies are often overlooked while initiating an application or an interaction, which results in the individuals falling into the trap of the hackers. Answer to Question 5 Law is systematic set for universally accepted regulation and rules created by appropriate government like government, which might be national, international to regional. This is used for governing behaviour and action of members and could be enforced with imposing penalties. Whereas ethics are principle which guide society or person, created for deciding what is bad or good, wrong or right, in given situation. This regulates the conduct or behaviour of a person and helps individual to live good life, through applying moral guidelines and rules. Law is systematic body for rules which governs action of individual member and the overall society, whereas ethics is moral philosophy’s branch which guides people through basic conduct [6]. Law is set of regulations and rules, ethics is guidelines set. Law is published and expressed in writing, ethics are abstract. Law has legal binding, however no binding nature is available in ethics. Creation of law is for maintaining social order, ethic are created for helping people to take decisions. Answer to Question 6 Cybersecurity isprotectionof systemsthat are connectedwith internet,which includes software, data and hardware from cyber-attacks. With respect to computing context, the security comprises of physical security as well as cybersecurity. Enterprises use both for protecting their system against unauthorized data access. Cybersecurity’s goal is limiting the risks and protecting assets of IT from the attackers having malicious intent [7]. Analysis of new generation for strategies of cybersecurity reveals fundamental evolution within the policies of the cybersecurity. As consequence, scope of every new strategies of cybersecurity
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4CYBERSECURITY evolved from protecting organizations and individuals as well as protecting the society as whole. Such change would result from evolution of internet’s role within society. As internet is essential for society and economy, failures’ consequences could impact directlysocietyaswhole.Hence,strategiesofcybersecurityaimstoachievetwo interconnected objectives: strengthen of cybersecurity for economy of internet for further driving social and economic prosperity and protection of societies that are cyberspace reliant againstcyber-threats[8].Cybersecurity’seconomicsapplieseconomics’principlesto analysis of problems of cybersecurity. Economists try in determining if marketplace invests cybersecurity’s optimal amount. Owners of private network don’t internalise the cyber risks. IT industry could be characterised through several different externalities: interdependent security, insecurity externalities and network externalities.
5CYBERSECURITY References [1]S.W., Khan, Cyber Security Issues and Challenges in E-Commerce.Available at SSRN 3323741, 2019. [2]D., Dodson, “Cybersecurity: Is It about Business or Technology?” 2018. [3]P., Wang, A. Ali, and W., Kelly, August. Data security and threat modeling for smart city infrastructure, In2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC),(pp. 1-6), IEEE, 2015. [4]X., Wang, W.W., Li, A.C.M. Leung and W.T., Yue, “The Impact of Anti-phishing lawsonITandSecurityInvestment”,In23rdPacificAsiaConferenceon Information Systems (PACIS 2019), 2019, July. [5]P.K., Kushwaha, V., Bibhu, B.P. Lohani, and D., Singh,Review on information security, laws and ethical issues with online financial system,In2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)(pp. 49-53), IEEE, 2016, February. [6]J. Boyle, “Natural law and the ethics of traditions”, InThomas Aquinas(pp. 157-184). Routledge, 2017 [7]A. Joinson and T.V. Steen, “Human aspects of cyber security: Behaviour or culture change?”,Cyber Security: A Peer-Reviewed Journal,1(4), pp.351-360, 2018 [8]P.BrangettoandM.K.S.Aubyn,”Economicaspectsofnationalcybersecurity strategies”,Brangetto P., Aubyn MK-S. Economic Aspects of National Cyber Security Strategies: project report. Annex,1(9-16), p.86, 2015