logo

Authentication and authorization: tool for ecommerce security

   

Added on  2020-02-23

12 Pages2781 Words181 Views
Running head: E-COMMERCE SECURITYE-Commerce SecurityName of the StudentName of the UniversityAuthor’s note

1E-COMMERCE SECURITYArticle 1 Rane, P. B., Kulkarni, P., Patil, S., & Meshram, B. B. (2012). Authentication and authorization:tool for ecommerce security.IRACST–Engineering Science and Technology: AnInternational Journal (ESTIJ),2(1), 150-157.DiscussionThis article describes about the tools and techniques that can be used for the protection ofecommerce websites through the process of authentication and authorization. This literaturereview describes two design models. The first one is the oriented authentication design modeland the other one is the oriented authorization design model. The authentication design modelfocuses on securing the ecommerce systems from sniffing, brute force, dictionary and replayattacks. It derives the enablers and prescribes the measures for any counter attack. Theauthorization design model is based on giving people permission about accessing information.This model deals with replay, ID spoofing, session hijacking and bypassing authorizationattacks. This section also ponders on the enablers and then on the countermeasures to overcomethe problems. This literature review gives an overview of the technological and nontechnological limitations. The complexities regarding the security issues have led to thedevelopment of these design models. It can be concluded from this article that authentication andauthorization are of major importance for improving the performance of the ecommerce sites.Article 2 MAQABLEH, M. (2012).Analysis and design security primitives based on chaotic systems forecommerce(Doctoral dissertation, Durham University).

2E-COMMERCE SECURITYDiscussion This article discusses the importance of the security measures that are needed forprotecting the ecommerce website. The websites of the merchants are liable to any type of attackover the internet. Algorithms based on cryptography are essential in order to protect theecommerce websites. The message digest plays an important role in providing data integrity,authentication and digital signature for the purpose of privacy. This article focuses on the need ofa fast and strong algorithm for encryption in a transaction related to ecommerce sites. There havebeen proposals regarding the chaotic cryptography that include chaotic hash functions andchaotic pseudorandom number generation. Several ecommerce protocols are also discussed likeSSL, SET and HTTPS. This literature review proposes a new triangle chaotic map for thepurpose of protecting the ecommerce sites.Article 3Niranjanamurthy, M., & Chahar, D. D. (2013). The study of e-commerce security issues andsolutions.International Journal of Advanced Research in Computer andCommunication Engineering,2(7).DiscussionThis literature review focuses on the security issues related to ecommerce and alsodiscusses about the solutions to overcome these issues. Ecommerce security is considered to be asub part of the framework of information security. The greatest threat in the ecommerce securityis the Trojan horse. The reason behind this is that they are able to block or bypass any type ofauthorization and authentication mechanisms. There are information, negotiation, and paymentand delivery phase of an ecommerce transaction. Each of these will have a different type of

3E-COMMERCE SECURITYsecurity measure like access control, identification, and encryption and integrity checks. Thesecurity threats like DOS, theft, fraud and unauthorized access are discussed in details. Thisarticle also provides a small list to protect oneself of any type of security threat. Security isimportant and this article also provides guidelines for secure way of shopping online.Article 4Niranjanamurthy, M., Kavyashree, N., Jagannath, S.,& Chahar, D. (2013). Analysis of e-commerce and m-commerce: advantages, limitations and security issues.InternationalJournal of Advanced Research in Computer and Communication Engineering,2(6).DiscussionThis literature review gives an overview of the m-commerce and ecommerce briefingabout the relationship between them. It also points out the advantages and disadvantages of theecommerce and m-commerce sites. The disadvantages are mainly due to the security issues.There are chances of any type of credit card related fraud. It points out how the consumers sufferwhen their credentials are stolen by the hackers. There are also risks related to phishing attacksand different types of security frauds. Scam identification is another form of threat associatedwith the ecommerce sites. This article discusses about the security features of ecommerce siteslike encryption, auditing, non repudiation and authentication. The protection of the ecommerceassets from any unauthorized access, modification and deletion of data is an essentialrequirement in maintaining the security of the ecommerce sites.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
E-Commerce Security.
|9
|462
|85

Information Security Management in PDF
|9
|2314
|11

Study of Cyber Security issues for e-commerce
|51
|15114
|99

Enhancing E-Commerce Versatility in the Retail Sector: A Literature Review
|80
|7681
|313

RFID Technology: Security Issues and Solutions
|9
|2166
|100

Topic: An Investigation into Threat Modelling Tools and Technique Used in Securing E-Commerce Applications Online
|84
|20598
|225