logo

Study of Cyber Security issues for e-commerce

   

Added on  2023-01-05

51 Pages15114 Words99 Views
Study of cyber security issues
for e-commerce
1
Study of Cyber Security issues for e-commerce_1
Executive Summary
Cyber attack is defined as deliberate and malicious attempt that is being carried out by
individual for breaching information system. This is carried out to have certain kind of
advantages. In order to protect systems form cyber attacks, the concept of cyber security is
utilised. The practice that is accountable for defending servers, electronic systems, data,
networks and mobile devices from certain malicious attacks is known as cyber security. This
term is used in different context in order to ensure that information which is shared among
different personals is secured. E-commerce refers to business model that enables individuals as
well as firms for buying and selling over internet. This is carried out in four different market
segments that are business to consumer, business to business, consumer to business and
consumer to consumer. While delivering services as an e-commerce service provider, it is
important that they monitor all the transactions that are conducted within their network, encrypt
them, have relevant software for detecting any attack and other aspects. This will aid latter
within making sure that they are able to work in secured manner. In context of user, they also
need to have anti-spyware, firewall and anti-virus through which if they access any infected e-
commerce website then this will be blocked. Furthermore, the domain name must be cross
verified and services from authenticated e-commerce providers must be taken. This is done to
ensure that basic and mandatory steps are taken into consideration by both the entities for having
secured transactions. Thus, opts for the concept of cyber security.
2
Study of Cyber Security issues for e-commerce_2
Table of Contents
Executive Summary.........................................................................................................................2
Topic: “Study of Cyber Security issues for e-commerce”...............................................................3
Chapter 1..........................................................................................................................................3
Introduction......................................................................................................................................3
1.1 Overview of research........................................................................................................3
1.2 Background of the research..............................................................................................3
1.3 Research aim....................................................................................................................3
Research Objectives...............................................................................................................4
1.4 Contribution of your research...........................................................................................4
1.5 Structure of the report.......................................................................................................4
1.6 Summary....................................................................................................................................5
Chapter 2..........................................................................................................................................6
Literature Review.............................................................................................................................6
2.1 To determine the impact of cyber security incidents to retail industry............................6
2.2 To ascertain challenges encountered by Retail industry as a result of cyber security attack.
................................................................................................................................................7
2.3 To formulate strategies for minimising the probability of occurrence of future cyber
attacks on Retail industry.......................................................................................................8
2.4 Summary..................................................................................................................................12
Chapter 3........................................................................................................................................13
Research Methodology..................................................................................................................13
3.1 Methodology Utilised..............................................................................................................13
3.2 Summary..................................................................................................................................17
Chapter 4........................................................................................................................................18
Design and Implementation...........................................................................................................18
4.1 Methodology............................................................................................................................18
4.2 Summary..................................................................................................................................24
Chapter 5........................................................................................................................................26
Result and Analysis........................................................................................................................26
5.1 Introduction..............................................................................................................................26
3
Study of Cyber Security issues for e-commerce_3
5.2 Interpretation.............................................................................................................................26
5.3 Summary..................................................................................................................................43
Chapter 6:.......................................................................................................................................44
Conclusion, recommendation and reflection.................................................................................44
6.1 Conclusion......................................................................................................................44
6.2 Reflection.......................................................................................................................45
6.3 Recommendation............................................................................................................46
References......................................................................................................................................47
4
Study of Cyber Security issues for e-commerce_4
Topic: “Study of Cyber Security issues for e-commerce”
Chapter 1
Introduction
1.1 Overview of research
Cyber security is defined as body of practices, technologies and processes for protecting
devices, programs, networks and data from any kind of damage, attack or unauthorised access. It
implies practice to defend servers, electronic systems, mobile devices, etc. from malicious
attacks. As per the statistics, it has been identified various cyber attacks have been carried out in
2020 across United Kingdom which have created adverse impact on overall operations of firm
(Al-Sartawi, A.M.M. and Razzaque, A., 2020). This means that cyber security is crucial for firm
and different trends in terms of attacks that are being carried out needs to be analysed. It will
enable to formulate strategies that will further lead to prevent cyber attacks.
E-commerce is defined as process that is involved within buying along with selling of
services and goods, transmission of funds primarily by making use of internet. This is online
retail shopping that is carried out by customers through usage of websites, mobile apps, chats
and many other. This enables to have ample of benefits like easy& faster buying process, cost
minimisation, flexibility, several modes of payment, no limitations on reach, comparison
between prices and many others. While carrying out e-commerce, it is important to ensure that
cyber security concept is taken into account so that secured transmissions can be carried out in an
effectual manner.
1.2 Background of the research
Cyber security is defined as protecting internet-connected systems like software,
hardware and information from cyber-threats. The practice is utilised via enterprises and
individuals for protection of unauthorised access for data centres along with computerised
systems. The rationale behind execution of cyber security is to render enhanced security posture
for networks, servers, mobile devices, data and computers from attackers who have one or other
malicious intent. Cyber attacks are formulated to render enhanced access, deletion or extortion of
sensitive information and make cyber security vital (Blum, 2020). The study is conducted to
identify impact and a different strategy to ensure that organisation along with individuals whose
5
Study of Cyber Security issues for e-commerce_5
information is stored is protected. Across UK, it has been found that near around 36.6 million
records have been breached which is a large number (List of data breaches and cyber attacks in
August 2020 – 36.6 million records breached, 2020). This makes it more important that
individuals along with firms like Retail industry takes essential steps through which the overall
pessimistic impact cannot be eradicated.
1.3 Research aim
“To analyse the significance of cyber security in business.” A case study on Retail
industry.
Research Objectives
To determine the impact of cyber security incidents to retail industry.
To ascertain challenges encountered by e-commerce as a result of cyber security attack.
To formulate strategies for minimising the probability of occurrence of future cyber
attacks for ecommerce sites.
1.4 Contribution of your research
In this study the impacts will be analysed which are created due to cyber attacks within
the retail industry. The emphasis will be made on the challenges that are being faced by e-
commerce after the attack has occurred and what all the reasons behind its occurrence.
Furthermore, certain strategies will be developed for eradication of the future probabilities. It
becomes difficult to identify that attack will occur but by continuously remaining updated with
the technologies and methodologies used firm can ensure up to certain extent that systems are
secured.
1.5 Structure of the report
This is critical section of research that assists readers to classify information associated
with chapters that will be covered within the study is defined as route map. The different
chapters will be used for having a conclusion and their overview is illustrated beneath:
Chapter 1: Introduction: This chapter will furnish basics about the topic that will be
covered in the dissertation. It comprises of the basis along with adequate information associated
with the topic that is considered. The reader will be able to have data related with background,
aims, objectives and contributions that are being made within the topic.
6
Study of Cyber Security issues for e-commerce_6
Chapter 2: Literature Review: This denotes second chapter that is dependent on study
carried out via authors. In this section of dissertation, various books, research papers, journals
articles, magazines and online mediums will be used for accessing adequate information. This
aids reader to identify the work that has been done by others as well as their point of view. Here,
emphasis will be laid on cyber security aspects and the different ways which have been carried
out along with their mitigation. Through this, the literature gap which prevails can be identified
in an adequate manner.
Chapter 3: Research Methodology: This chapter will provide details related with
methods that are used for carrying out research. It comprises of secondary and primary method to
gather data. Furthermore, philosophies, qualitative or quantitative and many other aspects
associated with research will be illustrated. This all will be illustrated in the context of cyber
security. It is a crucial method through which researcher can have support for working with
peculiar topic.
Chapter 4: Design and implementation: This involves interpretation of data associated
with the topic. The frequency table will be developed that will aid researcher to identify agreed
along with unagreed respondents with reference to cyber security concepts. Furthermore,
various graphs and tables will be used for carrying out analysis of data that is being attained.
Through this, adequate outcome can be attained by taking into consideration different
perspectives and conditions which might take place due to safety concerns.
Chapter 5: Result and analysis: The fifth activity will render assistance to investigator
for identification of primary as well as secondary information. Here, literature review will be
used to examine secondary information that is related with the topic. Furthermore, questionnaire
will be used for having primary data with reference to significance of cyber security along with
benefits that can be attained through its usage.
Chapter 6: Conclusion, recommendation and reflection: This denotes last chapter
which is accountable for furnishing support to readers with respect to what is done and results
that will be acknowledged by conducting research. This chapter illustrates research findings
along with analysis up to certain extent. Along with this, some recommendations will be
furnished for organisation that will aid them to protect from any kind of cyber attacks in future.
7
Study of Cyber Security issues for e-commerce_7
1.6 Summary
This chapter provides insight into introduction to cyber security. This chapter furnish
overview of the research topic along with aim and objectives that will be used for attaining
desired results. Furthermore, the outlines of other chapters that will be discussed within the entire
dissertation are also specified. The next chapter will provide literature review which means that
work done by different researchers will be studied in order to identify the gap so that researcher
can carry out their operations accordingly. The researcher will have adequate knowledge with
reference to has been done and what else can be done with reference to cyber security
8
Study of Cyber Security issues for e-commerce_8

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Importance of Cyber Security in Retail Industry
|21
|7572
|72

Significance of Cyber Security in Business: A Case Study on Retail Industry
|16
|943
|42

Cyber Security Detection of Common Attacks Using SNORT Project 2022
|56
|14273
|14

Cyber Security: Exploring the Various Aspects and Solutions
|29
|8168
|290

Cyber Security in Aviation
|115
|33698
|384

Impacts of Computer Crimes and Misuse on Users, Companies, and Society
|13
|4227
|329