Securing E-commerce: Web Browser Hacking Report, Damman Company

Verified

Added on  2022/08/22

|8
|1787
|16
Report
AI Summary
This report, prepared by a student, analyzes web browser hacking threats within an e-commerce context, specifically focusing on a company based in Damman. The report addresses the importance of securing web browsers to protect customer personal data, particularly in high-value transactions involving billions of SARs. It outlines the processes involved in securing web browsers, including the use of security software and regular browser updates. The report also details the different types of data vulnerable to hacking, such as customer locations, login credentials, bank account details, contact information, and work habits. Furthermore, it emphasizes best practices to deter hackers, including the creation of complex passwords and the use of password managers. The conclusion highlights the need for networked organizations to protect against hacking and fraudulent activities, reinforcing the importance of implementing the discussed security measures.
Document Page
Running head: INFORMATION SECURITY TECHNOLOGIES
Information Security Technologies: Web Browser Hacking
Name of the Student
Name of the University
Author’s Note:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1
INFORMATION SECURITY TECHNOLOGIES
Table of Contents
1. Introduction..................................................................................................................................2
2. Discussion....................................................................................................................................2
2.1 Process of Securing Web Browsers for Accessing Customers’ Personal Data.....................2
2.2 Explanation of Different Types of Data that can be accessed through Hacking...................3
2.3 Best Practices to be incorporated to deter Hackers from Data Mining to collect Customers’
Data..............................................................................................................................................5
3. Conclusion...................................................................................................................................6
References........................................................................................................................................7
Document Page
2
INFORMATION SECURITY TECHNOLOGIES
1. Introduction
Hacking can be referred to as the successful identification of weakness within different
computerized systems and networks for exploitation of the weaknesses and gain accessibility
(Chauhan & Panda, 2015). Web browser hacking is considered as a basic issue that is being
faced for an electronic commerce organization. The information security manager of the e
commerce organization has the responsibility to manage all types of transactions, so that any
type of hacking phenomenon does not take place (Nakaya, Akagi & Tominaga, 2016). This
paper will be outlining a detailed analysis of web browser hacking while redesigning the
organizational website for making it extremely secured.
2. Discussion
2.1 Process of Securing Web Browsers for Accessing Customers’ Personal Data
The information security manager of a specific e commerce company in Damman has to
ensure that the organizational website does not go through any type of hacking issue. They are
heavily involved in globalized transactions, which involve billions of SARs (Najera-Gutierrez &
Ansari, 2018). As a result, the entire team of information security has to redesign the official
website of the company for making it highly secured, even when used with several web browsers
by numerous different customers. The respective manager of information security would be able
to secure the web browser only by following some of the most significant and important steps.
Few of the vital software features, which provide functionality to any particular web browser like
ActiveX, Scripting and Java; might even introduce vulnerabilities to the respective system
(Williams, 2018).
Document Page
3
INFORMATION SECURITY TECHNOLOGIES
One of the most effective and significant method to reduce such issues related to web
browser hacking is visiting the vendor’s website for their browser for learning about these
aspects in details (Baloch, 2017). When the vendor would not provide any type of documentation
about the website, the e commerce company use that particular vendor for high security of their
organizational website without much complexity. Since, they are spending more than billions of
SARs for the website redesigning, the information security team can use a specific application
for making the system automated (Nakaya, Akagi & Tominaga, 2016). Moreover, it would also
enhance the security of different sensitive activities like online banking, as it is the most utilized
mode of payment for all types of customers. Moreover, during redesigning of the website, they
should also update their web browser subsequently for having sensitive information.
2.2 Explanation of Different Types of Data that can be accessed through Hacking
The electronic commerce company in Damman would be providing several types of
products and services to their customers and these customers can order them after successfully
logging into the website (Chauhan & Panda, 2015). Moreover, they would have to enter payment
details while making payment for the product or service. As a result, there is a high chance that
the data might be accessed by a web browser hacking for any type of unethical purpose.
Different types of data, which could be accessed through such hacking from the e commerce
company are provided in the following paragraphs (Soomro, Shah & Ahmed, 2016).
i) Locations: The first and the foremost type of data that can be accessed through web
browser hacking from the respective e commerce company in Damman would be addresses or
locations of the customers (Najera-Gutierrez & Ansari, 2018). The customer can order anything
in their house address or office address and as a result the respective hacker would get an update
about their addresses and hence the respective customers would be under stake. Moreover, it
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4
INFORMATION SECURITY TECHNOLOGIES
would also reduce the name of the e commerce company as customers’ data would not be
secured.
ii) Login Credentials: The second important and significant type of data that can be
accessed through web browser hacking from the respective e commerce company in Damman
would be login credentials of the customers (Baloch, 2017). The hacker would get a hold of the
unique username and password of the customer and then use them unethically for either ordering
anything or getting into the bank details of the customers. It is extremely common for any online
business and hence the Information Security manager should focus on such details for effective
security of the website to be redesigned with this team.
iii) Bank Account Details: Another significant type of data that can be accessed through
web browser hacking from the respective e commerce company in Damman is bank account
details (Nakaya, Akagi & Tominaga, 2016). Most of the customers in the entire world prefer
paying online and hence almost the e commerce companies provide scope for adding bank
account details to the organizational website. It is an easy method of extorting money from the
customers through web browsing and neither the company nor the customer would have a
knowledge about such hacking.
iv) Contact Numbers and Name: Moreover, the names and contact numbers of the
customers would also be known to the web browsing hacker through such type of hacking
(Soomro, Shah & Ahmed, 2016). It is a clear breach of privacy for all the customers and the
company might lose their valuable customers, if such issue would occur in the business.
v) Work Habits: The information security manager should also know that the hacker can
even gain knowledge about the work habits of the customers after getting into the profile of the
Document Page
5
INFORMATION SECURITY TECHNOLOGIES
customer (Williams, 2018). They would be able to know about the type of products ordered by
them and hence provide them with a trap to get easy access of the customers’ personal data.
2.3 Best Practices to be incorporated to deter Hackers from Data Mining to collect
Customers’ Data
The most significant example of hacking includes utilization of password cracking
algorithm for successfully gaining full access to the system. These computers have become
mandatory for running a successful business (Chauhan & Panda, 2015). The e commerce
company should implement some of the most significant and important practices for deterring
the hackers from data mining from collection of customers’ data and these practices are provided
in the following paragraphs:
i) Creation of Complex Passwords: The first and the foremost practice for deterring the
hackers from data mining from collection of customers’ data in the e commerce company is
successful creation of complex passwords (Nakaya, Akagi & Tominaga, 2016). These passwords
should be present in every aspect of the newly designed website, so that the hackers do not get
any scope to get into the website for hacking.
ii) Utilizing a Password Manager: The second important and significant practice for
deterring the hackers from data mining from collection of customers’ data in the e commerce
company would be proper utilization of a password manager (Najera-Gutierrez & Ansari, 2018).
The information security team should engage a password manager for storing and auto filling
their credentials for all the customers and then creating a complex and unique password for every
order. As a result, the web browsing hacking would be stopped completely for all the web
browsers and the business would be saved (Safa, Von Solms & Furnell, 2016).
Document Page
6
INFORMATION SECURITY TECHNOLOGIES
3. Conclusion
Therefore, from the above discussion, a conclusion can be drawn that different
organizations require to be networked for facilitation of communication with the external
businesses. It exposes them to the outside world as well as hacking and hence using the
computers to eventually commit any type of fraudulent activities like privacy invasion, stealing
personal or corporate data and frauds. The e commerce company in Damman might face issues
related to web browser hacking as the customers’ access their website from several web
browsers. This paper has provided details related to process of securing web browsers with
explanation of various types of data being accessed and the best practices to deter hackers for
collection of customers’ data.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7
INFORMATION SECURITY TECHNOLOGIES
References
Baloch, R. (2017). Ethical hacking and penetration testing guide. CRC Press.
Chauhan, S., & Panda, N. K. (2015). Hacking web intelligence: open source intelligence and
web reconnaissance concepts and techniques. Syngress.
Najera-Gutierrez, G., & Ansari, J. A. (2018). Web Penetration Testing with Kali Linux: Explore
the methods and tools of ethical hacking with Kali Linux. Packt Publishing Ltd.
Nakaya, M., Akagi, S., & Tominaga, H. (2016, November). Implementation and trial practices
for hacking competition CTF as introductory educational experience for information
literacy and security learning. In Proceedings of ICIA 2016 (Vol. 5, pp. 57-62).
Safa, N. S., Von Solms, R., & Furnell, S. (2016). Information security policy compliance model
in organizations. computers & security, 56, 70-82.
Soomro, Z. A., Shah, M. H., & Ahmed, J. (2016). Information security management needs more
holistic approach: A literature review. International Journal of Information
Management, 36(2), 215-225.
Williams, J. L. (2018). Automation Is Not Hacking: Why Courts Must Reject Attempts to Use
the CFAA as an Anti Competitive Sword. BUJ Sci. & Tech. L., 24, 416.
chevron_up_icon
1 out of 8
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]