Page 377 - IT 402 v2.0 class 10
P. 377

computer, network connection, website’s server, etc. The following picture shows how the hacker can target
            to exploit the information:



























            In e-Commerce, the customer must take precautions to secure the transactions. The security of the transaction
            in e- ommerce means adherence to:
               onfidentialit :  llowing only the authorised person who can access the information so:
                    customer s identification must be verified as he logs on to his account.
                   Steps should be taken to prevent illegal access of computer by unauthorised users who can change the
                 data or information of an organization.

              Deliverance: Ensuring that a correspondence duly reaches the proper destination in a transaction and an
              acknowledgment should be gathered from the destination end.
              Integrity: Ensuring that the data which is actual or which is originally sent by the sender, remains the same
              when it reaches to the recipient s end so that the data is kept confidential in order to hide the information
              and ensure that the information is invulnerable to snooping or tampering.
               he following precautions must be taken to safeguard online transaction through e- ommerce:

              Firewall: Firewall  like moat  must be installed in the server or workstations. It protects the system from
              unauthorised  access and  ensures that  requests for transaction  intrude  to  a system from authorised
              workstation only.
              Password: Passwords must be used to protect against crackers. The identity of the user must be protected
              in passwords  while doing transaction his identity can be verified with the password.  he password must be
              of at least eight characters and it should include some numeric with special characters.

              Secure Socket Layer (SSL): SS  is a protocol that encrypts data between client and the server  when
              information in SS  is protected then transaction is sent  the browser identifies it as protected or trustworthy
              and accordingly it processes the transaction accordingly.
              Secure  Socket   ayer   SS    protocol  should  be  used  to  protect  information  flowing  between  the  client
              and the e- ommerce website.  he SS  certificate is issued to the server by a certificate authority that is
              authorised by the government.
              If a page is protected by SS   its     will begin with https:   rather than http:   or a closed padlock symbol
              will appear in the browser's status bar.





                                                                                         Web Application       375
   372   373   374   375   376   377   378   379   380   381   382