Saturday, June 21, 2008

A Review on a post on Internet Security from My E-Commerce

Among those 26 posts about internet security in My E-Commerce, I have chosen the latest post which discuss about malware. It is a shocking news that more than one million viruses, worms and trojans in circulation in year 2007. And according to Symantec report, almost two third of all malicious code threats currently detected were created during 2007. Besides, F-Secure mentioned a doubling increase in the number of malware, and believed this condition getting worse in the future. The main reason of the increase is cyber criminals pump out the malware to fool the anti-virus programs. Besides, vast majority of malware programs are aimed at Windows machine.

These malware programs can copy itself and infect computer, and perform certain program which in fact is carrying a hidden virus and worm. It can be introduced through removable media, internet, network and email. And it is impossible that to isolate these sources in order to avoid getting and spreading computer viruses. If you do so, you will live or doing business just like 10 years ago.

There are few options to protect your computer against computer viruses. First of all, you need good anti-virus software and update the definitions weekly or daily. Then, be aware or put extra suspicion on those emails and attachment you received, scan it before you open it. Besides, scan any CD or removable storage you receive. Furthermore, it is time for you to backup your data. It is easy, cheap and would not cost you a lot of money. Do it now before you regret.

link:

1.http://news.bbc.co.uk/2/hi/technology/7232752.stm) 2.http://ecommerze.blogspot.com/search/label/Internet%20Security) 3.http://en.wikipedia.org/wiki/Malware)

Thursday, June 19, 2008

Threat of online security

Hi, everyone. Welcome to my third blog. Today i will give some information about the threat of online security and the ways to avoid online security threats and online frauds. According to my findings, phishing is one of the most serious online security threats nowadays. Basically, it means an attemptmade by a fraudster, to steal confidential information from innocent victim. In most of the cases, fraudster will create a clone website that looks very similar to the web page of a bank or financial institutions. The victims is asked to click a link on an email which is linked to the clone website created by them. This link allows them to all the confidential information. Once they get all the particular confidential and important information, they will redraw all the victim's money in the banks with ease.



Now, i would like to share some ways to avoid online security threats and online frauds.
1) When you received a fraudulent email informing u that you have won a million dollar lottery prize, please do not fall for this gimmick because this is not true.

2) Make sure you dont click on any unknown websites or links as they may be harmful.

3) Make sure you keep all your confidential information safely.

How to safeguard our personal and financial data



Everyone who uses the computer will mostly keep their personal data and financial data in the computer. This is because many data can be stored inside the computer easily. However, this important data might be stolen by others (hackers) when the person surfs the internet by using the computer. Besides that, anyone can easily get access to the computer and knew the important data if the computer has no any security. This may cause undesirable activities occur such as important data of customer being stolen, personal financial data or code being stolen and personal data being manipulated. Therefore steps should be taken to safeguard all important data.

The first method to safeguard the data is by authentication. By using authentication, a person requires to verify himself in order to get access to a particular database. For example, a smart card is needed in order to access to a database. Thus not everyone is able to access to the database. Other than that, data can be safeguarded by authorization method. We can set a password in order to access a database. So, if there is anyone who wants to access to the database required to type the password set by the user. A password with above 5 characters is necessary to make it difficult for any third party to guess the password.

The third method of securing data is through non-repudiation. It ensures that a party in the dispute cannot refute a transaction that had occurred. This is necessary especially to the business people. Moreover, installing a firewall can also safeguard the computer from being hacked and important data being stolen. There are many firewalls available from the internet and it is free too. However it is advisable to use a subscribe firewall in order to get a better protection over the network. Firewall should be installed if the user will surf the internet quite often.

Above are some ways for safeguarding our important data. It is very essential so that our important data would not leak away. Prevention is better than cure. Therefore it is better to safeguard our data before it is being stolen.
Reference:
Electronic Commerce: From Vision To Fulfillment-Awad, E. M. (2007)
E-Business and E-Commerce Management-Chaffey, D. (2007)

Tuesday, June 17, 2008

The examples of phishing and its prevention methods


Phishing is a con game that scammers use to collect personal information from unsuspecting users by sending out e-mails that appear to come from legitimate websites such as eBay, PayPal, or other banking institutions. The e-mails will ask you to enter your full name, address, phone number, social security number and credit card number.

The examples of phishing schemes include:

  • Fake e-mail messages from what appears to be from a company you do business with warning you that they need to verify your account information or your account will be suspended.

  • A combination of auction fraud and fake escrow sites. This occurs when items are put up for sale at a legitimate online auction to lure you into making payments to a fake escrow site.

  • A false online sales transaction, whereby a phisher offers to buy something from you and requests that they pay you an amount well over the price of the item they are buying. Therefore, you send your bank account number, bank routing code, address and phone number to them.

  • Fake charities asking you for money. Unfortunately, many criminals take advantage of your goodwill.

Steps to prevent from being phished:

  • When it comes to filtering out spam, Gmail is at the top of the line. Google offers infinitely better spam protection than AOL or Yahoo.

  • Never follow links in an email claiming to be from your bank. Ignore these types of emails. Banking institutions never ask you to verify your online banking username and password.

  • The website linked to in the email may ask you to enter your username and password. Do not do this until you have verified you are dealing with your banking institution. Call customer service and ask if this is a common practice.

  • The next step in protection is to install a good Anti-Virus and firewall.

  • Adjust you browser settings to tighten up security especially if you use web based email. If you receive an email with a bad link in it, add the link to your 'Restricted Sites'.

Reference :
http://office.microsoft.com/en-us/outlook/HA011400021033.aspx