Reliability of E-commerce System

4.2 Reliability of E-commerce System

The reliability of e-commerce system is the foundation of e-commerce security, referring to the safe operation of e-commerce system free of malicious attacks. If

a system cannot work properly without any attack from outside, e-commerce security is not worthy of being mentioned. The security problem and reliability problem of the system itself can be divided into several categories.

(1) Data loss caused by absence of backup system. After the traditional commercial transaction is digitalized, information has become the most valuable asset of the enterprise. Any loss of data means the loss of asset. Thus data backup is the first step to do to ensure e-commerce security.

Introduction to E-commerce

(2) Attack caused by virus. Nowadays virus is on the rise and brings more and more harms. The virus could be transmitted through the disks, or via the Internet. Although the virus is not aimed at a particular enterprise or information system, it might cause unstable operation of the system, or great reduction of the system performance, which will also cause great loss to the enterprise.

(3) Error operations. Error operations may be caused by operators who are unfamiliar with the information system; the most harmful operation is the deletion of important data without possibility of restoring it. This kind of mistake causes losses that are similar to that by failure of data backup.

(4) Hardware failure, network or software failure. The hardware and software used in the system cannot be 100% reliable, system failure caused by hardware or software failure can also affect the normal operation of the enterprise.

(5) System breakage caused by accidents. Accidents such as power failure, fire, lightning and earthquakes might cause the system failure.

(6) Insufficient security configuration and system management. These also can cause many problems in the operation of the system, such as improper authorization, which may cause collision within the system and inconsistency of database.

(7) Fundamental security problems of the communication protocols. The communication protocols being used now do not take security issues into consideration, and direct use of the protocols to transmit the confidential information is not secure even though there is no malicious attack.

(8) Other problems. There are some other problems such as application software based on WWW and FTP, and imperfect service programs.

To solve such problems and ensure the security of the network itself, we need to implement corresponding solutions to enforce the security in response to particular problems existing on the network. The following measures can be taken:

(1) Enhance the data backup and recovery by using data storage technologies such as RAID5.

(2) Install anti-virus software to enhance the integral anti-virus mechanism in the intranet.

(3) Enhance the training of the network operators to reduce the errors; control the use and modification of the important data by means of access control and strict authorization mechanism.

(4) Regularly scan on the network to find out possible security loopholes and make timely modification.

(5) Redundancy technology and backup technology are to be used to enhance the system reliability.

(6) Enhance the security of the host by well setting configuration and installing timely patches to reduce loopholes.

(7) Establish necessary physical or logical isolation for sensitive equipments and data.

Apart from technologies listed above, the decisive element of e-commerce security is the human, or the management. There is no security without security

4 Security Technologies in E-commerce

supervisor and security guidelines. For the sake of security, efforts should be made to formulate security strategies and provide the training program for the staff. Multiple measures such as technological, managerial, legal, and economic means should be used to ensure the security of e-commerce systems.

Dokumen yang terkait

AN ALIS IS YU RID IS PUT USAN BE B AS DAL AM P E RKAR A TIND AK P IDA NA P E NY E RTA AN M E L AK U K A N P R AK T IK K E DO K T E RA N YA NG M E N G A K IB ATK AN M ATINYA P AS IE N ( PUT USA N N O MOR: 9 0/PID.B /2011/ PN.MD O)

0 82 16

Anal isi s L e ve l Pe r tanyaan p ad a S oal Ce r ita d alam B u k u T e k s M at e m at ik a Pe n u n jang S MK Pr ogr a m Keahl ian T e k n ologi , Kese h at an , d an Pe r tani an Kelas X T e r b itan E r lan gga B e r d asarkan T ak s on om i S OL O

2 99 16

The Effectiveness of Computer-Assisted Language Learning in Teaching Past Tense to the Tenth Grade Students of SMAN 5 Tangerang Selatan

4 116 138

Modul TK E 2016 150 hlm edit Tina M imas

2 44 165

Membangun aplikasi e-commerce pada Toko Reafshop Bandung

1 26 687

Pengaruh Persepsi Kemudahan dan Kepuasan Wajib Pajak Terhadap Penggunaan E Filling (Survei Pada Wajib Pajak Orang Pribadi Di Kpp Pratama Soreang)

12 68 1

PENGARUH ARUS PENGELASAN TERHADAP KEKUATAN TARIK PADA PENGELASAN BIMETAL (STAINLESS STEEL A 240 Type 304 DAN CARBON STEEL A 516 Grade 70) DENGAN ELEKTRODA E 309-16

10 133 86

Factors Related to Somatosensory Amplification of Patients with Epigas- tric Pain

0 0 15

TEKNIK PERLAKUAN PENDAHULUAN DAN METODE PERKECAMBAHAN UNTUK MEMPERTAHANKAN VIABILITAS BENIH Acacia crassicarpa HASIL PEMULIAAN (Pretreatment Technique and Germination Method to Maintain the Viability of Acacia crassicarpa Improved Seed)

0 1 11

The Risk and Trust Factors in Relation to the Consumer Buying Decision Process Model

0 0 15