M-Commerce Security Case Study

Improved Essays
“M-Commerce Security” by Laurie J. Fundukian Over the past years’ mobile devices and mobile telephones have been used worldwide now. According to L.J.Fundukian (2012), “The emergence of the wireless tablet computer, m-commerce is emerging as a major player in the world of retailing, social networking, and entertainment and the main potential threat from mobile device use is identity theft”. Computers and other mobile devices can be scrutinized by malicious codes for personal information such as name, address, phone number etc. These computer threats are going onto the mobile and wireless networks which can be a major security threat for users. Some of the issues in e-commerce security are: A) Users are not informed of being susceptible to cyber-attacks. B) There is sometimes a lack of device power in that high point internet software application demand speed and memory which is still absent from some …show more content…
Better results can be attained by the follows: A.) Secure mobile devices- the device must be trusted and be safe to accomplish transactions without the anxiety of infection or theft. Maximize authentication measures by using private keys and digital certificates. Enforce biometric security verification can be significant to protect devices. Next, having more efficient CPUs can be a progress to enable encryption technology in computers to be used on mobile devices. Also, having an updated operating system with proper security features can be effective. B.) Secure users- Users enlightenment should be maximized on the concerns of advanced attempts in progress to contravene their device

Related Documents

  • Improved Essays

    Nt1310 Unit 3 Term Paper

    • 621 Words
    • 3 Pages

    Security Ecommerce site Phishing, “brand spoofing” or “carding”, is not a “pass-time” process but is a business-like on which organized crime groups extensively use and make a big deal of money. Phishing, being one of the most security challenges, is a hacking technique of malicious and fraudulent mass mailing, masquerade as emails from government agencies, business partners or even company executives using modern way such as social media, phone calls and any other communications to get access to usernames and passwords, credit cards or other sensitive information to steal valuable data. According to Anti-Phishing Working Group (APWG), an increase of 86% of phishing attacks in companies from 2013 to 2015 has been analyzed (source: Forbes).…

    • 621 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 2 Journal

    • 457 Words
    • 2 Pages

    1. Title of Article: Keep Your Phone Safe: How to Protect yourself from wireless threats 2. Authors: N/A 3. Source: http://www.consumerreports.org/cro/magazine/2013/06/keep-your-phone-safe/index.htm 4. Year of Publication: 2013 5.…

    • 457 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 9 Final Paper

    • 586 Words
    • 3 Pages

    Internet Usage The possibility of being attacked by a hacker of any kind is very real. This understanding is why an organization should limit the availability of Internet websites across the board. In doing so this helps mitigate potential threats from malicious software and users from stealing valuable data that belongs to the…

    • 586 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Nt2580 Unit 7

    • 395 Words
    • 2 Pages

    Written Assignment – Unit 7- Ecommerce ________________________________________ Submit a written paper which is at least two pages in length, double spaced in Times New Roman (or its equivalent) font which is no greater than 12 points in size. After referring to Chapter 3 of Information Security for Non-Technical Managers, discuss the three main areas of accountability regarding information security. When discussing each area, provide an example from outside the textbook. Information security is about all that an organization can involve in, it comprises the data stored by the security center whether in an electronic machine or in a vast area room.…

    • 395 Words
    • 2 Pages
    Decent Essays
  • Great Essays

    Task 1 guidance E-commerce technologies Describe and define the technologies required for e-commerce including the following (P1):- Hardware • Web servers: A server where the entire website is hosted from. This is useful in an e-commerce sense as it manages connections to the site and checks account information against its database. • Download speeds: The speed in which data is sent and received from the internet from specific nodes or user computers. Download speed is important so that the processors can send and receive information quickly.…

    • 1299 Words
    • 6 Pages
    Great Essays
  • Great Essays

    The online bank resources might be misused as accessing unauthorized data from the database like the credit card information or password. To install malicious software into user’s computer and theft personal data files or make data alteration on purpose. The hack may also use the information to spread SCAM, SPAM, malicious code (Hau, 2003; Clarke, 2016). To protect such a huge number of user’s information, eBay has its own control processes which prevent third parties from tampering feedback. The safe harbor rule is required to avoid the fraud.…

    • 1001 Words
    • 5 Pages
    Great Essays
  • Decent Essays

    Macy's Research Paper

    • 141 Words
    • 1 Pages

    Data breach has been rising in the United States and in other countries as well, leaving customers vulnerable to identity theft. Customers also can get their credit history damaged. Thousands of people are affected by this situation more frequently when they make their purchases online as well as in the stores when using credit cards. Since the use of credit cards is the most convenient way to pay for a purchase for customers, scammers take advantage of it to commit their frauds.…

    • 141 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    4. Protect your cellular devices. You have a more improved identity robber protection if you protected your cellular devices. You can do this by using anti-spyware or anti-virus software.…

    • 694 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    • Cyber-attacks are possible because of internet connectivity. • There is a high chance of market pressure and…

    • 1082 Words
    • 5 Pages
    Great Essays
  • Decent Essays

    P3: Explain the potential risks to an organization of committing to an e-commerce system Risks 1. Hacking In computer interacting, hacking is any technical effort to operate the normal performance of network links and connected systems. A hacker is any person engaged in hacking. Today, however, hacking and hackers are most commonly associated with malicious programming attacks on the Internet and other networks.…

    • 1208 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    Bipolar Disorder Analysis

    • 193 Words
    • 1 Pages

    Bipolar Disorder is a well-known disease that occurs according to a person’s mood from high to low. The mood swings happen at constant intervals depending on the fluctuating levels of the person’s energy and sleep. “One person in every 100 people have Bipolar Disorder” (Mental Health website). In this essay, I will be focusing on proposed idea related to e-Health that monitors the app usage of a Bipolar Disorder sufferer to determine their mood. The intension of the idea is to help improve the health and well-being of the patients who suffer from the depressive episodes.…

    • 193 Words
    • 1 Pages
    Decent Essays
  • Superior Essays

    BYOD Research Paper

    • 1172 Words
    • 5 Pages

    Bring Your Own Device (BYOD) David L. Haywood CIS 333 – Networking Security Fundamentals Professor Arend Clayborn Strayer University 25 January 2015 Bring Your Own Device (BYOD) Within this paper I will attempt to give a clear picture of this new concept of Bring Your Own Device (BYOD) is about. I’ll do this by compartmentalizing several areas that will be discussed to ensure clarity and understanding of the information I am presenting. The first area of discussion focuses on the meaning of this new concept of BYOD along with identifying the primary benefits of BYOD in organizations, and determining the key ways in which its concepts can enhance an end user’s overall working experience. Next, I’ll make an attempt to analyze in detail…

    • 1172 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Introduction of the Canadian Mobile Industry Nowadays, mobiles become the necessity of peoples’ daily life. People keep their cell phone with them wherever they go and whatever they are doing. People communicate with each other on phone with SMS, mobile applications or through social media platforms when they are on the go.…

    • 532 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Name Teacher Class Date Android vs. iPhone As a teenager, it is exciting to have a new cell phone. Parents are pestered by their children to have a phone to show off to their friends.…

    • 1555 Words
    • 7 Pages
    Improved Essays
  • Superior Essays

    Over the course of human history, we have always done business of one kind or another. From transactions in the market, to transactions in the stock exchange; business is everywhere. Business is simply the means of exchange, between two or more people. The only thing that is changed about business is how we communicate with others: the tools we use to control these same transactions. In the past we have had various ways to communicate, such as: in person conversations, letters, telegrams, telephones, email, etc.…

    • 1125 Words
    • 5 Pages
    Superior Essays