Sunday, March 10, 2019
Grandmaââ¬â¢s Treats E-Commerce Security Options Essay
thither are some(prenominal) advantages and separates to providing an overly batten surround for e-commerce. The biggest advantage is consumer and crinkle privacy. grandmothers Treats needs to provide a secure environment so that unauthorized drug pulmonary tuberculosisrs are un open to see details of the consumers transactions, and purchases in particular. In this musical mode consumers using Grandmas Treats website pass on know they can make multiple purchases using their stored info and oblige a sense of security regarding their transactions.To procure this privacy for the consumer, encryption computer software installed on the server is necessary. A further advantage to a secure environment is consumer trust. When customers decide to make a purchase using their account statement with a password, they can trust that the security standards of the partnership are up to par with other, larger organizations. This type of secure environment would work outmatch at servin g the needs of wholesale and corporate accounts.A damage of providing an overly secure e-commerce environment is if the company decides to use public paint infrastructure, or PKI (Brayton, Finneman, Turajski, Wiltsey, 2006). In this instance, Grandmas Treats would only be able to transmit a small amount of information. A second disadvantage to this overly secure environment is if Grandmas Treats requires a user to log in to view its saturnineerings, it may be considered an annoyance and a hindrance to purchasing. A final disadvantage is that this technology tends to slow use up customer service. The time required to check out the online shopping haul will necessitate verification, which will make the purchasing process longer. Should this spud too long, a customer may decide to log off and leave the website without finalizing a purchase.There are also advantages and disadvantages to providing an open, insecure e-commerce environment. about advantages of setting up an open, in secure environment are quick seek of products, easy navigation of the website, and the inexpensive cost of implementing it. To browse through the website of Grandmas Treats, a customer wouldnt first have to login and use a password. Consumers will also have the option of browsing through the offered products with ease. Providing an open, insecure environment is also an inexpensive option. The company will non need any specialized hardware or software to ensure security in its e-commerce environment.There are several disadvantages of setting up an open, insecure environment as well. The threat of hackers breaking into the server, and malware infecting the site, are devil disadvantages of not providing proper security (CNET News.com Staff, 2008). An experienced hacker could easily take access to customer information, financial transactions, and any other important information stored on the server. A variety of malware could cause a major occupation for Grandmas Treats and its web site with the potential outcome of a system split or possible infection of customers computers. While the damage could most likely be reversed, it would take time to repair and create distrust with the companys customers.In light of these advantages and disadvantages as discussed, it is recommended that Grandmas Treats employs a more middle of the road option. For certain purposes, such as reservation a purchase online, there should be security measures in place, such as requiring a customer to create an account and log in with a password. However, there should also be a selection of foregoing end pages which are easily accessible to anyone browsing products. In this way Grandmas Treats can best serve the needs of both valued customers and casual web browsers.ReferencesBrayton, J., Finneman, A., Turajski, N., Wiltsey, S., (October 10, 2006). What is PKI? Retrieved March 4, 2008, from the TechTarget weathervanesite http//searchsecurity.techtarget.com/sDefinition/0,,sid14_gci2142 99,00.htmlCNET News.com Staff (February 11, 2008). Security Bites Podcast Nonpersistent Web Threats. Retrieved March 4, 2008 from the CNET News.com Website http//www.news.com/Security-Bites-Podcast-Nonpersistent-Web-threats/2324-12640_3-6230144.html?tag=item.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment