Need an research paper on e- commerce security. Needs to be 2 pages. Please no plagiarism.
The policy of ensuring that every employee in the organization has a key pass will help secure the organization’s assets such as computers as the organization works through the internet. In case of any mishap, the information technology specialists in the organization just have to review the latest people to access the place in question. This is a short-term goal as the keys can be created from inside the organization A long-term goal that can be set for the organization in terms of security is ensuring that it creates firewalls.
These are very important in an effort to save the files that are located in the computers through the continuing commercial activities. Firewalls are important in that they assist in the prevention of hackers. In the contemporary world, hacking has become one of the widely recognized activities in the field of Information technology. E-commerce involves the trading of commodities online, there are people who may hack and alter the system to some form such as it would seem as they have paid money for a commodity, hence go ahead, and claim it.
This form of hacking is bound to be curtailed by the installation of firewalls.The installation of a diverse and complex backup system is very influential. This is one of the policies that should be put as a long-term aspiration. Back-up systems are influential in that they assist in the recovery of files in case of a crash of systems due to some of the contemporary issues that may arise such as a sweep of the system by some form of Electromagnetic wave (Newman, 2009). Another issue noted in the field of commerce is the increased number of players.
With an increased number of players, one of the increasing concepts is competition. This is because each one of the companies tries their best to please their customer by either quality improvement or any other associated means. The improved security system of backup will assist the company saves the files from scavengers who may be out to commit serious crimes such as destroying files for the company. This is due to bad blood brought about by jealousy. This could lead to the rival company trying to destroy the files of the company or creating an override that would lead to automatic destruction and deletion of files or in a more timid manner though still destructive, disorganization of the trading commodities.
A short-term security plan that the organization may opt to implement is the introduction of master passwords for each of the trading networks and machines for each of the workers. This is because failure to this may have poor interpersonal competition leading to intentional disabling of a fellow worker’s network.