Frontiers of electronic commerce
Frontiers of electronic commerce
Internet privacy concerns confirm the case for intervention
Communications of the ACM
Practical network support for IP traceback
Proceedings of the conference on Applications, Technologies, Architectures, and Protocols for Computer Communication
Password security: a case history
Communications of the ACM
The Complete Guide to Internet Security
The Complete Guide to Internet Security
Security Technologies for the World Wide Web
Security Technologies for the World Wide Web
Autonomic Response to Distributed Denial of Service Attacks
RAID '00 Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection
Current security management & Ethical issues of information technology
Safely train security engineers regarding the dangers presented by denial of service attacks
CITC5 '04 Proceedings of the 5th conference on Information technology education
Social engineering: the "Dark Art"
Proceedings of the 1st annual conference on Information security curriculum development
Handbook of Information Security
Handbook of Information Security
Towards a Theory of Insider Threat Assessment
DSN '05 Proceedings of the 2005 International Conference on Dependable Systems and Networks
Digital Crime And Forensic Science in Cyberspace (N/A)
Digital Crime And Forensic Science in Cyberspace (N/A)
The Secure Online Business Handbook: E-Commerce, IT Functionality and Business Continuity
The Secure Online Business Handbook: E-Commerce, IT Functionality and Business Continuity
Inferring internet denial-of-service activity
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Defending against flooding-based distributed denial-of-service attacks: a tutorial
IEEE Communications Magazine
Securing the Internet routing infrastructure
IEEE Communications Magazine
Hi-index | 0.00 |
This paper provides an overview of the electronic attacks or the “digital challenges” which prospective customers of E-Commerce are likely to encounter while carrying out transactions over the web. The paper provides a comprehensive coverage of highly specialized electronic attacks that are on the increase in the electronic environment where SMEs (Small and Medium Enterprises) dealing in E-Commerce carry out their transactions. It is a descriptive account of various threats like client/server security threats as well as cyber identity thefts which have become quite infamous over the years and is invasive and fastest growing crime all around the world especially the U.S. The paper draws on a variety of secondary sources both published and unpublished. Recently the infamous client server attacks like Denial of Service (DoS) especially Distributed Denial of Service attacks made people aware of the importance of providing available data and service securely to users. Cyber security threats like website defacement, phishing, pharming, login attacks etc. have created a distrustful environment while making it very hard for small and medium-sized online service providers(SMEs) to compete with both established online and physically present service providers. It presents a review of literature developed from secondary sources. Cyber security threats are of immense concern to online users indulging in E-Commerce, online service providers, governments, and law enforcement agencies. This paper provides a useful overview of a scenario of cyber security threats in E-Commerce in the SME sector; and, from this summary of the present situation, makes an attempt to enlighten the users about various threats which they can encounter while carrying out their electronic transactions. An analysis of the security threats such as this can also assist an organization in formulating an effective security plan.