Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Electronic business
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
===Security solutions=== When it comes to security solutions, sustainable electronic business requires support for data integrity, strong authentication, and [[privacy]]. Numerous things can be done in order to protect our E-Business. Starting off with basic things like switch to HTTPS from old outdated HTTP protocol which is more vulnerable to attacks. Furthermore, the other things that require full attention are securing servers and admin panels, payment gateway security, antivirus and anti-malware software, using firewalls is also a must, regular updates, and back up our data. ====Access and data integrity==== There are several different ways to prevent access to the data that is kept online. One way is to use anti-virus software. This is something that most people use to protect their networks regardless of the data they have. '''E-businesses''' should use this because they can then be sure that the information sent and received to their system is clean.<ref name="canada" /> A second way to protect the data is to use firewalls and network protection. A firewall is used to restrict access to private networks, as well as public networks that a company may use. The firewall also has the ability to log attempts into the network and provide warnings as it is happening. They are very beneficial to keep third parties out of the network. Businesses that use Wi-Fi need to consider different forms of protection because these networks are easier for someone to access. They should look into protected access, virtual private networks, or internet protocol security.<ref name="canada" /> Another option they have is an intrusion detection system. This system alerts when there are possible intrusions. Some companies set up traps or "hot spots" to attract people and are then able to know when someone is trying to hack into that area.<ref name="canada" /> ====Encryption==== [[Encryption]], which is actually a part of cryptography, involves transforming texts or messages into a code that is unreadable. These messages have to be decrypted in order to be understandable or usable for someone. There is a key that identifies the data to a certain person or company. With public-key encryption, there are actually two keys used. One is public and one is private. The public one is used for encryption and the private one for decryption. The level of the actual encryption can be adjusted and should be based on the information. The key can be just a simple slide of letters or a completely random mix-up of letters. This is relatively easy to implement because there is software that a company can purchase. A company needs to be sure that its keys are registered with a certificate authority.<ref name="canada" /> ====Digital certificates==== The point of a [[digital certificate]] is to identify the owner of a document. This way the receiver knows that it is an authentic document. Companies can use these certificates in several different ways. They can be used as a replacement for user names and passwords. Each employee can be given these to access the documents that they need from wherever they are. These certificates also use encryption. They are a little more complicated than normal encryption, however. They actually used important information within the code. They do this in order to assure the authenticity of the documents as well as confidentiality and data integrity which always accompany encryption.<ref name="canada" /> Digital certificates are not commonly used because they are confusing for people to implement. There can be complications when using different browsers, which means they need to use multiple certificates. The process is being adjusted so that it is easier to use.<ref name="canada" /> ====Digital signatures==== A final way to secure information online would be to use a [[digital signature]]. If a document has a digital signature on it, no one else is able to edit the information without being detected. That way if it is edited, it may be adjusted for reliability after the fact. In order to use a digital signature, one must use a combination of cryptography and a message digest. A message digest is used to give the document a unique value. That value is then encrypted with the sender's private key.<ref name="canada" />
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)