E-Commerce Applications: Vulnerabilities, Attacks and Countermeasures 

Abstract

The extensive use of e-commerce creates new ways for both image and brands to be attacked. Attackers using various gimmicks and techniques to find various loopholes in the system. While there has been good ways to identify threats, educating customers and identifying countermeasures. Attacks on customer sensitive information has the adverse effect of decreasing the consumer faith on online transactions, which happens in e-commerce. Prevention is better than cure, good knowledge and understanding of the online threats can be used as a tool to avoid online attacks. 

Authors and Affiliations

P. S. Lokhande , B. B. Meshram

Keywords

Related Articles

A Review of Soft Computing Advance in Genetics & Laser Biomedical Instrumentation  

Soft computing refers to a collection of computational techniques in computer science, artificial intelligence, machine learning, medical instrumentation which attempt to study, model and analyze very complex p...

SECURITY CONCERNS IN MEDIUM SIZE ENTERPRISE CLOUD COMPUTING

Cloud computing in an small size enterprise infrastructure bring significant security concerns. Successful implementation of cloud computing in a small size enterprise requires proper planning and understanding of emergi...

Energy Renewal Approach in Wireless Sensor Network 

Wireless sensor networks (WSN) monitor the environmental conditions that can be used for various applications. They are often encumbered with limited battery energy. Thus, the network lifetime is widely regarded...

Maximizing The Lifetime Of Wireless Sensor Node  

Sensor nodes have limited lifetime batteries due to high energy consumption. Energy conservation and Coverage are two major problems in wireless sensor networks. The objective of this paper is to minimize the ene...

Improvement of the SARA strategies for MANET model 

Wireless ad-hoc networks are autonomous systems composed of mobile hosts that are free to move around arbitrarily. Routing is difficult in MANET’s since mobility may cause radio links to break frequently. When any...

Download PDF file
  • EP ID EP162035
  • DOI -
  • Views 113
  • Downloads 0

How To Cite

P. S. Lokhande, B. B. Meshram (2013). E-Commerce Applications: Vulnerabilities, Attacks and Countermeasures . International Journal of Advanced Research in Computer Engineering & Technology(IJARCET), 2(2), 499-509. https://europub.co.uk/articles/-A-162035