E-Commerce Applications: Vulnerabilities, Attacks and Countermeasures 

Abstract

The extensive use of e-commerce creates new ways for both image and brands to be attacked. Attackers using various gimmicks and techniques to find various loopholes in the system. While there has been good ways to identify threats, educating customers and identifying countermeasures. Attacks on customer sensitive information has the adverse effect of decreasing the consumer faith on online transactions, which happens in e-commerce. Prevention is better than cure, good knowledge and understanding of the online threats can be used as a tool to avoid online attacks. 

Authors and Affiliations

P. S. Lokhande , B. B. Meshram

Keywords

Related Articles

A Java Applet Based Tool for Histogram Equalization and Edge Detection 

Edge detection is a fundamentally important operation in image processing. It is the foundation of feature extraction and image information interpretation. It gives a description of the curvature of objects in an...

Performance Analysis of IIR Digital Band Stop Filter

IIR Band-stop filter is recursive in nature i.e. the present output sample depends on the past input sample, past output samples and the present input samples. If the past and present inputs and output are varied the...

Techniques for Object Recognition in Images and Multi-Object Detection  

— The modern world is enclosed with gigantic masses of digital visual information. Increase in the images has urged for the development of robust and efficient object recognition techniques. Most work reported in t...

Energy Efficient operation in Switched Reluctance Motor by Controlling the Voltage  

This paper introduces a new method for reducing the cost of the power electronic components in Switched Reluctance Motor (SRM). A new control circuit has been designed to improve the performance and efficiency of...

A Customized Ontological-Based Web Information Collection Model  

It is known that Ontologies can be used to describe and formalize knowledge to represent user profiles in personalized web information collection. Though, there are many models adopted to represent user profiles ei...

Download PDF file
  • EP ID EP162035
  • DOI -
  • Views 118
  • Downloads 0

How To Cite

P. S. Lokhande, B. B. Meshram (2013). E-Commerce Applications: Vulnerabilities, Attacks and Countermeasures . International Journal of Advanced Research in Computer Engineering & Technology(IJARCET), 2(2), 499-509. https://europub.co.uk/articles/-A-162035