With the rapid growth in the Internet, cybersecurity has become a major concern to organizations throughout the world. The fact that the information and tools & technologies needed to penetrate the security of corporate organization networks are widely available has increased that security concern. Some of the important security technologies used in the cybersecurity are described below-
Firewall
Firewall is
a computer network security system designed to prevent unauthorized access to
or from a private network. It can be implemented as hardware, software, or a combination of
both. Firewalls are used to prevent unauthorized Internet users from accessing
private networks connected to the Internet.
VPNs
A VPN stands for virtual private network. It is a technology which creates a safe and an encrypted connection on the Internet from a device to a network. This type of connection helps to ensure our sensitive data is transmitted safely. It prevents our connection from eavesdropping on the network traffic and allows the user to access a private network securely.
This technology is widely used in the corporate environments.
A VPN works same as firewall like firewall protects data local to a device wherever VPNs protects data online. To ensure safe communication on the internet, data travel through secure tunnels and VPNs user used an authentication method to gain access over the VPNs server.
Intrusion
Detection System (IDS)
An IDS is a security system which monitors the computer
systems and network traffic. It analyses that traffic for possible hostile
attacks originating from the outsider and also for system misuse or attacks
originating from the insider. A firewall does a job of filtering the incoming
traffic from the internet, the IDS in a similar way compliments the firewall
security. Like, the firewall protects an organization sensitive data from
malicious attacks over the Internet, the Intrusion detection system alerts the
system administrator in the case when someone tries to break in the firewall
security and tries to have access on any network in the trusted side.
Access
Control
Access control is a process of selecting restrictive access
to a system. It is a concept in security to minimize the risk of unauthorized
access to the business or organization. In this, users are granted access
permission and certain privileges to a system and resources. Here, users must
provide the credential to be granted access to a system. These credentials come
in many forms such as password, keycard, the biometric reading, etc. Access
control ensures security technology and access control policies to protect
confidential information like customer data. The access control can be
categories into two types-
·
Physical
access control
· Logical access control
Physical
Access Control- This
type of access control limits access to buildings, rooms, campuses, and
physical IT assets.
Logical
access control- This
type of access control limits connection to computer networks, system files,
and data.
Threat to
E-Commerce
E-Commerce refers to the activity of buying and selling things over the internet. Simply, it refers to the commercial transactions which are conducted online. E-commerce can be drawn processing, electronic funds transfer, supply chain management, electronic data interchange on many technologies such as mobile commerce, Internet marketing, online transaction processing, electronic frauds transfer, supply chain management, electronic data interchange (EDI), inventory management systems, and automated data collection systems. The most common security threats are an electronic payments system, e-cash, data misuse, credit/debit card frauds etc.
Electronic
payments system:
The electronic payment systems have a very important role in
e-commerce. E-commerce organizations use electronic payment systems that refer
to paperless monetary transactions. It revolutionized the business processing by
reducing paperwork, transaction costs and labor cost. E-commerce processing is
user-friendly and less time consuming than manual processing. Electronic
commerce helps a business organization expand its market reach expansion. There
is a certain risk with the electronic payments system.
The Risk
of Fraud
An electronic payment system has a huge risk of fraud. The
computing devices use an identity of the person for authorizing a payment such
as passwords and security questions. These authentications are not full proof in
determining the identity of a person. If the password and the answers to the
security questions are matched, the system doesn't care who is on the other
side.
The Risk
of Tax Evasion
The Internal Revenue Service law requires that every business
declare their financial transactions and provide paper records so that tax
compliance can be verified. The problem with electronic systems is that they
don't provide cleanly into this paradigm. It makes the process of tax collection
very frustrating for the Internal Revenue Service. It is at the business's
choice to disclose payments received or made via electronic payment systems.
The IRS has no way to know that it is telling the truth or not that makes it
easy to evade taxation.
The Risk
of Payment Conflicts
In electronic payment systems, the payments are handled by an
automated electronic system, not by humans. The system is prone to errors when
it handles large amounts of payments on frequent basis with more than one recipients
involved. It is essential to continually check our pay slip after every pay
period ends in order to ensure everything makes sense. If it is a failure to do
this, may result in conflicts of payment caused by technical glitches
and anomalies.