Skip to Main Content
Cyber Security in Parallel and Distributed Computing
book

Cyber Security in Parallel and Distributed Computing

by Dac-Nhuong Le, Raghvendra Kumar, Brojo Kishore Mishra, Jyotir Moy Chatterjee, Manju Khari
April 2019
Intermediate to advanced content levelIntermediate to advanced
294 pages
9h 31m
English
Wiley-Scrivener
Content preview from Cyber Security in Parallel and Distributed Computing

Chapter 4e-Commerce Security: Threats, Issues, and Methods

Prerna Sharma, Deepak Gupta, Ashish Khanna

Maharaja Agrasen Institute of Technology, New Delhi, India

Email: prernasharma@mait.ac.in, deepakgupta@mait.ac.in, ashishkhanna@mait.ac.in

Abstract

In the era of the demonetization and promotion of a cashless economy, ecommerce has taken center stage. An amalgam of fast internet and advanced processors is acting as a catalyst in the development of multiple e-commerce applications and their usability. Credit for the popularity of e-commerce also goes to the convenience provided by seller and buyer transactions from anywhere at any time. Furthermore, scalable high-speed transactions with lower operating costs have led to e-commerce acceptability worldwide, thus helping to expand businesses and promoting a new form of economy via e-commerce. However, traditional practitioners of business are going to leave no stone unturned to stop this flood of e-commerce transactions in the shadow of secure and authentic transactions. Therefore, in order to create a fearless environment for buying and selling over the internet, highly secure, reliable, and authentic e-commerce applications are needed. The above discussion demonstrates the importance of security for the successful implementation of e-commerce. This chapter explains the issues and problems associated with the security of worldly goods and transactions in e-commerce components and activities. Since a large amount of public money ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures

Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures

Peter Thermos, Ari Takanen

Publisher Resources

ISBN: 9781119488057Purchase book