blog




  • Essay / B2C Website Security - 2555

    SummaryIn this report, the author strives to present how security issues commonly presented on B2C websites can be ensured through technical controls and customer education . The report presents end-to-end security component levels which include: physical system security, operating system security, and network security. With the advent of web applications which are now widely used for deploying e-commerce applications, the author also presented the web security threat profile of web services, which is currently an active research topic. All components discussed come with tips that can be provided to customers that may not be apparent to them, but can help reduce security concerns. Keywords: B2C website security issues, technical controls, customer trainingTable of contentsSummary 2Table of contents 31 Introduction 42 levels of end-to-end security components 42.1 Physical security of the system 42.1.1 Server-side aspects 42.1.2 Side aspects customer 52.2 Operating system security 52.3 Network security 62.4 Web application/service security 83 Conclusions 104 References and bibliography 11How web security B2C sites can be ensured through technical controls and customer education1 IntroductionThe The main objective of Business to Consumer (B2C) websites is to attract traffic/consumers in such a way that the virtual storefront is available to the potential consumer 24 hours a day and all year round. Increased traffic to B2C websites means increased revenue and a "pull" membership model for consumers, in which they "pull" and stay engaged in different types of activities on the websites (Sarner, 2009). With the advent of these virtual storefronts and the increase in audience, the security model used for... middle of paper ...... ends with client-side validation as well as message validation received from the server side.3 ConclusionsIn this report the author presented different levels of end-to-end security on B2C website. The number of security threats has been informed along with the recommended technical controls that can be put in place in order to provide countermeasures against web security threats on B2C websites. In addition, client-side measures have also been informed, which can be easily monitored and configured by the client in order to protect themselves when using the B2C website. Finally, the author would like to add that security issues arise and clearly pose a threat, but by performing security threat analysis and regularly informing customers about changes to the website and additional protection features, trust in B2C website purchases can be sustained and ultimately generate revenue..