E-Commerce Risks Originate From Within the Enterprise

The company's movies are not compatible with this new browser. Estimated time IE

6.0 was released until the company replaced the new movie download software, causing losses of up to 1.2 million USD.

b. Risks from technology and transmission service providers

Nowadays, software errors have become a common phenomenon, even an objective necessity that causes a lot of damage to businesses. However, the damage caused by software errors is not compensated by suppliers. Typically, Microsoft, every new operating system has errors, every new browser has security holes. Microsoft's only action is to apologize to users and promise to fix it as soon as possible. As for the transmission line, it is quite stable in the world now, but the risk still exists, especially in underdeveloped countries like Vietnam.

c. Risks due to intentional actions of individuals

Maybe you are interested!

- Dangerous code

Malicious code includes many different threats such as viruses, worms, trojans, etc.

E-Commerce Risks Originate From Within the Enterprise

These are programmed codes that, due to the user's carelessness or inadvertence, cause viruses to be installed into the system. Once installed into the system, it will destroy and disrupt the entire database of a company or organization (about customers, partners, markets, etc.) stored in the computer or steal confidential information and transfer that information to the person who sent the virus. Viruses spread very quickly, so their impact can spread quickly over a wide area.

Viruses today are increasingly complex in structure and increasingly destructive and serious. This is also one of the biggest threats to the security of e-commerce transactions today. Therefore, companies need to install effective anti-virus software regularly.

Regularly update to protect against new viruses and be extremely careful with strange sources of information sent to you.

- Hackers and malicious programs

Hackers take advantage of weaknesses in the website protection system or take advantage of one of the advantages of the Internet - it is an open, easy-to-use system to attack and destroy the protection systems of websites or computer systems of organizations and governments and find every way to break into those systems. The law considers these acts as crimes. The targets of these types of crimes are very diverse, they can be the data systems of e-commerce websites, or with more dangerous intentions, they can use destructive programs (cybervandalism) to cause incidents, discredit or destroy websites on a global scale.

- Sniffer

This is a type of eavesdropping program that monitors the movement of information on the network. When used for legitimate purposes, it can help detect network weaknesses, but on the contrary, when used for criminal purposes, it will become a major threat and very difficult to detect. Thieves can also be hackers, specializing in stealing valuable information such as email messages, business data of enterprises, confidential reports from anywhere on the network.

Email spying is also a new form of cyber theft. Email spying uses a secret code embedded in an email message that allows someone to monitor all the messages that are forwarded along with the original message. For example, if an employee discovers a technical error in a production line, he immediately sends a report to his superiors informing them of his discovery. Someone using email spying can monitor and learn all the information in the subsequent emails and discuss them.

This problem. And it would be very dangerous if the confidential information within the enterprise was known by bad guys and used for illegal purposes.

- Credit card fraud

Credit cards are one of the first methods of electronic payment. For this payment method, businesses still have to face many potential risks. Businesses need to ensure that sensitive customer information such as credit card numbers are not exploited by their own employees and that unencrypted information is not stored in the hard drive memory. Even when using encryption programs, businesses must be careful when sending credit card numbers to the server because there is a high possibility of information being stolen or used illegally. Sometimes, customers do not understand the company's policy regarding the use of credit card numbers in payment, which can cause unexpected risks.

In e-commerce, credit card fraud is much more diverse and complex than in traditional commerce. The biggest threat in e-commerce is that customers lose information related to their cards or information about card transactions during the transaction process. Files containing customers' credit card data are often attractive targets for hackers when attacking websites. Moreover, criminals can break into e-commerce websites, steal customers' personal information such as name, address, phone number. With this information, they can impersonate customers to establish new credit accounts for dark purposes.

And finally, for sellers, one of the biggest threats that can arise is the denial of international orders. In the event that an international customer places an order and then denies the action, the online seller often has no way of determining that the order was in fact

Whether the goods have been delivered to the customer or not and whether the credit card holder is actually the one who placed the order. This is a fairly prominent crime phenomenon in Vietnam, even the Department of High-Tech Crime Prevention - Ministry of Public Security had to intervene. Because currently, the phenomenon of credit card code theft by Vietnamese hackers is so common that foreign suppliers of goods and services often refuse transactions originating from Vietnam, but pay by credit card.

- Cheat

E-commerce fraud is the use of fake email addresses or impersonation by hackers to carry out illegal activities. Fraud can also involve changing or redirecting web links to a different address than the real one or to a fake website that looks like the real one. These links may lead users to unwanted, irrelevant websites to carry out the hacker's schemes.

Although phishing does not directly compromise data files or network servers, it does threaten the integrity of a website. If hackers redirect customers to a fake website that looks exactly like the one the customer intended to transact with, they can collect order information and place stolen orders that should have been placed by the real website owner. Or, with the intention of damaging the reputation or credibility of a business, hackers can alter the content of orders, such as changing the quantity or name of the items to be purchased, and then send the altered orders to the real website. Of course, when customers receive non-conforming goods, these errors will not be acceptable. And in such cases, the business will be the one to bear all the costs, both the loss of reputation and the entire cost of the order fulfillment process.

Fraudulent activities not only threaten the integrity, but also the authenticity of e-commerce transactions. With their schemes, hackers can make e-commerce transactions become black and white, making it difficult for both businesses and customers to determine what is real and what is fake.

2.2. Risks in E-Commerce originate from within the enterprise

2.2.1. Non-technical risks

a. Risks due to business carelessness

In online transactions, this risk is also often encountered. For example: turning off the computer, turning off the power or clicking the "wrong mouse". Or due to the carelessness of the user when transmitting data, especially numbers through the dot or comma after the numbers. The carelessness of the person transmitting the data can increase or decrease the value of the transmitted number, causing many harmful effects in transactions and sometimes causing huge losses to the business.

b. Risks from attacks from within the enterprise

In business, we often assume that threats to safety come from factors outside the business, but in fact these threats do not only come from the outside but can originate from the members working within the business.

In e-commerce, many e-commerce websites have been destroyed, many businesses have suffered the consequences of service interruption, personal information or credit data of customers being leaked, the culprits are the employees working in the business, people who were once trusted and respected. Employees working in the business can access confidential information, or penetrate anywhere in the organization's information system if the business's information security measures are not implemented.

reckless. And in many cases, the consequences of these types of threats are more serious than attacks from outside the business.

2.2.2. Technical risks

a. Risks due to outdated or faulty technology that the business is using When a business purchases software to serve its production activities,

business but do not test and run the software or even if you do, there is always a risk that the software will disrupt your business, sometimes leading to the worst possible consequences.

On the other hand, working with business partners through e-commerce requires a balance between the capabilities of the business itself and the capabilities of its communication partners. If the business's information technology infrastructure is not compatible, it will create difficulties in conveying information about the business and its products to customers and partners.

b. Risks from the enterprise's security system

The security system of the enterprise itself is an important element in the safety of the entire network system. If this system is weakly and loosely designed, the risks will inevitably become more and more serious. Designing this system is quite expensive, so many companies and organizations ignore it until they are actually attacked.

Above are some of the risks that businesses may encounter in the process of doing business online, however, not all of these risks have the same probability of occurring. Depending on the situation and specific time, there are risks that are often encountered, and there are risks that are less common, so businesses must always pay attention to have reasonable preventive measures, minimizing the damage that may occur.

III. DEVELOPMENT SITUATION OF E-COMMERCE IN THE WORLD

3.1. Overview of the e-commerce situation in the world

As one of the most vibrant fields today, e-commerce is developing rapidly and widely around the world. Looking from highly developed countries, this is the stage of e-commerce racing. The foundation of international e-commerce is the Internet, so it has the ability to cover all computers operating in the world, and modern means of communication (satellites, telecommunications, radio cables, electronic devices). The Internet is developing strongly in terms of coverage, application scope and operational quality. Technical advances in information technology have created means of accessing the Internet at much higher speeds: "Asynchronous Digital Subscriber Line" technology (ADSL), technology using radio to access the Internet via cable (High-definition Television - HDTV), cable systems in countries have been and are being converted into two-way Internet traffic systems using fiber optic cables, with audio decoders, image codes and data transmitted in digital form. Wireless communication means are also integrating into the Internet. According to American experts, the Internet/Web is developing at a very fast pace, and according to Telcordia Technogies' forecast, the world has more than 100,000 new websites every day. Global e-commerce is developing at a very fast pace and attracting the attention of the whole world. Reality has shown that when the Internet was only widely applied in 1995 and with the explosion of the Internet, e-commerce also developed at a faster pace than initially expected. Many market research firms continuously make forecasts, however, the figures given are quickly outdated because they do not anticipate all the development possibilities of e-commerce globally.

It is easy to see that e-commerce not only solves essential and urgent requirements in areas such as commodity trading systems, electronic currency and information security solutions, but its actual operation also creates efficiency and benefits that the traditional trade development model cannot replace. Because of the enormous potential of e-commerce, governments of all countries pay attention to the application and development of e-commerce. Many countries have policies and action plans to promote the development of e-commerce in their countries, in order to seize the opportunities of IT advances, enhance international competitiveness, promote the economic development of the country, and gain a favorable position in the future information society.

E-commerce will continue to grow strongly around the world with increasing transaction value and will develop more and more completely in many different forms in a trend to create a completely new paradigm in the fields of production, business and socio-economic management. E-commerce will be the form of commerce of the new century.

The B2B business method is and will dominate over B2C in global e-commerce transactions. In the B2C method, the general retail type (e-commerce supermarket) although accounting for a small proportion of the total number of online retail stores, holds the majority of B2C transaction value in the virtual market. Combining online retail stores with traditional distribution channels is still the method chosen by many businesses.

3.2. Evaluation of e-commerce development practices in the world.

The situation of e-commerce in the world shows that the path of e-commerce development has been clearly affirmed. To develop e-commerce, each country must have thorough research and preparation based on its own capacity and learn from the experience of the countries that have gone before in developing and applying e-commerce methods.

Comment


Agree Privacy Policy *