Identify and discuss the five steps in developing an e-commerce security plan. ...[Show More]
4 years ago
The five steps of developing an e-commerce security plan include: 1. Perform a risk assessment – involves looking at the possible risks that the website is exposed to. The vulnerability of the website needs to be tested by professionals for the development of a security policy that can be implemented in many ways. 2. Develop a security policy – this involves the development of the different way in which different security breaches will be dealt with on the e-commerce platform. It is depictive of the significant analysis of the risk assessment and the possible ways of mitigating the identified risks of the e-commerce platform (Schwalbe, 2015). 3. Develop an implementation plan for the security policy – the implementation plan involves the significant mitigation methods for the identified risks and how they can be actualized on the given website or e-commerce platform. This would involve bringing in technical expertise on how to make the security robust and ensure the privacy of user data and activity on the website (Eason, 2014). 4. Create a security organization or department within the organization or business entity _ security of the e-commerce platform is a very significant issue that needs an in-house IT department to take care of. There should be technicians on call to constantly check the security of the e-commerce platform at all times. Their responsibilities will be dedicated to maintaining the security of the e-commerce platform. 5. Perform a deep and detailed security audit – a security audit majorly involves looking at the logs of the transactions and user activity on the website to check for any fraudulent activity that could be jeopardizing the user data or financial transaction data on the e-commerce platform in a way that makes it available to unauthorized parties. PayPal enables mobile payments by linking one’s email address used to create a PayPal account to their physical banking account. In doing so, money can be sent to one’s PayPal email address and transferred to their bank account or vice versa. Furthermore, one can request for payments for services given and use their email address as their PayPal ID or pay for goods which have been delivered, or they have ordered using the available funds on their PayPal account. All of which is done from the PayPal application on their mobile phone (Einav et al., 2014).
By 4 years ago . Marked as helpful (850). Marked as unhelpful (776)
What are the various operations that can be performed on different Data Structures?...
By Antony Pius · 2 years ago
Explain various E-business strategy implementation success factors for Small and Medium Organization...
By Khaled Hkh · 3 years ago
Write short notes on the following. i) Internet ...
By Khaled Hkh · 3 years ago
BigBook, Inc. is a large book distributor with domestic and international distribution channels. The company orders from publishers and distributes...
By Hari · 3 years ago
which clouds are on-premise giving it managers complete control over the available resources?...
By Steve · 3 years ago