Protecting Client Computer in E-commerce

Protecting Client Computer:- Client computers must be protected from threats. Active contents can be one of the most serious threats to client computers.

Another threat to client computers is a malevolent server site masquerading as a legitimate web site. Threats can hide in Web pages, downloaded graphics, and plug-ins, E-mail attachments etc.

Anyone can read and interpret cookie data. Cookies contain private information that can include credit card data, passwords, and login information. It does not harm client machines directly but potentially could still cause damage.

Protecting Client Computer are protected using:

  1. Digital certificates
  2. Browser protection
  3. Antivirus software
  4. Computer forensics expert
  5. Privacy

 

  1. Digital certificates:-

“A digital certificate is an encrypted and password-protected file that contains sufficient information to authenticate and prove a person’s or organization’s identity.”

Usually, a digital certificate contains the following information:

  • The certificate holder’s name, address, and email address.
  • A key that “unlocks” the digital certificate, thereby verifying the certificate’s authenticity.
  • The certificate’s expiration date or validity period.
  • Verification from a trusted third party called a Certificate Authority (CA), that authenticates the certificate holder’s identity and issues the digital certificate.

Thus:

  • Digital certificates provide assurance to clients and servers that the participant is authenticated.
  • A digital certificate is an electronic equivalent of an identification card.
  • A digital certificate verifies that a user or web site is who it claims to be.
  • The digital certificate contains a means for sending an encrypted message to the entity that sent the original Web page or e-mail message.
  • A web site’s digital certificate is a shopper’s assurance that web site is the real store.
  1. Browser protection:-

Netscape Navigator and Microsoft Internet Explorer browsers are equipped to allow the user to monitor active content before allowing it to download.

In other words, when a user downloads web page and runs programs that are embedded in them, browsers give the user a chance to confirm that the programs are from a known and trusted source.

  1. Antivirus software:-

A virus is software that attaches itself to another program and can cause damage when the host program is activated. A worm is a type of varies that replicates itself on the computers that it infects.

Worms can spread quickly through the internet. A macro virus is a type of virus that is coded as a small program, called a macro, and is embedded in a file. One of the most likely places to find a virus is an electronic mail attachment.

Antivirus software is a defense strategy. Application service providers (ASPs), such as Critical Path and Message Click supply e-mail services to companies to eliminate e-mail virus problems.

  1. Computer forensics expert:-

A computer forensics expert is an individual hired to access client computers to locate information that can be used in legal proceedings.

The field of computer forensics is for the collection, preservation, and analysis of computer-related evidence in order to prosecute the individuals that carried out the crime.

Computer forensics experts protect client computers from e-mail viruses by disabling these electronic mails.

  1. Privacy:-

The privacy problem exists because of the existence of cookies. Cookies contain private information that can include credit card data, passwords, and login information. The best way to protect your privacy is to disable cookies entirely.

 

Also Read:-

What do you mean by e-commerce?

Why is e-commerce important? 

What are the functions of e-commerce?

Advantages and Disadvantages of E-commerce