Monday, October 7, 2019

E-business Essay Example | Topics and Well Written Essays - 1000 words - 1

E-business - Essay Example Any form of internet based service comes with security issues. Anything online is accessible to every part of the world with an internet connection. Frauds do happen and can be hard to track immediately. This is one of the main factors which deter some people from using online banking. Users who are new to managing online accounts or are not familiar with the risks involved can be tricked pretty easily. Hackers are always on the prowl for that careless internet user to steal information from. The advances in technology over the years have developed several forms of security features. However an equivalent number of hacking techniques have shown up as well. Emails are the easiest way to access users and ask them for their account information, while posing as banking personnel. This is termed as phishing and works pretty easily on those who are not aware of it. History has shown hackers to break into different kinds of confidential accounts. The security of online banking websites does fall short in this regard. However it is decent enough to provide a certain standard of protection if the user takes some personal measures as well. Every online account is password protected. Users should be encouraged to choose passwords which are complex enough. Using combinations of characters should be enforced while passwords with obvious words should be rejected completely. Using more the one password for each transaction, application of digital signatures for authentication and a combination of both are some techniques that are being used nowadays. A basic research on the bank’s web based security features will reveal how safe your money is. If their website does not have an SSL security built into every page, or allows an easy access to your personal information without multiple stages of authentication or has an option for easy password access, it is better to use traditional banking methods. The legitimacy of all operations co-ordinated by

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.