E-Commerce Security Protocols

Kambovski, Igor (2020) E-Commerce Security Protocols. Knowledge - International Journal, Scientific Papers, 43 (1). pp. 193-199. ISSN 2545-4439

[thumbnail of Igor Kambovski.pdf]
Preview
Text
Igor Kambovski.pdf

Download (438kB) | Preview

Abstract

Information technology is the fastest growing technology in the world. Countries that can not keep up
with the pace of implementation of this technology are increasingly moving away from countries in the developed
world and the gap between them is widening. With the relentless expansion of the Internet, all countries are
increasingly introducing information technology in all areas of work and living. Globalization as an unstoppable
process is perhaps most felt in commerce, especially Electronic commerce. E-commerce breaks down all boundaries
and barriers. The terms "near" and "far" are lost in the virtual world of the Internet. Anyone who produces
something through E-commerce can offer their product to millions and billions of potential buyers around the world.
The term global market is becoming a reality. Also, banking in the world is experiencing a revival and has entered a
new era with the advent of electronic banking. E-banks are already a reality today, they work 24 hours a day, 7 days
a week. They are not crowded at the counters that do not really exist and they are ready to receive your payment
order at any time. In an increasingly dynamic way of working and living, fast and reliable communication is the key
to success. Electronic communication is becoming part of our daily lives. Electronic operation through modern and
widely available information and telecommunication technology increases the efficiency and security of
communications between entities in payments and in legal acts. The use of electronic technology enables the receipt,
sending and storage of data in electronic form, as well as the creation of an electronic signature whose use in
payment operations and transactions between other legal entities in payment operations becomes a necessary need.
Due to all this, as well as for many other reasons, there is a need to check the authenticity and verification of
electronic data, messages and texts. With proper application of security systems and protocols, everyday risks that
are an integral part of E-commerce and online communications and transactions can be avoided. In terms of Ecommerce, special attention is paid to the protection of confidential and personal data, which are the target of illegal
activities of hackers who do it mostly for dishonest earnings, trading with them, but also for prestige and fame. For effective protection against such unauthorized access and use of information and data, E-commerce entities use
cryptography as a data processing technique. Every system in which data is stored and processed belongs to the group of endangered systems and needs protection. In general, any person, object or event that could potentially endanger the data security in the system can be considered a threat. Therefore, these threats should be identified and prevented, and if they have already occurred, procedures should be implemented to eliminate them and minimize the damage.

Item Type: Article
Subjects: Social Sciences > Law
Divisions: Faculty of Law
Depositing User: Igor Kambovski
Date Deposited: 29 Jan 2021 09:51
Last Modified: 29 Jan 2021 09:51
URI: https://eprints.ugd.edu.mk/id/eprint/27338

Actions (login required)

View Item View Item