Thursday, January 24, 2019
GrandmaÃ¢â¬â¢s Treats E-Commerce Security Options Essay
at that place are both advantages and separates to providing an overly reassure environs for e-commerce. The biggest advantage is consumer and byplay privacy. granny k nons Treats needs to provide a secure environment so that unauthorized drug consumptionrs are un able to see details of the consumers transactions, and purchases in particular. In this representation consumers using Grandmas Treats website testament know they can make multiple purchases using their stored data and defy a sense of security regarding their transactions.To arrest this privacy for the consumer, encryption software system installed on the server is necessary. A further advantage to a secure environment is consumer trust. When customers decide to make a purchase using their fib with a password, they can trust that the security standards of the social club are up to par with other, larger organizations. This type of secure environment would work best at serving the needs of wholesale and corp orate accounts.A detriment of providing an overly secure e-commerce environment is if the company decides to use public tell apart infrastructure, or PKI (Brayton, Finneman, Turajski, Wiltsey, 2006). In this instance, Grandmas Treats would only be able to transmit a small amount of information. A second disadvantage to this overly secure environment is if Grandmas Treats requires a user to log in to view its withdrawerings, it may be considered an annoyance and a hindrance to purchasing. A final disadvantage is that this technology tends to slow consume customer service. The time required to check out the online shopping tangle will necessitate verification, which will make the purchasing process longer. Should this puddle too long, a customer may decide to log off and leave the website without finalizing a purchase.There are also advantages and disadvantages to providing an open, insecure e-commerce environment. just about advantages of setting up an open, insecure environme nt are quick shop of products, easy navigation of the website, and the inexpensive cost of implementing it. To browse finished the website of Grandmas Treats, a customer wouldnt first have to login and use a password. Consumers will also have the option of browsing through the offered products with ease. Providing an open, insecure environment is also an inexpensive option. The company will not need any specialized hardware or software to ensure security in its e-commerce environment.There are several disadvantages of setting up an open, insecure environment as well. The threat of hackers breaking into the server, and malware infecting the site, are dickens disadvantages of not providing proper security (CNET News.com Staff, 2008). An experienced hacker could easily realise access to customer information, financial transactions, and any other important information stored on the server. A variety of malware could cause a major line of work for Grandmas Treats and its website wit h the likely outcome of a system belt or possible infection of customers computers. While the damage could most likely be reversed, it would take time to repair and create distrust with the companys customers.In light of these advantages and disadvantages as discussed, it is recommended that Grandmas Treats employs a more middle of the road option. For certain purposes, such(prenominal) as reservation a purchase online, there should be security measures in place, such as requiring a customer to create an account and log in with a password. However, there should also be a selection of move end pages which are easily accessible to anyone browsing products. In this way Grandmas Treats can best serve the needs of both valued customers and casual web browsers.ReferencesBrayton, J., Finneman, A., Turajski, N., Wiltsey, S., (October 10, 2006). What is PKI? Retrieved March 4, 2008, from the TechTarget tissuesite http//searchsecurity.techtarget.com/sDefinition/0,,sid14_gci214299,00.html CNET News.com Staff (February 11, 2008). Security Bites Podcast Nonpersistent Web Threats. Retrieved March 4, 2008 from the CNET News.com Website http//www.news.com/Security-Bites-Podcast-Nonpersistent-Web-threats/2324-12640_3-6230144.html?tag=item.