Tuesday, April 23, 2019

Electronic financial transactions over the Internet Essay

Electronic financial transactions oer the Internet - Essay ExampleTechnological innovation in terms of developing security software package aided this process and so did the process of globalization. As a culmination of these parallel but complementary processes, e-commerce in general and electronic financial transactions in particular has firmly taken reference in mainstream global economy. While this kind of progress in such a short interbreed of time is an impressive achievement, there is much work to be done in terms of creating broad-shouldered security systems for the Internet. This essay will look into the various types of security threats facing electronic financial transactions, the latent damage they could inflict, the remedial measures to counter these threats and the effectiveness of such measures.The architecture of the Internet is such that it is inherently rugged to ensure security. Alongside this, the concept of user anonymity makes the Internet an attractive me dium for extortion and crimes involving theft of personalized information for illicit financial gain (Misra Scherer et al, two hundred4). As per a report released by IDG News Service, umpteen organized crime groups avail of the services offered by hackers to implement complex and sophisticated financial schemes to fiddle money from unsuspecting participants. According to the Internet Crime Complaint Center, as much as $200 million was lost in the year 2006 alone. And each year this sum seems to increase, since financial institutions like banks and insurance policy companies are lucrative targets for cybercriminals. A FBI report released at the beginning of the new millennia has confirmed the nexus between computer hackers and organized crime groups. Many of these organized crime groups are said to operate from easterly European countries that were part of the erstwhile Soviet Union. In such cases, the hackers first crack the security systems in place and gain access to vital da ta. The organized

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.