E-COMMERCE SECURITY PROTOCOLS Cover Image

БЕЗБЕДНОСНИ ПРОТОКОЛИ КАЈ ЕЛЕКТРОНСКАТА ТРГОВИЈА
E-COMMERCE SECURITY PROTOCOLS

Author(s): Igor Kambovski
Subject(s): Social Sciences
Published by: Scientific Institute of Management and Knowledge
Keywords: E-commerce; technology; security; cryptography

Summary/Abstract: Information technology is the fastest growing technology in the world. Countries that can not keep up with the pace of implementation of this technology are increasingly moving away from countries in the developed world and the gap between them is widening. With the relentless expansion of the Internet, all countries are increasingly introducing information technology in all areas of work and living. Globalization as an unstoppable process is perhaps most felt in commerce, especially Electronic commerce. E-commerce breaks down all boundaries and barriers. The terms "near" and "far" are lost in the virtual world of the Internet. Anyone who produces something through E-commerce can offer their product to millions and billions of potential buyers around the world. The term global market is becoming a reality. Also, banking in the world is experiencing a revival and has entered a new era with the advent of electronic banking. E-banks are already a reality today, they work 24 hours a day, 7 days a week. They are not crowded at the counters that do not really exist and they are ready to receive your payment order at any time. In an increasingly dynamic way of working and living, fast and reliable communication is the key to success. Electronic communication is becoming part of our daily lives. Electronic operation through modern and widely available information and telecommunication technology increases the efficiency and security of communications between entities in payments and in legal acts. The use of electronic technology enables the receipt, sending and storage of data in electronic form, as well as the creation of an electronic signature whose use in payment operations and transactions between other legal entities in payment operations becomes a necessary need. Due to all this, as well as for many other reasons, there is a need to check the authenticity and verification of electronic data, messages and texts. With proper application of security systems and protocols, everyday risks that are an integral part of E-commerce and online communications and transactions can be avoided. In terms of E-commerce, special attention is paid to the protection of confidential and personal data, which are the target of illegal activities of hackers who do it mostly for dishonest earnings, trading with them, but also for prestige and fame. For effective protection against such unauthorized access and use of information and data, E-commerce entities use cryptography as a data processing technique. Every system in which data is stored and processed belongs to the group of endangered systems and needs protection. In general, any person, object or event that could potentially endanger the data security in the system can be considered a threat. Therefore, these threats should be identified and prevented, and if they have already occurred, procedures should be implemented to eliminate them and minimize the damage.

  • Issue Year: 43/2020
  • Issue No: 1
  • Page Range: 193 - 199
  • Page Count: 7
  • Language: English, Macedonian
Toggle Accessibility Mode