CYBER 101

  • Alerts
  • Blog
  • Cyber Briefing
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Domains
  • FAQ
  • Incidents
  • Tutorials

Subscribe to our newsletter

FOLLOW US

No Result
View All Result
  • Login
  • Register
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
  • Events
  • Jobs
  • Vendors
Get Help
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
No Result
View All Result
  • Events
  • Jobs
  • Vendors
Get Help
CyberMaterial
Home Document

Cyber security in E-commerce

by CH. Sireesha, V.Sowjanya, Dr K.Venkataramana

Reading Time: 1 min read
in Document, Paper

 

Abstract

Now a day, World Wide Web has become a popular medium to search information, business, trading and so on. Various organizations and companies are also employing the web in order to introduce their products or services around the world.

Therefore, E-commerce or electronic commerce is formed. E-commerce is any type of business or commercial transaction that involves the transfer of information across the internet. In this situation a huge amount of information is generated and stored in the web services.

This information overhead leads to difficulty in finding relevant and useful knowledge, therefore web mining is used as a tool to discover and extract the knowledge from the web. Besides, the security issues are the most precious problems in every electronic commercial process. This massive increase in the uptake of e-commerce has led to a new generation of associated security threats.

In this paper we use techniques for security purposes, in detecting, preventing and predicting cyber-attacks on virtual space.

 

DOWNLOAD REPORT

Tags: CH. SireeshaCyber security in E-commerceDocumentsDr K.VenkataramanaEcommerceEcommerce DocumentsEcommerce PapersInternational Journal of Scientific & Engineering ResearchPapersV.Sowjanya
ADVERTISEMENT

Related Posts

FACIAL RECOGNITION TECHNOLOGY: Current and Planned Uses by Federal Agencies

FACIAL RECOGNITION TECHNOLOGY: Current and Planned Uses by Federal Agencies

January 24, 2023
Designing an ethical, socially accountable facial recognition system

Designing an ethical, socially accountable facial recognition system

January 24, 2023
Using Mobile Device Biometrics for Authenticating First Responders

Using Mobile Device Biometrics for Authenticating First Responders

January 24, 2023
Face Recognition Vendor Test (FRVT) Part 3: Demographic Effects

Face Recognition Vendor Test (FRVT) Part 3: Demographic Effects

January 24, 2023

More Articles

Alerts

Ukraine warns of InvisiMole attacks

March 21, 2022
Tool

Registry Recon – Software

April 19, 2022
Document

RAMPS for Cybersecurity Education

February 4, 2022
Alerts

SAP Releases March 2022 Security Updates

March 8, 2022
Alerts

Ubuntu security advisory (AV23-032)

January 16, 2023
Incidents

Morley Discloses Ransomware Attack

February 4, 2022

QBot Malware Infects close to 1,800 Users

October 14, 2022
Alerts

CISA Adds Eight Known Exploited Vulnerabilities

April 11, 2022
Load More

Security through data

Cybersecurity Domains

  • API Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • HSM
  • KPIs / KRIs
  • Penetration Testing
  • Shift Left
  • Vulnerability Scan

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • E-Commerce
  • Healthcare
  • IoT
  • Quantum Computing

Frameworks

  • CIS Controls
  • CCPA
  • GDPR
  • NIST
  • 23 NYCRR 500
  • HIPAA

Repository

  • Books
  • Certifications
  • Definitions
  • Documents
  • Entertainment
  • Quotes
  • Reports

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering

© 2023 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Audience
    • Cyber Citizens
    • Cyber Professionals
    • Institutions
  • Highlights
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Domains
    • Incidents
    • Threats
  • Opportunities
    • Events
    • Jobs
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Frameworks
    • Games
    • Hardware Tools
    • Memes
    • Movies
    • Papers
    • Podcasts
    • Quotes
    • Reports
  • Report Cyber Incident
  • GET HELP

Subscribe to our newsletter

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Sign In with Google
Sign In with Linked In
OR

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
Sign Up with Linked In
OR

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.