DIRECTORY

  • Alerts
  • APTs
  • Blog
  • Books
  • Certifications
  • Cheat Sheets
  • Courses
  • Cyber Briefing
  • CyberDecoded
  • CyberReview
  • CyberStory
  • CyberTips
  • Definitions
  • Domains
  • Entertainment
  • FAQ
  • Frameworks
  • Hardware Tools
  • Incidents
  • Malware
  • News
  • Papers
  • Podcasts
  • Quotes
  • Reports
  • Tools
  • Threats
  • Tutorials
No Result
View All Result
  • Login
  • Register
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
Talk To An Expert
  • Cyber Citizens
  • Cyber Professionals
  • Institutions
CyberMaterial
No Result
View All Result
Talk To An Expert
CyberMaterial
Home Document

Cyber security in E-commerce

by CH. Sireesha, V.Sowjanya, Dr K.Venkataramana

Reading Time: 1 min read
in Document, Paper

 

Abstract

Now a day, World Wide Web has become a popular medium to search information, business, trading and so on. Various organizations and companies are also employing the web in order to introduce their products or services around the world.

Therefore, E-commerce or electronic commerce is formed. E-commerce is any type of business or commercial transaction that involves the transfer of information across the internet. In this situation a huge amount of information is generated and stored in the web services.

This information overhead leads to difficulty in finding relevant and useful knowledge, therefore web mining is used as a tool to discover and extract the knowledge from the web. Besides, the security issues are the most precious problems in every electronic commercial process. This massive increase in the uptake of e-commerce has led to a new generation of associated security threats.

In this paper we use techniques for security purposes, in detecting, preventing and predicting cyber-attacks on virtual space.

 

DOWNLOAD REPORT

Tags: CH. SireeshaCyber security in E-commerceDocumentsDr K.VenkataramanaEcommerceEcommerce DocumentsEcommerce PapersInternational Journal of Scientific & Engineering ResearchPapersV.Sowjanya
ADVERTISEMENT

Related Posts

Global Threat Intelligence Report April 2023

Global Threat Intelligence Report April 2023

July 11, 2023
IBM Security X-Force Threat Intelligence Index 2023

IBM Security X-Force Threat Intelligence Index 2023

July 11, 2023
Nokia Threat Intelligence Report 2023

Nokia Threat Intelligence Report 2023

July 11, 2023
2023 Thales Global Data Threat Report

2023 Thales Global Data Threat Report

July 11, 2023

More Articles

Hackers stole data from the network of the gaming giant Electronic Arts

June 10, 2021
Definition

404 Error Definition

October 19, 2020
Incidents

Israel: communications company hit by major cyberattack

September 21, 2021
Alerts

New Financial Scam Using Fake ChatGPT

March 7, 2023
News

Kali Linux 2023.1 introduces ‘Purple’ distro

March 15, 2023
Alerts

New Advanced Telegram Phishing

August 25, 2023

200K Veterans’ Medical Records May Have Been Stolen by Ransomware Gang

May 11, 2021
Alerts

North Korean APT37 Cyber Attack Campaign

July 31, 2023
Load More

Security through data

Cybersecurity Domains

  • API Security
  • Business Continuity
  • Career Development
  • Compliance
  • Cryptography
  • HSM
  • KPIs / KRIs
  • Penetration Testing
  • Shift Left
  • Vulnerability Scan

Emerging Technologies

  • 5G
  • Artificial Intelligence
  • Blockchain
  • Cryptocurrency
  • Deepfake
  • E-Commerce
  • Healthcare
  • IoT
  • Quantum Computing

Frameworks

  • CIS Controls
  • CCPA
  • GDPR
  • NIST
  • 23 NYCRR 500
  • HIPAA

Repository

  • Books
  • Certifications
  • Definitions
  • Documents
  • Entertainment
  • Quotes
  • Reports

Threats

  • APTs
  • DDoS
  • Insider Threat
  • Malware
  • Phishing
  • Ransomware
  • Social Engineering

© 2023 | CyberMaterial | All rights reserved.

World’s #1 Cybersecurity Repository

  • About
  • Legal and Privacy Policy
  • Site Map
No Result
View All Result
  • Alerts
  • Incidents
  • News
  • Audience
    • Cyber Citizens
    • Cyber Professionals
    • Institutions
  • Highlights
    • Blog
    • CyberDecoded
    • Cyber Review
    • CyberStory
    • CyberTips
  • Cyber Risks
    • Alerts
    • Attackers
    • Domains
    • Incidents
    • Threats
  • Opportunities
    • Events
    • Jobs
  • Repository
    • Books
    • Certifications
    • Cheat Sheets
    • Courses
    • Definitions
    • Frameworks
    • Games
    • Hardware Tools
    • Memes
    • Movies
    • Papers
    • Podcasts
    • Quotes
    • Reports
    • Tutorials
  • Report Cyber Incident
  • GET HELP
  • Contact Us

Subscribe to our newsletter

© 2022 Cybermaterial - Security Through Data .

Welcome Back!

Sign In with Google
Sign In with Linked In
OR

Forgotten Password? Sign Up

Create New Account!

Sign Up with Google
Sign Up with Linked In
OR

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.