+30 210 6400132[email protected]173 Alexandras Avenue, Athens, Greece
CYBERALERT ENCYBERALERT EN
CYBERALERT EN
by Cyber Crime Division
  • FEELSAFE
    • CONSUMERS
    • EMPLOYEES
    • BUSINESS
    • FEELSAFE APP
    • ABOUT US
  • SAFE WITH CARD
  • LEAFLETS
  • CONTACT
Menu back  
 
TwitterFacebookYouTube

GR

Technologies and e-commerce applications

Level of secure connections (SSL – Secure Sockets Layer)

The security of web applications based on the SSL protocol, which was created to offer a safe connection between browsers and servers encrypting communications between them. This protocol is now the most widespread and is the global standard for the certification of websites users and encrypting data between network users and servers. Unless the SSL authentication of the parties also offers confidentiality and data integrity for communications between web server and browser.

Secure Electronic Transactions (SET – Secure Electronic Transactions)

The SET protocol – Secure Electronic Transaction constitutes a trade protocol which was created in 1997 by Visa and MasterCard, as a method of securing the economic content of transactions through the Internet providing authentication, confidentiality and integrity of the message. Advantages of the protocol SET include high security provided to all stakeholders, particularly the end-user client, and the merchant does not have access to bank account information or credit card, thereby reducing the risk of fraud.

Electronic Data Interchange (EDI – Electronic Data Interchange)

One of the most important technologies of e-commerce is the electronic data exchange. EDI is a common file structure designed to allow large organizations to transmit information through large private networks. This is the electronic exchange of commercial and administrative data from computer to computer, with minimal intervention handwritten procedures. These data are organized in separate messages (invoices, orders, price lists, bills of lading, etc.). The contents and structure of which determined by a commonly accepted standard. The biggest advantage of this technology is that the data exchanged are formatted according to the specified standard language and thus eligible direct processing of different applications, even if they are not compatible.

Antivirus

The antivirus are the chief of defense, but there are anti-virus software which are in various forms. Their main flaw is that it does not easily pick up new viruses even when updated regularly. Another example of anti-virus defense is the integrity controller. In order for a virus to infect a computer, you must change something on the computer system. The integrity check could identify these changes even when caused by unknown viruses.

Firewall

A firewall is a software or hardware that only allows external users that have the appropriate permissions to access the protected network. A firewall allows internal users have full access to the services provided, while external users must be certified.

Share this post
FacebookTwitterGoogle+LinkedIn
Related posts
Risks electronic transactions
15/10/2015
Ecommerce Safety requirements
15/10/2015
The major benefits of electronic commerce for businesses
15/10/2015
Categories Ecommerce
15/10/2015
What is electronic commerce (e-commerce);
15/10/2015
Latest News
  • Tips
    15/10/2015
  • Basic Consumer Rights
    15/10/2015
  • How can you pay when you buy online?
    15/10/2015
  • Safe shopping online and what to watch?
    15/10/2015
  • E-COMMERCE TIPS FOR CONSUMERS
    15/10/2015
  • Technologies and e-commerce applications
    15/10/2015
Follow @CyberAlertGR
FEELSAFE Application
CyberKid
Contact us
Hellenic Police - Cyber Crime Division

Address: 173 Alexandras Avenue
11522, Athens, Greece
Call Center: 0030 11188
Fax: 0030 210 6476462
E-mail: [email protected]

Find us on:

FacebookTwitterYouTube
Cases Statistics (2014)
Frauds33%
Suicide Intentions11%
Child Pornography10%
Privacy9%
Money Laundering7%
Threats7%
Hacking/ Cracking5%
Others21%
@CyberAlertGR
Tweets by @CyberAlertGR
Entities









CYBERALERT EN

Copyright © 2015
Hellenic Police – Cyber Crime Division