Level of secure connections (SSL – Secure Sockets Layer)
The security of web applications based on the SSL protocol, which was created to offer a safe connection between browsers and servers encrypting communications between them. This protocol is now the most widespread and is the global standard for the certification of websites users and encrypting data between network users and servers. Unless the SSL authentication of the parties also offers confidentiality and data integrity for communications between web server and browser.
Secure Electronic Transactions (SET – Secure Electronic Transactions)
The SET protocol – Secure Electronic Transaction constitutes a trade protocol which was created in 1997 by Visa and MasterCard, as a method of securing the economic content of transactions through the Internet providing authentication, confidentiality and integrity of the message. Advantages of the protocol SET include high security provided to all stakeholders, particularly the end-user client, and the merchant does not have access to bank account information or credit card, thereby reducing the risk of fraud.
Electronic Data Interchange (EDI – Electronic Data Interchange)
One of the most important technologies of e-commerce is the electronic data exchange. EDI is a common file structure designed to allow large organizations to transmit information through large private networks. This is the electronic exchange of commercial and administrative data from computer to computer, with minimal intervention handwritten procedures. These data are organized in separate messages (invoices, orders, price lists, bills of lading, etc.). The contents and structure of which determined by a commonly accepted standard. The biggest advantage of this technology is that the data exchanged are formatted according to the specified standard language and thus eligible direct processing of different applications, even if they are not compatible.
The antivirus are the chief of defense, but there are anti-virus software which are in various forms. Their main flaw is that it does not easily pick up new viruses even when updated regularly. Another example of anti-virus defense is the integrity controller. In order for a virus to infect a computer, you must change something on the computer system. The integrity check could identify these changes even when caused by unknown viruses.
A firewall is a software or hardware that only allows external users that have the appropriate permissions to access the protected network. A firewall allows internal users have full access to the services provided, while external users must be certified.