Crime and Cybersecurity as Advanced Persistent Threat: A Constant E-Commerce Challenges
DOI:
https://doi.org/10.18034/ajtp.v8i3.666Keywords:
Cyber Attack, Cyber Security, E-Commerce, Cyber Theft, Social Engineering, PhishingAbstract
This study examines e-commerce technology and company cyber security threats. Technology for e-commerce is garnering academic and business attention. The business community and consumers can now do what was previously impossible. But it also created concerns, including cyber security. This study examines social engineering, denial of service, malware, and personal data assaults. Global firms spend a lot on cybersecurity, which grows each year. Because attackers constantly look for new vulnerabilities in persons, companies, and technology, it seems complicated to solve the obstacle. This study analyzes social engineering, DDoS, malware, and personal data threats. Using new technology for e-commerce and cybersecurity is a never-ending game of cat and mouse. Reliable technology, staff, customer training, and good corporate and government policies and regulations mitigate hazards.
Downloads
References
Ahmad, B., Wang, J., Ali, Z. A. (2018). Role of Machine Learning and Data Mining in Internet Security: Standing State with Future Directions. Journal of Computer Networks and Communications, 2018. https://doi.org/10.1155/2018/6383145 DOI: https://doi.org/10.1155/2018/6383145
Ballamudi, V. K. R., Lal, K., Desamsetti, H., & Dekkati, S. (2021). Getting Started Modern Web Development with Next.js: An Indispensable React Framework. Digitalization & Sustainability Review, 1(1), 1–11. https://upright.pub/index.php/dsr/article/view/83
Balzacq, T., & Cavelty, M. D. (2016). A theory of actor-network for cyber-security. European Journal of International Security, Cambridge, 1(2), 176-198. https://doi.org/10.1017/eis.2016.8 DOI: https://doi.org/10.1017/eis.2016.8
Bamrara, A. (2015). Evaluating Database Security and Cyber Attacks: A Relational Approach. Journal of Internet Banking and Commerce, 20(2), 1-17. https://www.proquest.com/docview/1799378132/DDC4CD9969A244CBPQ/29 DOI: https://doi.org/10.4172/1204-5357.1000115
Bodepudi, A., Reddy, M., Gutlapalli, S. S., & Mandapuram, M. (2019). Voice Recognition Systems in the Cloud Networks: Has It Reached Its Full Potential?. Asian Journal of Applied Science and Engineering, 8(1), 51–60. https://doi.org/10.18034/ajase.v8i1.12 DOI: https://doi.org/10.18034/ajase.v8i1.12
Chen, S., Thaduri, U. R., & Ballamudi, V. K. R. (2019). Front-End Development in React: An Overview. Engineering International, 7(2), 117–126. https://doi.org/10.18034/ei.v7i2.662 DOI: https://doi.org/10.18034/ei.v7i2.662
Conteh, N. Y., & Schmick, P. J. (2016). Cybersecurity: risks, vulnerabilities, and countermeasures to prevent social engineering attacks. International Journal of Advanced Computer Research, 6(23), 31-38. https://doi.org/10.19101/IJACR.2016.623006 DOI: https://doi.org/10.19101/IJACR.2016.623006
Daniel, O. (2016). The Internet of Things. Journal of Democracy, 27(3), 176-178. https://doi.org/10.1353/jod.2016.0042 DOI: https://doi.org/10.1353/jod.2016.0042
Dekkati, S., & Thaduri, U. R. (2017). Innovative Method for the Prediction of Software Defects Based on Class Imbalance Datasets. Technology & Management Review, 2, 1–5. https://upright.pub/index.php/tmr/article/view/78
Dekkati, S., Lal, K., & Desamsetti, H. (2019). React Native for Android: Cross-Platform Mobile Application Development. Global Disclosure of Economics and Business, 8(2), 153-164. https://doi.org/10.18034/gdeb.v8i2.696 DOI: https://doi.org/10.18034/gdeb.v8i2.696
Deming, C., Dekkati, S., & Desamsetti, H. (2018). Exploratory Data Analysis and Visualization for Business Analytics. Asian Journal of Applied Science and Engineering, 7(1), 93–100. https://doi.org/10.18034/ajase.v7i1.53 DOI: https://doi.org/10.18034/ajase.v7i1.53
Desamsetti, H. (2016a). A Fused Homomorphic Encryption Technique to Increase Secure Data Storage in Cloud Based Systems. The International Journal of Science & Technoledge, 4(10), 151-155.
Desamsetti, H. (2016b). Issues with the Cloud Computing Technology. International Research Journal of Engineering and Technology (IRJET), 3(5), 321-323.
Desamsetti, H., & Mandapuram, M. (2017). A Review of Meta-Model Designed for the Model-Based Testing Technique. Engineering International, 5(2), 107–110. https://doi.org/10.18034/ei.v5i2.661 DOI: https://doi.org/10.18034/ei.v5i2.661
Fan, J., Yong, F. (2013). Research of Existing Security Problems in E-Commerce Sites and Defense Technology. Applied Mechanics and Materials, 380-384, (2519). https://doi.org/10.4028/www.scientific.net/AMM.380-384.2519 DOI: https://doi.org/10.4028/www.scientific.net/AMM.380-384.2519
Gcaza, N., Solms, R. V., Grobler, M. M., Vuuren, J. J.V. (2017). A general morphological analysis: delineating a cyber-security culture. Information and Computer Security, 25(3), 259-278. https://doi.org/10.1108/ICS-12-2015-0046 DOI: https://doi.org/10.1108/ICS-12-2015-0046
Gutlapalli, S. S. (2016a). An Examination of Nanotechnology’s Role as an Integral Part of Electronics. ABC Research Alert, 4(3), 21–27. https://doi.org/10.18034/ra.v4i3.651 DOI: https://doi.org/10.18034/ra.v4i3.651
Gutlapalli, S. S. (2016b). Commercial Applications of Blockchain and Distributed Ledger Technology. Engineering International, 4(2), 89–94. https://doi.org/10.18034/ei.v4i2.653 DOI: https://doi.org/10.18034/ei.v4i2.653
Gutlapalli, S. S. (2017a). Analysis of Multimodal Data Using Deep Learning and Machine Learning. Asian Journal of Humanity, Art and Literature, 4(2), 171–176. https://doi.org/10.18034/ajhal.v4i2.658 DOI: https://doi.org/10.18034/ajhal.v4i2.658
Gutlapalli, S. S. (2017b). The Role of Deep Learning in the Fourth Industrial Revolution: A Digital Transformation Approach. Asian Accounting and Auditing Advancement, 8(1), 52–56. Retrieved from https://4ajournal.com/article/view/77
Gutlapalli, S. S. (2017c). An Early Cautionary Scan of the Security Risks of the Internet of Things. Asian Journal of Applied Science and Engineering, 6, 163–168. Retrieved from https://ajase.net/article/view/14
Gutlapalli, S. S., Mandapuram, M., Reddy, M., & Bodepudi, A. (2019). Evaluation of Hospital Information Systems (HIS) in terms of their Suitability for Tasks. Malaysian Journal of Medical and Biological Research, 6(2), 143–150. https://mjmbr.my/index.php/mjmbr/article/view/661 DOI: https://doi.org/10.18034/mjmbr.v6i2.661
Guynes, C. S., Wu, Y. A., John, W. (2011). E-Commerce/Network Security Considerations. International Journal of Management and Information Systems, 15(2), 1-7. DOI: https://doi.org/10.19030/ijmis.v15i2.4147
Koehler, S., Desamsetti, H., Ballamudi, V. K. R., & Dekkati, S. (2020). Real World Applications of Cloud Computing: Architecture, Reasons for Using, and Challenges. Asia Pacific Journal of Energy and Environment, 7(2), 93-102. https://doi.org/10.18034/apjee.v7i2.698 DOI: https://doi.org/10.18034/apjee.v7i2.698
Lal, K. (2015). How Does Cloud Infrastructure Work?. Asia Pacific Journal of Energy and Environment, 2(2), 61-64. https://doi.org/10.18034/apjee.v2i2.697 DOI: https://doi.org/10.18034/apjee.v2i2.697
Lal, K. (2016). Impact of Multi-Cloud Infrastructure on Business Organizations to Use Cloud Platforms to Fulfill Their Cloud Needs. American Journal of Trade and Policy, 3(3), 121–126. https://doi.org/10.18034/ajtp.v3i3.663 DOI: https://doi.org/10.18034/ajtp.v3i3.663
Lal, K., & Ballamudi, V. K. R. (2017). Unlock Data’s Full Potential with Segment: A Cloud Data Integration Approach. Technology &Amp; Management Review, 2, 6–12. https://upright.pub/index.php/tmr/article/view/80
Lal, K., Ballamudi, V. K. R., & Thaduri, U. R. (2018). Exploiting the Potential of Artificial Intelligence in Decision Support Systems. ABC Journal of Advanced Research, 7(2), 131-138. https://doi.org/10.18034/abcjar.v7i2.695 DOI: https://doi.org/10.18034/abcjar.v7i2.695
Liu, X., Zhao, M., Li, S., Zhang, F., Wade, T. (2017). A Security Framework for the Internet of Things in the Future Internet Architecture. Future Internet, 9(3), 27. https://doi.org/10.3390/fi9030027 DOI: https://doi.org/10.3390/fi9030027
Mandapuram, M. (2016). Applications of Blockchain and Distributed Ledger Technology (DLT) in Commercial Settings. Asian Accounting and Auditing Advancement, 7(1), 50–57. Retrieved from https://4ajournal.com/article/view/76
Mandapuram, M. (2017a). Application of Artificial Intelligence in Contemporary Business: An Analysis for Content Management System Optimization. Asian Business Review, 7(3), 117–122. https://doi.org/10.18034/abr.v7i3.650 DOI: https://doi.org/10.18034/abr.v7i3.650
Mandapuram, M. (2017b). Security Risk Analysis of the Internet of Things: An Early Cautionary Scan. ABC Research Alert, 5(3), 49–55. https://doi.org/10.18034/ra.v5i3.650 DOI: https://doi.org/10.18034/ra.v5i3.650
Mandapuram, M., & Hosen, M. F. (2018). The Object-Oriented Database Management System versus the Relational Database Management System: A Comparison. Global Disclosure of Economics and Business, 7(2), 89–96. https://doi.org/10.18034/gdeb.v7i2.657 DOI: https://doi.org/10.18034/gdeb.v7i2.657
Mandapuram, M., Gutlapalli, S. S., Bodepudi, A., & Reddy, M. (2018). Investigating the Prospects of Generative Artificial Intelligence. Asian Journal of Humanity, Art and Literature, 5(2), 167–174. https://doi.org/10.18034/ajhal.v5i2.659 DOI: https://doi.org/10.18034/ajhal.v5i2.659
Mandapuram, M., Gutlapalli, S. S., Reddy, M., Bodepudi, A. (2020). Application of Artificial Intelligence (AI) Technologies to Accelerate Market Segmentation. Global Disclosure of Economics and Business 9(2), 141–150. https://doi.org/10.18034/gdeb.v9i2.662 DOI: https://doi.org/10.18034/gdeb.v9i2.662
Ramkumar, R., Rahul, R., & Gowtham, S. (2015). Anomaly Based Approach for Defending Denial of Service Attack in Web Traffic. Compusoft, 4(4), 1657-1664.
Reddy, M., Bodepudi, A., Mandapuram, M., & Gutlapalli, S. S. (2020). Face Detection and Recognition Techniques through the Cloud Network: An Exploratory Study. ABC Journal of Advanced Research, 9(2), 103–114. https://doi.org/10.18034/abcjar.v9i2.660 DOI: https://doi.org/10.18034/abcjar.v9i2.660
Scheau, M. C., Arsene, A. L., Gerald, D. (2016). Phishing and E-Commerce: An Information Security Management Problem. Journal of Defense Resources Management, 7(1), 129-140.
Shang, Q. Y. (2013). Discussion on the Computer Security Technology and E-Commerce Transaction Security. Applied Mechanics and Materials, 427-429, (2724). https://doi.org/10.4028/www.scientific.net/AMM.427-429.2724 DOI: https://doi.org/10.4028/www.scientific.net/AMM.427-429.2724
Thaduri, U. R., & Lal, K. (2020). Making a Dynamic Website: A Simple JavaScript Guide. Technology & Management Review, 5, 15–27. https://upright.pub/index.php/tmr/article/view/81
Thaduri, U. R., Ballamudi, V. K. R., Dekkati, S., & Mandapuram, M. (2016). Making the Cloud Adoption Decisions: Gaining Advantages from Taking an Integrated Approach. International Journal of Reciprocal Symmetry and Theoretical Physics, 3, 11–16. https://upright.pub/index.php/ijrstp/article/view/77
Thodupunori, S. R., & Gutlapalli, S. S. (2018). Overview of LeOra Software: A Statistical Tool for Decision Makers. Technology & Management Review, 3(1), 7–11.
Downloads
Published
Issue
Section
License
Copyright (c) 2021 Harshith Desamsetti
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
American Journal of Trade and Policy is an Open Access journal. Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal the right of first publication with the work simultaneously licensed under a CC BY-NC 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of their work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal. We require authors to inform us of any instances of re-publication.