Crime and Cybersecurity as Advanced Persistent Threat: A Constant E-Commerce Challenges

Authors

  • Harshith Desamsetti Senior Product Engineer (Java), ACA Group LLC, NY 10017, USA

DOI:

https://doi.org/10.18034/ajtp.v8i3.666

Keywords:

Cyber Attack, Cyber Security, E-Commerce, Cyber Theft, Social Engineering, Phishing

Abstract

This study examines e-commerce technology and company cyber security threats. Technology for e-commerce is garnering academic and business attention. The business community and consumers can now do what was previously impossible. But it also created concerns, including cyber security. This study examines social engineering, denial of service, malware, and personal data assaults. Global firms spend a lot on cybersecurity, which grows each year. Because attackers constantly look for new vulnerabilities in persons, companies, and technology, it seems complicated to solve the obstacle. This study analyzes social engineering, DDoS, malware, and personal data threats. Using new technology for e-commerce and cybersecurity is a never-ending game of cat and mouse. Reliable technology, staff, customer training, and good corporate and government policies and regulations mitigate hazards.

Downloads

Download data is not yet available.

References

Ahmad, B., Wang, J., Ali, Z. A. (2018). Role of Machine Learning and Data Mining in Internet Security: Standing State with Future Directions. Journal of Computer Networks and Communications, 2018. https://doi.org/10.1155/2018/6383145 DOI: https://doi.org/10.1155/2018/6383145

Ballamudi, V. K. R., Lal, K., Desamsetti, H., & Dekkati, S. (2021). Getting Started Modern Web Development with Next.js: An Indispensable React Framework. Digitalization & Sustainability Review, 1(1), 1–11. https://upright.pub/index.php/dsr/article/view/83

Balzacq, T., & Cavelty, M. D. (2016). A theory of actor-network for cyber-security. European Journal of International Security, Cambridge, 1(2), 176-198. https://doi.org/10.1017/eis.2016.8 DOI: https://doi.org/10.1017/eis.2016.8

Bamrara, A. (2015). Evaluating Database Security and Cyber Attacks: A Relational Approach. Journal of Internet Banking and Commerce, 20(2), 1-17. https://www.proquest.com/docview/1799378132/DDC4CD9969A244CBPQ/29 DOI: https://doi.org/10.4172/1204-5357.1000115

Bodepudi, A., Reddy, M., Gutlapalli, S. S., & Mandapuram, M. (2019). Voice Recognition Systems in the Cloud Networks: Has It Reached Its Full Potential?. Asian Journal of Applied Science and Engineering, 8(1), 51–60. https://doi.org/10.18034/ajase.v8i1.12 DOI: https://doi.org/10.18034/ajase.v8i1.12

Chen, S., Thaduri, U. R., & Ballamudi, V. K. R. (2019). Front-End Development in React: An Overview. Engineering International, 7(2), 117–126. https://doi.org/10.18034/ei.v7i2.662 DOI: https://doi.org/10.18034/ei.v7i2.662

Conteh, N. Y., & Schmick, P. J. (2016). Cybersecurity: risks, vulnerabilities, and countermeasures to prevent social engineering attacks. International Journal of Advanced Computer Research, 6(23), 31-38. https://doi.org/10.19101/IJACR.2016.623006 DOI: https://doi.org/10.19101/IJACR.2016.623006

Daniel, O. (2016). The Internet of Things. Journal of Democracy, 27(3), 176-178. https://doi.org/10.1353/jod.2016.0042 DOI: https://doi.org/10.1353/jod.2016.0042

Dekkati, S., & Thaduri, U. R. (2017). Innovative Method for the Prediction of Software Defects Based on Class Imbalance Datasets. Technology & Management Review, 2, 1–5. https://upright.pub/index.php/tmr/article/view/78

Dekkati, S., Lal, K., & Desamsetti, H. (2019). React Native for Android: Cross-Platform Mobile Application Development. Global Disclosure of Economics and Business, 8(2), 153-164. https://doi.org/10.18034/gdeb.v8i2.696 DOI: https://doi.org/10.18034/gdeb.v8i2.696

Deming, C., Dekkati, S., & Desamsetti, H. (2018). Exploratory Data Analysis and Visualization for Business Analytics. Asian Journal of Applied Science and Engineering, 7(1), 93–100. https://doi.org/10.18034/ajase.v7i1.53 DOI: https://doi.org/10.18034/ajase.v7i1.53

Desamsetti, H. (2016a). A Fused Homomorphic Encryption Technique to Increase Secure Data Storage in Cloud Based Systems. The International Journal of Science & Technoledge, 4(10), 151-155.

Desamsetti, H. (2016b). Issues with the Cloud Computing Technology. International Research Journal of Engineering and Technology (IRJET), 3(5), 321-323.

Desamsetti, H., & Mandapuram, M. (2017). A Review of Meta-Model Designed for the Model-Based Testing Technique. Engineering International, 5(2), 107–110. https://doi.org/10.18034/ei.v5i2.661 DOI: https://doi.org/10.18034/ei.v5i2.661

Fan, J., Yong, F. (2013). Research of Existing Security Problems in E-Commerce Sites and Defense Technology. Applied Mechanics and Materials, 380-384, (2519). https://doi.org/10.4028/www.scientific.net/AMM.380-384.2519 DOI: https://doi.org/10.4028/www.scientific.net/AMM.380-384.2519

Gcaza, N., Solms, R. V., Grobler, M. M., Vuuren, J. J.V. (2017). A general morphological analysis: delineating a cyber-security culture. Information and Computer Security, 25(3), 259-278. https://doi.org/10.1108/ICS-12-2015-0046 DOI: https://doi.org/10.1108/ICS-12-2015-0046

Gutlapalli, S. S. (2016a). An Examination of Nanotechnology’s Role as an Integral Part of Electronics. ABC Research Alert, 4(3), 21–27. https://doi.org/10.18034/ra.v4i3.651 DOI: https://doi.org/10.18034/ra.v4i3.651

Gutlapalli, S. S. (2016b). Commercial Applications of Blockchain and Distributed Ledger Technology. Engineering International, 4(2), 89–94. https://doi.org/10.18034/ei.v4i2.653 DOI: https://doi.org/10.18034/ei.v4i2.653

Gutlapalli, S. S. (2017a). Analysis of Multimodal Data Using Deep Learning and Machine Learning. Asian Journal of Humanity, Art and Literature, 4(2), 171–176. https://doi.org/10.18034/ajhal.v4i2.658 DOI: https://doi.org/10.18034/ajhal.v4i2.658

Gutlapalli, S. S. (2017b). The Role of Deep Learning in the Fourth Industrial Revolution: A Digital Transformation Approach. Asian Accounting and Auditing Advancement, 8(1), 52–56. Retrieved from https://4ajournal.com/article/view/77

Gutlapalli, S. S. (2017c). An Early Cautionary Scan of the Security Risks of the Internet of Things. Asian Journal of Applied Science and Engineering, 6, 163–168. Retrieved from https://ajase.net/article/view/14

Gutlapalli, S. S., Mandapuram, M., Reddy, M., & Bodepudi, A. (2019). Evaluation of Hospital Information Systems (HIS) in terms of their Suitability for Tasks. Malaysian Journal of Medical and Biological Research, 6(2), 143–150. https://mjmbr.my/index.php/mjmbr/article/view/661 DOI: https://doi.org/10.18034/mjmbr.v6i2.661

Guynes, C. S., Wu, Y. A., John, W. (2011). E-Commerce/Network Security Considerations. International Journal of Management and Information Systems, 15(2), 1-7. DOI: https://doi.org/10.19030/ijmis.v15i2.4147

Koehler, S., Desamsetti, H., Ballamudi, V. K. R., & Dekkati, S. (2020). Real World Applications of Cloud Computing: Architecture, Reasons for Using, and Challenges. Asia Pacific Journal of Energy and Environment, 7(2), 93-102. https://doi.org/10.18034/apjee.v7i2.698 DOI: https://doi.org/10.18034/apjee.v7i2.698

Lal, K. (2015). How Does Cloud Infrastructure Work?. Asia Pacific Journal of Energy and Environment, 2(2), 61-64. https://doi.org/10.18034/apjee.v2i2.697 DOI: https://doi.org/10.18034/apjee.v2i2.697

Lal, K. (2016). Impact of Multi-Cloud Infrastructure on Business Organizations to Use Cloud Platforms to Fulfill Their Cloud Needs. American Journal of Trade and Policy, 3(3), 121–126. https://doi.org/10.18034/ajtp.v3i3.663 DOI: https://doi.org/10.18034/ajtp.v3i3.663

Lal, K., & Ballamudi, V. K. R. (2017). Unlock Data’s Full Potential with Segment: A Cloud Data Integration Approach. Technology &Amp; Management Review, 2, 6–12. https://upright.pub/index.php/tmr/article/view/80

Lal, K., Ballamudi, V. K. R., & Thaduri, U. R. (2018). Exploiting the Potential of Artificial Intelligence in Decision Support Systems. ABC Journal of Advanced Research, 7(2), 131-138. https://doi.org/10.18034/abcjar.v7i2.695 DOI: https://doi.org/10.18034/abcjar.v7i2.695

Liu, X., Zhao, M., Li, S., Zhang, F., Wade, T. (2017). A Security Framework for the Internet of Things in the Future Internet Architecture. Future Internet, 9(3), 27. https://doi.org/10.3390/fi9030027 DOI: https://doi.org/10.3390/fi9030027

Mandapuram, M. (2016). Applications of Blockchain and Distributed Ledger Technology (DLT) in Commercial Settings. Asian Accounting and Auditing Advancement, 7(1), 50–57. Retrieved from https://4ajournal.com/article/view/76

Mandapuram, M. (2017a). Application of Artificial Intelligence in Contemporary Business: An Analysis for Content Management System Optimization. Asian Business Review, 7(3), 117–122. https://doi.org/10.18034/abr.v7i3.650 DOI: https://doi.org/10.18034/abr.v7i3.650

Mandapuram, M. (2017b). Security Risk Analysis of the Internet of Things: An Early Cautionary Scan. ABC Research Alert, 5(3), 49–55. https://doi.org/10.18034/ra.v5i3.650 DOI: https://doi.org/10.18034/ra.v5i3.650

Mandapuram, M., & Hosen, M. F. (2018). The Object-Oriented Database Management System versus the Relational Database Management System: A Comparison. Global Disclosure of Economics and Business, 7(2), 89–96. https://doi.org/10.18034/gdeb.v7i2.657 DOI: https://doi.org/10.18034/gdeb.v7i2.657

Mandapuram, M., Gutlapalli, S. S., Bodepudi, A., & Reddy, M. (2018). Investigating the Prospects of Generative Artificial Intelligence. Asian Journal of Humanity, Art and Literature, 5(2), 167–174. https://doi.org/10.18034/ajhal.v5i2.659 DOI: https://doi.org/10.18034/ajhal.v5i2.659

Mandapuram, M., Gutlapalli, S. S., Reddy, M., Bodepudi, A. (2020). Application of Artificial Intelligence (AI) Technologies to Accelerate Market Segmentation. Global Disclosure of Economics and Business 9(2), 141–150. https://doi.org/10.18034/gdeb.v9i2.662 DOI: https://doi.org/10.18034/gdeb.v9i2.662

Ramkumar, R., Rahul, R., & Gowtham, S. (2015). Anomaly Based Approach for Defending Denial of Service Attack in Web Traffic. Compusoft, 4(4), 1657-1664.

Reddy, M., Bodepudi, A., Mandapuram, M., & Gutlapalli, S. S. (2020). Face Detection and Recognition Techniques through the Cloud Network: An Exploratory Study. ABC Journal of Advanced Research, 9(2), 103–114. https://doi.org/10.18034/abcjar.v9i2.660 DOI: https://doi.org/10.18034/abcjar.v9i2.660

Scheau, M. C., Arsene, A. L., Gerald, D. (2016). Phishing and E-Commerce: An Information Security Management Problem. Journal of Defense Resources Management, 7(1), 129-140.

Shang, Q. Y. (2013). Discussion on the Computer Security Technology and E-Commerce Transaction Security. Applied Mechanics and Materials, 427-429, (2724). https://doi.org/10.4028/www.scientific.net/AMM.427-429.2724 DOI: https://doi.org/10.4028/www.scientific.net/AMM.427-429.2724

Thaduri, U. R., & Lal, K. (2020). Making a Dynamic Website: A Simple JavaScript Guide. Technology & Management Review, 5, 15–27. https://upright.pub/index.php/tmr/article/view/81

Thaduri, U. R., Ballamudi, V. K. R., Dekkati, S., & Mandapuram, M. (2016). Making the Cloud Adoption Decisions: Gaining Advantages from Taking an Integrated Approach. International Journal of Reciprocal Symmetry and Theoretical Physics, 3, 11–16. https://upright.pub/index.php/ijrstp/article/view/77

Thodupunori, S. R., & Gutlapalli, S. S. (2018). Overview of LeOra Software: A Statistical Tool for Decision Makers. Technology & Management Review, 3(1), 7–11.

Downloads

Published

2021-12-31

Issue

Section

Policy and Practice Reviews

How to Cite

Desamsetti, H. (2021). Crime and Cybersecurity as Advanced Persistent Threat: A Constant E-Commerce Challenges. American Journal of Trade and Policy, 8(3), 239-246. https://doi.org/10.18034/ajtp.v8i3.666