• Elements of Computer Security Research and apply the content from recent articles about the elements of computer security. You must cite at least 3-5 sources outside of the class textbook. Write a minimum of 3 to 5 pages for the body of the research paper (using APA writing style format) discussing your viewpoint on the topic and refer to the content from the articles to support your findings. Write in 3rd person. For APA writing style formatting see the APA style guide at the resources tab for APA formatting guidelines. APA writing style requires in-text citations and references support the citations on the references page as needed throughout the document. Schneider, G. P. (2015). Electronic Commerce (11th ed.). Stamford, CT: Cengage Learning. ISBN: 978-1-285-425436 • Chapter 10 • Chapter 11
Elements of Computer Security Name Institutional Date Elements of Computer Security Electronic-commerce is the process that involves buying and selling services over the internet. It also includes performing other commercial transactions online. It takes care of distance, transparency, knowledge provision and support systems (Schneider, 2015). However, the key to understanding the concept is e-commerce security. For all its advantages, its users are always at risk of having their confidential details or identity stolen for criminal activities. The main reasons for such attacks lie in software and hardware. One requires technical skills to fend off potential attackers, but many are unwilling to restrict functionality of their systems; this makes them vulnerable (Storey, Kane, & Schwaig, 2009). Attacks in e-commerce are something corporations and individuals will have to start getting used to and to deal with. This paper seeks to discuss the elements of computer security in relation to e-commerce, focusing on the benefits of e-commerce, vulnerabilities, threats and harm, attacks and attackers, and how they can be possibly countered. Electronic Commerce Security Online security has several security issues. The first is computer security where the system is concerned with the protection of assets from unlawful access, alteration, use, or destruction (Storey, Kane, & Schwaig, 2009). The second is physical security; the part of protection th...