SlideShare a Scribd company logo
1 of 19
Running head: NETWORK SECURITY RESEARCH PAPER 1
NETWORK SECURITY2
· Marginal draft 1. There is significant work required in future
drafts and your final capstone paper.
· While you used the CTU APA template, there were a number
of formatting errors
· Don’t use fully justified text. Text should be left justified.
· Incorrect use of headings throughout the paper
· Move your research questions to the introduction.
· The organization and flow of your paper makes it difficult to
follow. Make sure you correctly use headings to separate the
major points of your paper and the sections logically flow from
one to the next.
· I got confused separating the current situation from your
research and analysis.
· Be clear separating opinion from facts. Include in-text
citations to support definitions, and facts from your references.
· You must provide more introduction, content, and explanation
of tools, concepts, and approaches. Be organized and deliberate
on the information making sure it logically answers your
research questions.
· There are a number of sections that aren’t required and
distract from your paper (e.g., proposed solutions, descriptions
of future work).
· Your writing, grammar, word choice, and sentence structure
need improvement. Often, it is difficult to understand your
meaning. I recommend you work with the CTU tutor to improve
your writing. They can also help with organization and flow.
· Work to avoid overusing adjectives (e.g., very, great, crucial,
highest).
· Minimize use of ‘this’, replace with explicit term meant.
· Solid job on your reference page formatting.
· Please see detailed comments embedded in the paper.
Item
Points
Awarded
Report Template Preparation
10
8
Sections of the Body
15
11
Outline
10
9
References
5
5
Editing
10
6
Late Penalty
-7
Total
50
32
COMPUTER SCIENCE CAP STONE PAPERComment by Keith
A Hartley: This should be the title of your paper’s topic.
Student’s Name : Ritesh
Parepally
Colorado Technical
University
Abstract
Comment by Keith A Hartley: Recommend you remove all these
extra spaces and use the “page break” command to force a new
page.
Comment by Keith A Hartley: Remove all extra spaces.
Contents
NETWORK SECURITY OF ONLINE E COMMERCE WEB
SITES USING GENETIC ALGORITHM AND IMPROVING
THE FRAMEWORK3
Introduction3
Problem description3
Current situation4
Use of anti-malware and antivirus8
Securing the website through the use of SSL certificates8
Additional research I will do9
Proposed
Solution
10
Project scope11
Importance of capstone project11
Conclusion.……………………………………………………………
……………12
References……………………………………………………………
…………………..14
NETWORK SECURITY OF ONLINE E COMMERCE WEB
SITES USING GENETIC ALGORITHM AND IMPROVING
THE FRAMEWORK Comment by Keith A Hartley: This should
use the ‘normal’ text style and not be in all caps.
Introduction
This is a research paper that focuses on network security of
online e- commerce web sites. Rrapid increases in internet use
is are significantly affecting e-commerce websites in the
modern environment. This project aims at examinesing the type
of security threats that exist in the e-commerce websites and the
appropriate measures to ensure the security of the
sites.Comment by Keith A Hartley: Solid introduction.
Be diligent on your grammar.
Also, you should explicitly include your research questions in
the introduction.
[Don’t fully justify your text. The APA style is left justified
only. Use the ‘normal’ style in the template. It will ensure the
proper formatting.Problem description
With the drastic increase in the use of e-commerce websites
today, security threats to the sites have also increased
tremendously in the past few decades. Maintaining the security
of e-commerce is very paramount as there has been a drastic
increase in the amount of sensitive information that is sent of
the e-commerce websites (Laudon & Traver, 2016). This has
attracted many cyber thieves to the growing area with the
intention of getting customers confidential information. This
calls for the e-commerce websites to be protected, and this is
the reason why most of the institutions today are in a move to
ensure that their websites are fully protected from any form of
cyber threat. Some of the customer’s concerns are due to an
increase in the credit card frauds witnessed in recent times,
where several customers have lost a lot of money due to
fraudulent activities. Among many security issues raised by
customers includes credit card security as well as the privacy of
their data present in the e-commerce websites. Through the use
of credit card credentials, an unauthorized person can obtain
goods even without paying or use it to get money from an
account.Comment by Keith A Hartley: Provide an in-text
citation to support this statement.Comment by Keith A Hartley:
Wrong word – not exactly sure what you’re trying to
say.Comment by Keith A Hartley: What? Explicitly state what
you mean
Be careful with indefinite articles like “this”. It is often not as
easy for readers to know what you mean.Comment by Keith A
Hartley: Replace with what ‘this’ means.Comment by Keith A
Hartley: Re-write for greater clarity.Comment by Keith A
Hartley: Re-write for clarity.
Add an in-text citation to support this statement.Comment by
Keith A Hartley: Meaning unclear as written.Comment by Keith
A Hartley: Re-write.
Comment by Keith A Hartley: Remove all extra spaces.
This mainly occurs when a hacker gains access to customer
personal data, especially payments information. This usually
happens when a hacker penetrates an e-commerce database
website through the application of malicious software. Among
other security concerns includes a man in the middle attacks
where attackers gain access to the communication between the
e-commerce website and the customer. Distributed denial of
service is another threat where attackers send many requests to
their servers. An increase in malicious programs and worms is
another security issue that is taking a toll on the e-commerce
industry where attackers inject infected files in the websites
intending to gain access to the online stores. An increase in
spammers is also hitting more on e-commerce websites whereby
spammers introduce infected links in customer’s e-commerce
inboxes and thus compromising on the site speed and security.
It is paramount to ensure that the e-commerce websites are
protected to ensure that the security of the customer information
is secured and protected from malicious access by unauthorized
personnel as most of the stored data is very sensitive.Comment
by Keith A Hartley: Replace with explicit term.Comment by
Keith A Hartley: Provide an in-text citation to support this
statement.Comment by Keith A Hartley: What other security
concerns.
This sentence should be re-written for clarity.Comment by
Keith A Hartley: Provide in-text citations to support these
statement.
Current situation
Due to the increase in the growth and use of the World Wide
Web, there has been an increase in new designs and
development of online information (Laudon & Traver, 2016).
Most of the e-commerce websites are currently loaded with a lot
of customer's data due to the rapid increase in the number of
customers that are using e-commerce websites today. The
increase in the number of e-commerce buyers is due to the rapid
increase in e-commerce applications. Due to the fact that
through e-commerce websites, individuals are able to obtain
nearly everything they want just by a click of a button, many
individuals find it worthwhile to shop using e-commerce
websites. It is projected that e-commerce activities are likely to
increase at a higher rate in the coming years than it has ever
been expected before. Going by the survey conducted by the
authenticating survey, e-commerce activities are likely to be
more than 200% by the year 2020 as compared to the year 2014.
This clearly means additional of more information to the e-
commerce websites as more and more customers will be joining
the platform.Comment by Keith A Hartley: Support with an in-
text citation.Comment by Keith A Hartley: Support with in-text
citation.Comment by Keith A Hartley: Not sure this is a fact. It
reads more like your opinion.
If you have one, you should support with an in-text
citation.Comment by Keith A Hartley: Support with an in-text
citation.Comment by Keith A Hartley: Re-write to use in-text
citation.Comment by Keith A Hartley: Re-write for clarity.
This overloading of customer information on e-commerce
websites makes most customers feel frustrated, lost, and
insecure, mainly due to security reasons of their stored data.
Currently, the e-commerce owners are working out on how to
improve the security of e-commerce websites to ensure that
maximum protection is achieved for online transacting
customers. The e-commerce owners are mostly concerned with
the available facts that should be implemented to ensure that
customers can conduct secure transactions when using e-
commerce websites. The main writing objective of this paper is
to ensure that readers can get insights about web technology
that will help online to conduct secure online transactions.
Also, the article paper will highlight some security suggestions
and tricks. It is very paramount for e-commerce owners to
ensure that customers are comfortable and have trusted e-
commerce websites when doing business online. Among most of
the customers, worry includes loss or access to their data,
especially the data in their credit cards, as well as the fear of
viruses and worms (Laudon & Traver, 2016). Denial of service
is another challenge that is faced with e-commerce websites
where an attacker sends overwhelming requests to e-commerce
servers with untraceable IP addresses. Denial of service attacks
is likely to bring the activities of an e-commerce website to a
halt or slow. The use of password encryption is a way that is
currently used to protect the password from Trojan attacks,
viruses, or other worms. To attain a high level of security,
organizations are going top-notch, where they are using
encryption techniques to ensure high-security levels (Held &
Bowers, 2001). The project research question includes:
Comment by Keith A Hartley: Fact or your opinion?
If fact, support with an in-text citation.Comment by Keith A
Hartley: You’ve discussed significant increase, but not
overloading.
How is the information overloading websites?Comment by
Keith A Hartley: Not sure what you mean by available facts?
Expand or re-write.Comment by Keith A Hartley: This is not an
article.Comment by Keith A Hartley: Use a more
scholarly/academic term.Comment by Keith A Hartley: Compare
to what other challenge? Unclear as written.
Also – provide an in-text citation to support.Comment by Keith
A Hartley: Why is it likely?Comment by Keith A Hartley: This
discussion on passwords and encryption seems abrupt and
doesn’t flow with the rest of the paragraph.
Introduce and support with an in-text citation.Comment by
Keith A Hartley: Is this still related to password encryption or
the other information discussed in this paragraph?
Re-write to improve clarity.Comment by Keith A Hartley:
Replace with academic/scholarly term.Comment by Keith A
Hartley: Move to Introduction.
i. What is the importance of maintaining data integrity and
confidently in the e-commerce business?
ii. What are the benefits that arise from proper data protections
iii. What are the risks that arise from poor data protection of the
e-commerce websites
With the advancement in the internet today, commerce activities
are shifting from the traditional mortar and bricks store to the
use of e-commerce where the internet facilitates everything. The
success of the e-commerce business mostly relies on customer
trust and the security of the e-commerce platform website. To
gain the confidentiality of the customers, the e-commerce
website owners should invest all possible measures to ensure
that there attain the highest security levels for the websites.
Comment by Keith A Hartley: This would be better at the
beginning of the current situation sectin.Comment by Keith A
Hartley: Re-write for clarity.Comment by Keith A Hartley:
Unlikely. No business can afford all possible measures.
There are three fundamental concepts in security, which are
integrity, confidentiality, and availability. Comment by Keith A
Hartley: Support with in-text citation.
Consider making this a sub-section.
It would be easier to read and understand.
Through the confidentiality principle, only authorized personnel
are required to access information. This ensures that only
individuals who are authorized access to specific data. Without
proper data confidentiality, people who are not allowed to
access data access to the data, and thus, a data breach happens.
Due to the fact that most of the e-commerce websites contain
very crucial customer data, it is very crucial for these sites that
the data is protected from cybercriminal. To achieve this, the
principle of data confidentiality should be adhered to and not at
any particular time should an unauthorized individual be
allowed to access the customer’s data and information.
Comment by Keith A Hartley: Support with in-text citations.
Data integrity is critical information security. It is essential for
e-commerce owners to ensure that the customer's data are kept
with the highest integrity level. One way through which
customer's data in the e-commerce business can be kept safe is
through maintaining data integrity (Held & Bowers, 2001).
Since e-commerce business activities happen over the internet,
it is not merely to record events that take place and thus the
importance of data being non-repudiation taking place. Through
the non-repudiation principle, security levels are added as they
ensure that either party cannot deny data sent over the internet.
This principle is fundamental as it ensures that the fear of
insecurity among many buyers, especially those that feel that
transactions may not be secure, is reduced. For an online
business to be successful, online business dealers need to come
up with different insurance plans. Comment by Keith A Hartley:
Support with in-text citations.Comment by Keith A Hartley: Re-
write for clarity.
Support with in-text citations.
The last data principle is availability. This means that data
should always be available and accessible for use by authorized
users. In case attackers are able to bring down an e-commerce
server successfully, it means that data will not be available for
users.
Ensuring the security of an online e-commerce business is very
crucial and cannot be neglected at any cost. It is essential for
companies as it ensures that customers can transact their
business smoothly and are secure (Held & Bowers, 2001).
Through providing proper security measures, the e-commerce
business can protect itself as well as its customers from cyber-
related attacks. To ensure that the e-commerce businesses are
entirely the owners of e-commerce should provide:Comment by
Keith A Hartley: I disagree.
Support with in-text citations or re-write to be more
realistic.Their serves and admin are secureComment by Keith A
Hartley: Re-write the title to improve grammar and clarity.
Is this supposed to be a sub-section under Current Situation?
In most cases, the e-commerce platforms usually come with a
default password, which is very easy to guess. It is, therefore,
essential to ensure that these passwords are changed and a
stronger password used instead so that to prevent chances of
hacking. The e-commerce owners should provide to use multiple
usernames and passwords and ensure to change them from time
to time. It is also essential to ensure that the project can give a
notification in case an unknown platform tries to log into the
system.Comment by Keith A Hartley: Opinion? I disagree.
Support with an in-text citation or re-write.Comment by Keith A
Hartley: This paragraph is unclear.
Add more content and explanation.
How does this relate to your research questions.Use of anti-
malware and antivirus Comment by Keith A Hartley: Why is
this a level 1 heading?Comment by Keith A Hartley: Every
sentence begins with ‘through’. Re-write.
Through the use of stolen cards, hackers can place orders even
without the notice of the owner. Through tThe use of antivirus
and malware can help to reduce this fraud. Through the use of
anti-fraud and antivirus can be used to deal with some of the
issues associated with e-commerce. Through the use of
sophisticated algorithms, they can flag any malicious
transactions and thus giving the e-commerce website owners a
chance to take proper measures. The use of anti-fraud and
antivirus helps companies to develop a fraud risk score, which
helps in determining the legitimacy of transactions.Comment by
Keith A Hartley: What’s a fraud risk score? Securing the
website through the use of SSL certificates
Secure sockets layers (SSL) are certificates that are used to link
a transaction to different network paths. They are most often
associated with details of a credit card as well as transaction
details. During transmissions, the SSL certificate ensures that
the transmitted data is encrypted and thus preventing any
interception during the transmission (Held & Bowers, 2001).
The use of SSL certificates is essential as it ensures the sent
information from one destination to another. Owners of e-
commerce websites should strive to use SSL certificates to
ensure the security of all transactions that take place.Comment
by Keith A Hartley: I don’t think this is correct.
Review and update.
Support with in-text citation.Comment by Keith A Hartley:
Strive means it’s optional? Is that what you mean?
Why wouldn’t or couldn’t a company use SSL?
Through the application of multi-layer security, e-commerce
such as a content delivery network (CDN) to protect the sites,
especially from DDoS attacks, as well as malicious traffic. The
filtering of malicious traffic is mainly achieved through
machine learning. Application of two-factor authentication
plays a critical role also in meeting the security of e-commerce
websites. This is primarily achieved by sending an
authentication message to the user email, or an SMS to the users
registered phone number (Dixit, 2016). This is very important
as it only ensures that only the users have an opportunity to
access the services and thus reducing the chances of data
breaches and fraud. Comment by Keith A Hartley: What is
multi-layer security?
Are you going to introduce and explain this concept?Comment
by Keith A Hartley: Spell out acronyms the first time they are
used.Comment by Keith A Hartley: Really?
Support with in-text citation.Comment by Keith A Hartley:
What is two-factor authentication?
Introduce, explain, and provide in-text citations.Comment by
Keith A Hartley: Spell out.Comment by Keith A Hartley: Re-
write for clarity.
With the current increased in customers' concerns about the
integrity and confidentiality of their data, most of them are
majorly concerned with the authorization and privacy of e-
commerce websites (Dixit, 2016). This is because the more
customers are sure that the security of their data is secure, the
more they are likely to be satisfied with the provided services.
Apart from benefiting customers, data security is of great
importance to the organization as it ensures the organization
does not suffer from significant losses associated with data
breaches. It is crucial to ensure the encryption of data to ensure
maximum security is achieved. One of the highest priorities is
providing customer’s data, and transactions are safe, as this
enhances the loyalty of the users, which will lead to an increase
in customers due to the rise in better customer referrals
(Reuvid, 2005). Because the security of e-commerce is very
paramount, more research needs to ensure the effectiveness of
the various methods that can be used to enhance the safety of e-
commerce websites. More research needs to be conducted to
ensure the safety of e-commerce is attained.Comment by Keith
A Hartley: Verify this is an accurate paraphrase of the
source.Comment by Keith A Hartley: Re-writeComment by
Keith A Hartley: This is confusing since it seems to be going
back to a generic discussion of the problem/current situation
after talking about specific technical recommendations.
Additional research I will doComment by Keith A Hartley: I did
not grade any of this.
Your draft capstone papers should only include work you’ve
done not what you will do in future drafts.
Security is vital in the modern-day, and this is what most
organizations are spending most of their time trying to achieve.
I will evaluate the importance of cloud computing in enhancing
the security of e-commerce business. Cloud computing refers to
the delivery of resources, especially computer resources, which
includes databases, servers, software, and networking, to data
centers through the use of the internet. Through the use of
cloud, computing users are able to enjoy elastic resources in a
manner that satisfies their demands. With most organizations
moving their resources to the cloud, cloud providers have come
up with different strategies to ensure that maximum data
protection is achieved. To achieve maximum data protection,
cloud computing combines numerous control levels and thus
creating better atmosphere conditions for businesses.
To fully understand the importance of cloud computing, I will
evaluate how companies that have adopted the use of cloud
computing have benefited and enhanced their e-commerce
websites. In addressing this, I will look at benefits that arise
from taking to cloud computing services as well as the risks
associated with the same. I will also address how cloud
computing enhances the security of different stored resources. I
will also evaluate other best measures that can be put in place to
ensure that the security of e-commerce websites is
achieved.Analysis and Methods, I will use
I will analyze some of the multinational companies that have
adapted and shifted to cloud computing. I will also take other
organizations that have not moved to cloud computing
technology so that to effectively compare the benefits as well as
the risks which arise from adapting to the cloud computing
technology (Reuvid, 2005). Also, through the comparison, I will
be able to understand the reasons why some of the companies
have shifted to cloud computing technology and why some are
reluctant to adopt cloud computing for their e-commerce
websites.Proposed

More Related Content

Similar to Running head NETWORK SECURITY RESEARCH PAPER 1NETWORK SECURITY.docx

A case study of amazon
A case study of amazonA case study of amazon
A case study of amazon
robinbarney
 
Chapter 5 Opening Case - DecisiPossible Technology SolutionsTechn.docx
Chapter 5 Opening Case - DecisiPossible Technology SolutionsTechn.docxChapter 5 Opening Case - DecisiPossible Technology SolutionsTechn.docx
Chapter 5 Opening Case - DecisiPossible Technology SolutionsTechn.docx
keturahhazelhurst
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
Mark Albala
 

Similar to Running head NETWORK SECURITY RESEARCH PAPER 1NETWORK SECURITY.docx (18)

Mid Term Exam
Mid Term ExamMid Term Exam
Mid Term Exam
 
Laudon traver ec10-im_ch05
Laudon traver ec10-im_ch05Laudon traver ec10-im_ch05
Laudon traver ec10-im_ch05
 
Laudon traver ec10-im_ch05
Laudon traver ec10-im_ch05Laudon traver ec10-im_ch05
Laudon traver ec10-im_ch05
 
Passwords don't work multifactor controls do!
Passwords don't work   multifactor controls do!Passwords don't work   multifactor controls do!
Passwords don't work multifactor controls do!
 
Report_on_Hampshire_Community_Centre.pdf
Report_on_Hampshire_Community_Centre.pdfReport_on_Hampshire_Community_Centre.pdf
Report_on_Hampshire_Community_Centre.pdf
 
Phishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresPhishing: Analysis and Countermeasures
Phishing: Analysis and Countermeasures
 
Laudon traver ec11-im_ch05
Laudon traver ec11-im_ch05Laudon traver ec11-im_ch05
Laudon traver ec11-im_ch05
 
A case study of amazon
A case study of amazonA case study of amazon
A case study of amazon
 
E commerce PPT
E commerce PPTE commerce PPT
E commerce PPT
 
Offering A Model Of Evaluation Of Trust Suggesting Between Customers And E-St...
Offering A Model Of Evaluation Of Trust Suggesting Between Customers And E-St...Offering A Model Of Evaluation Of Trust Suggesting Between Customers And E-St...
Offering A Model Of Evaluation Of Trust Suggesting Between Customers And E-St...
 
Encouraging Children To Write
Encouraging Children To WriteEncouraging Children To Write
Encouraging Children To Write
 
Essay On Festival Of Lights Diwali
Essay On Festival Of Lights DiwaliEssay On Festival Of Lights Diwali
Essay On Festival Of Lights Diwali
 
IRJET- Detecting the Phishing Websites using Enhance Secure Algorithm
IRJET- Detecting the Phishing Websites using Enhance Secure AlgorithmIRJET- Detecting the Phishing Websites using Enhance Secure Algorithm
IRJET- Detecting the Phishing Websites using Enhance Secure Algorithm
 
Chapter 5 Opening Case - DecisiPossible Technology SolutionsTechn.docx
Chapter 5 Opening Case - DecisiPossible Technology SolutionsTechn.docxChapter 5 Opening Case - DecisiPossible Technology SolutionsTechn.docx
Chapter 5 Opening Case - DecisiPossible Technology SolutionsTechn.docx
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
 
Past paper of e-commerce 2018-2017-2015
Past paper of e-commerce 2018-2017-2015Past paper of e-commerce 2018-2017-2015
Past paper of e-commerce 2018-2017-2015
 
Reinforcing the Revolution: The Promise and Perils of Digital Transformation
Reinforcing the Revolution: The Promise and Perils of Digital TransformationReinforcing the Revolution: The Promise and Perils of Digital Transformation
Reinforcing the Revolution: The Promise and Perils of Digital Transformation
 
Protect Your Firm: Knowledge, Process, Policy and Action
Protect Your Firm: Knowledge, Process, Policy and ActionProtect Your Firm: Knowledge, Process, Policy and Action
Protect Your Firm: Knowledge, Process, Policy and Action
 

More from jeanettehully

2LeadershipEighth Edition3To Madison.docx
2LeadershipEighth Edition3To Madison.docx2LeadershipEighth Edition3To Madison.docx
2LeadershipEighth Edition3To Madison.docx
jeanettehully
 
2By 2015, projections indicate that the largest category of househ.docx
2By 2015, projections indicate that the largest category of househ.docx2By 2015, projections indicate that the largest category of househ.docx
2By 2015, projections indicate that the largest category of househ.docx
jeanettehully
 
29Answer[removed] That is the house whe.docx
29Answer[removed]                    That is the house whe.docx29Answer[removed]                    That is the house whe.docx
29Answer[removed] That is the house whe.docx
jeanettehully
 
250 words discussion not an assignementThe purpose of this discuss.docx
250 words discussion not an assignementThe purpose of this discuss.docx250 words discussion not an assignementThe purpose of this discuss.docx
250 words discussion not an assignementThe purpose of this discuss.docx
jeanettehully
 
250+ Words – Insider Threat Analysis Penetration AnalysisCho.docx
250+ Words – Insider Threat Analysis  Penetration AnalysisCho.docx250+ Words – Insider Threat Analysis  Penetration AnalysisCho.docx
250+ Words – Insider Threat Analysis Penetration AnalysisCho.docx
jeanettehully
 

More from jeanettehully (20)

250-500  words APA format cite references  Check this scenario out.docx
250-500  words APA format cite references  Check this scenario out.docx250-500  words APA format cite references  Check this scenario out.docx
250-500  words APA format cite references  Check this scenario out.docx
 
2 DQ’s need to be answers with Zero plagiarism and 250 word count fo.docx
2 DQ’s need to be answers with Zero plagiarism and 250 word count fo.docx2 DQ’s need to be answers with Zero plagiarism and 250 word count fo.docx
2 DQ’s need to be answers with Zero plagiarism and 250 word count fo.docx
 
270w3Respond to the followingStress can be the root cause of ps.docx
270w3Respond to the followingStress can be the root cause of ps.docx270w3Respond to the followingStress can be the root cause of ps.docx
270w3Respond to the followingStress can be the root cause of ps.docx
 
250 word response. Chicago Style citingAccording to Kluver, what.docx
250 word response. Chicago Style citingAccording to Kluver, what.docx250 word response. Chicago Style citingAccording to Kluver, what.docx
250 word response. Chicago Style citingAccording to Kluver, what.docx
 
250+ Words – Strategic Intelligence CollectionChoose one of th.docx
250+ Words – Strategic Intelligence CollectionChoose one of th.docx250+ Words – Strategic Intelligence CollectionChoose one of th.docx
250+ Words – Strategic Intelligence CollectionChoose one of th.docx
 
2–3 pages; APA formatDetailsThere are several steps to take w.docx
2–3 pages; APA formatDetailsThere are several steps to take w.docx2–3 pages; APA formatDetailsThere are several steps to take w.docx
2–3 pages; APA formatDetailsThere are several steps to take w.docx
 
2LeadershipEighth Edition3To Madison.docx
2LeadershipEighth Edition3To Madison.docx2LeadershipEighth Edition3To Madison.docx
2LeadershipEighth Edition3To Madison.docx
 
250 Word Resoponse. Chicago Style Citing.According to Kluver, .docx
250 Word Resoponse. Chicago Style Citing.According to Kluver, .docx250 Word Resoponse. Chicago Style Citing.According to Kluver, .docx
250 Word Resoponse. Chicago Style Citing.According to Kluver, .docx
 
250 word mini essay question.Textbook is Getlein, Mark. Living wi.docx
250 word mini essay question.Textbook is Getlein, Mark. Living wi.docx250 word mini essay question.Textbook is Getlein, Mark. Living wi.docx
250 word mini essay question.Textbook is Getlein, Mark. Living wi.docx
 
250 word discussion post--today please. Make sure you put in the dq .docx
250 word discussion post--today please. Make sure you put in the dq .docx250 word discussion post--today please. Make sure you put in the dq .docx
250 word discussion post--today please. Make sure you put in the dq .docx
 
2By 2015, projections indicate that the largest category of househ.docx
2By 2015, projections indicate that the largest category of househ.docx2By 2015, projections indicate that the largest category of househ.docx
2By 2015, projections indicate that the largest category of househ.docx
 
29Answer[removed] That is the house whe.docx
29Answer[removed]                    That is the house whe.docx29Answer[removed]                    That is the house whe.docx
29Answer[removed] That is the house whe.docx
 
250 words discussion not an assignementThe purpose of this discuss.docx
250 words discussion not an assignementThe purpose of this discuss.docx250 words discussion not an assignementThe purpose of this discuss.docx
250 words discussion not an assignementThe purpose of this discuss.docx
 
25. For each of the transactions listed below, indicate whether it.docx
25.   For each of the transactions listed below, indicate whether it.docx25.   For each of the transactions listed below, indicate whether it.docx
25. For each of the transactions listed below, indicate whether it.docx
 
250-word minimum. Must use textbook Jandt, Fred E. (editor) Intercu.docx
250-word minimum. Must use textbook Jandt, Fred E. (editor) Intercu.docx250-word minimum. Must use textbook Jandt, Fred E. (editor) Intercu.docx
250-word minimum. Must use textbook Jandt, Fred E. (editor) Intercu.docx
 
250-500  words APA format cite references  Check this scenario o.docx
250-500  words APA format cite references  Check this scenario o.docx250-500  words APA format cite references  Check this scenario o.docx
250-500  words APA format cite references  Check this scenario o.docx
 
250+ Words – Insider Threat Analysis Penetration AnalysisCho.docx
250+ Words – Insider Threat Analysis  Penetration AnalysisCho.docx250+ Words – Insider Threat Analysis  Penetration AnalysisCho.docx
250+ Words – Insider Threat Analysis Penetration AnalysisCho.docx
 
250 wordsUsing the same company (Bank of America) that you have .docx
250 wordsUsing the same company (Bank of America) that you have .docx250 wordsUsing the same company (Bank of America) that you have .docx
250 wordsUsing the same company (Bank of America) that you have .docx
 
250 mini essay questiontextbook Getlein, Mark. Living with Art, 9.docx
250 mini essay questiontextbook Getlein, Mark. Living with Art, 9.docx250 mini essay questiontextbook Getlein, Mark. Living with Art, 9.docx
250 mini essay questiontextbook Getlein, Mark. Living with Art, 9.docx
 
22.¿Saber o conocer…   With a partner, tell what thes.docx
22.¿Saber o conocer…   With a partner, tell what thes.docx22.¿Saber o conocer…   With a partner, tell what thes.docx
22.¿Saber o conocer…   With a partner, tell what thes.docx
 

Recently uploaded

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
latest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answerslatest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answers
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Basic Intentional Injuries Health Education
Basic Intentional Injuries Health EducationBasic Intentional Injuries Health Education
Basic Intentional Injuries Health Education
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
Simple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfSimple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdf
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 

Running head NETWORK SECURITY RESEARCH PAPER 1NETWORK SECURITY.docx

  • 1. Running head: NETWORK SECURITY RESEARCH PAPER 1 NETWORK SECURITY2 · Marginal draft 1. There is significant work required in future drafts and your final capstone paper. · While you used the CTU APA template, there were a number of formatting errors · Don’t use fully justified text. Text should be left justified. · Incorrect use of headings throughout the paper · Move your research questions to the introduction. · The organization and flow of your paper makes it difficult to follow. Make sure you correctly use headings to separate the major points of your paper and the sections logically flow from one to the next. · I got confused separating the current situation from your research and analysis. · Be clear separating opinion from facts. Include in-text citations to support definitions, and facts from your references. · You must provide more introduction, content, and explanation of tools, concepts, and approaches. Be organized and deliberate on the information making sure it logically answers your research questions. · There are a number of sections that aren’t required and distract from your paper (e.g., proposed solutions, descriptions of future work). · Your writing, grammar, word choice, and sentence structure need improvement. Often, it is difficult to understand your meaning. I recommend you work with the CTU tutor to improve your writing. They can also help with organization and flow. · Work to avoid overusing adjectives (e.g., very, great, crucial, highest). · Minimize use of ‘this’, replace with explicit term meant. · Solid job on your reference page formatting. · Please see detailed comments embedded in the paper.
  • 2. Item Points Awarded Report Template Preparation 10 8 Sections of the Body 15 11 Outline 10 9 References 5 5 Editing 10 6 Late Penalty -7 Total 50 32 COMPUTER SCIENCE CAP STONE PAPERComment by Keith A Hartley: This should be the title of your paper’s topic. Student’s Name : Ritesh Parepally Colorado Technical University
  • 3. Abstract Comment by Keith A Hartley: Recommend you remove all these extra spaces and use the “page break” command to force a new page.
  • 4. Comment by Keith A Hartley: Remove all extra spaces. Contents NETWORK SECURITY OF ONLINE E COMMERCE WEB SITES USING GENETIC ALGORITHM AND IMPROVING THE FRAMEWORK3 Introduction3 Problem description3 Current situation4 Use of anti-malware and antivirus8 Securing the website through the use of SSL certificates8 Additional research I will do9 Proposed Solution 10 Project scope11 Importance of capstone project11 Conclusion.…………………………………………………………… ……………12 References…………………………………………………………… …………………..14
  • 5. NETWORK SECURITY OF ONLINE E COMMERCE WEB SITES USING GENETIC ALGORITHM AND IMPROVING THE FRAMEWORK Comment by Keith A Hartley: This should use the ‘normal’ text style and not be in all caps. Introduction This is a research paper that focuses on network security of online e- commerce web sites. Rrapid increases in internet use is are significantly affecting e-commerce websites in the modern environment. This project aims at examinesing the type of security threats that exist in the e-commerce websites and the appropriate measures to ensure the security of the sites.Comment by Keith A Hartley: Solid introduction. Be diligent on your grammar. Also, you should explicitly include your research questions in the introduction. [Don’t fully justify your text. The APA style is left justified only. Use the ‘normal’ style in the template. It will ensure the proper formatting.Problem description With the drastic increase in the use of e-commerce websites today, security threats to the sites have also increased tremendously in the past few decades. Maintaining the security of e-commerce is very paramount as there has been a drastic increase in the amount of sensitive information that is sent of the e-commerce websites (Laudon & Traver, 2016). This has attracted many cyber thieves to the growing area with the
  • 6. intention of getting customers confidential information. This calls for the e-commerce websites to be protected, and this is the reason why most of the institutions today are in a move to ensure that their websites are fully protected from any form of cyber threat. Some of the customer’s concerns are due to an increase in the credit card frauds witnessed in recent times, where several customers have lost a lot of money due to fraudulent activities. Among many security issues raised by customers includes credit card security as well as the privacy of their data present in the e-commerce websites. Through the use of credit card credentials, an unauthorized person can obtain goods even without paying or use it to get money from an account.Comment by Keith A Hartley: Provide an in-text citation to support this statement.Comment by Keith A Hartley: Wrong word – not exactly sure what you’re trying to say.Comment by Keith A Hartley: What? Explicitly state what you mean Be careful with indefinite articles like “this”. It is often not as easy for readers to know what you mean.Comment by Keith A Hartley: Replace with what ‘this’ means.Comment by Keith A Hartley: Re-write for greater clarity.Comment by Keith A Hartley: Re-write for clarity. Add an in-text citation to support this statement.Comment by Keith A Hartley: Meaning unclear as written.Comment by Keith A Hartley: Re-write.
  • 7. Comment by Keith A Hartley: Remove all extra spaces. This mainly occurs when a hacker gains access to customer personal data, especially payments information. This usually happens when a hacker penetrates an e-commerce database website through the application of malicious software. Among other security concerns includes a man in the middle attacks where attackers gain access to the communication between the e-commerce website and the customer. Distributed denial of service is another threat where attackers send many requests to their servers. An increase in malicious programs and worms is another security issue that is taking a toll on the e-commerce industry where attackers inject infected files in the websites intending to gain access to the online stores. An increase in spammers is also hitting more on e-commerce websites whereby spammers introduce infected links in customer’s e-commerce inboxes and thus compromising on the site speed and security. It is paramount to ensure that the e-commerce websites are protected to ensure that the security of the customer information is secured and protected from malicious access by unauthorized personnel as most of the stored data is very sensitive.Comment by Keith A Hartley: Replace with explicit term.Comment by Keith A Hartley: Provide an in-text citation to support this
  • 8. statement.Comment by Keith A Hartley: What other security concerns. This sentence should be re-written for clarity.Comment by Keith A Hartley: Provide in-text citations to support these statement. Current situation Due to the increase in the growth and use of the World Wide Web, there has been an increase in new designs and development of online information (Laudon & Traver, 2016). Most of the e-commerce websites are currently loaded with a lot of customer's data due to the rapid increase in the number of customers that are using e-commerce websites today. The increase in the number of e-commerce buyers is due to the rapid increase in e-commerce applications. Due to the fact that through e-commerce websites, individuals are able to obtain nearly everything they want just by a click of a button, many individuals find it worthwhile to shop using e-commerce websites. It is projected that e-commerce activities are likely to increase at a higher rate in the coming years than it has ever been expected before. Going by the survey conducted by the authenticating survey, e-commerce activities are likely to be more than 200% by the year 2020 as compared to the year 2014. This clearly means additional of more information to the e- commerce websites as more and more customers will be joining
  • 9. the platform.Comment by Keith A Hartley: Support with an in- text citation.Comment by Keith A Hartley: Support with in-text citation.Comment by Keith A Hartley: Not sure this is a fact. It reads more like your opinion. If you have one, you should support with an in-text citation.Comment by Keith A Hartley: Support with an in-text citation.Comment by Keith A Hartley: Re-write to use in-text citation.Comment by Keith A Hartley: Re-write for clarity. This overloading of customer information on e-commerce websites makes most customers feel frustrated, lost, and insecure, mainly due to security reasons of their stored data. Currently, the e-commerce owners are working out on how to improve the security of e-commerce websites to ensure that maximum protection is achieved for online transacting customers. The e-commerce owners are mostly concerned with the available facts that should be implemented to ensure that customers can conduct secure transactions when using e- commerce websites. The main writing objective of this paper is to ensure that readers can get insights about web technology that will help online to conduct secure online transactions. Also, the article paper will highlight some security suggestions and tricks. It is very paramount for e-commerce owners to ensure that customers are comfortable and have trusted e- commerce websites when doing business online. Among most of the customers, worry includes loss or access to their data,
  • 10. especially the data in their credit cards, as well as the fear of viruses and worms (Laudon & Traver, 2016). Denial of service is another challenge that is faced with e-commerce websites where an attacker sends overwhelming requests to e-commerce servers with untraceable IP addresses. Denial of service attacks is likely to bring the activities of an e-commerce website to a halt or slow. The use of password encryption is a way that is currently used to protect the password from Trojan attacks, viruses, or other worms. To attain a high level of security, organizations are going top-notch, where they are using encryption techniques to ensure high-security levels (Held & Bowers, 2001). The project research question includes: Comment by Keith A Hartley: Fact or your opinion? If fact, support with an in-text citation.Comment by Keith A Hartley: You’ve discussed significant increase, but not overloading. How is the information overloading websites?Comment by Keith A Hartley: Not sure what you mean by available facts? Expand or re-write.Comment by Keith A Hartley: This is not an article.Comment by Keith A Hartley: Use a more scholarly/academic term.Comment by Keith A Hartley: Compare to what other challenge? Unclear as written. Also – provide an in-text citation to support.Comment by Keith A Hartley: Why is it likely?Comment by Keith A Hartley: This discussion on passwords and encryption seems abrupt and
  • 11. doesn’t flow with the rest of the paragraph. Introduce and support with an in-text citation.Comment by Keith A Hartley: Is this still related to password encryption or the other information discussed in this paragraph? Re-write to improve clarity.Comment by Keith A Hartley: Replace with academic/scholarly term.Comment by Keith A Hartley: Move to Introduction. i. What is the importance of maintaining data integrity and confidently in the e-commerce business? ii. What are the benefits that arise from proper data protections iii. What are the risks that arise from poor data protection of the e-commerce websites With the advancement in the internet today, commerce activities are shifting from the traditional mortar and bricks store to the use of e-commerce where the internet facilitates everything. The success of the e-commerce business mostly relies on customer trust and the security of the e-commerce platform website. To gain the confidentiality of the customers, the e-commerce website owners should invest all possible measures to ensure that there attain the highest security levels for the websites. Comment by Keith A Hartley: This would be better at the beginning of the current situation sectin.Comment by Keith A Hartley: Re-write for clarity.Comment by Keith A Hartley: Unlikely. No business can afford all possible measures. There are three fundamental concepts in security, which are
  • 12. integrity, confidentiality, and availability. Comment by Keith A Hartley: Support with in-text citation. Consider making this a sub-section. It would be easier to read and understand. Through the confidentiality principle, only authorized personnel are required to access information. This ensures that only individuals who are authorized access to specific data. Without proper data confidentiality, people who are not allowed to access data access to the data, and thus, a data breach happens. Due to the fact that most of the e-commerce websites contain very crucial customer data, it is very crucial for these sites that the data is protected from cybercriminal. To achieve this, the principle of data confidentiality should be adhered to and not at any particular time should an unauthorized individual be allowed to access the customer’s data and information. Comment by Keith A Hartley: Support with in-text citations. Data integrity is critical information security. It is essential for e-commerce owners to ensure that the customer's data are kept with the highest integrity level. One way through which customer's data in the e-commerce business can be kept safe is through maintaining data integrity (Held & Bowers, 2001). Since e-commerce business activities happen over the internet, it is not merely to record events that take place and thus the importance of data being non-repudiation taking place. Through the non-repudiation principle, security levels are added as they
  • 13. ensure that either party cannot deny data sent over the internet. This principle is fundamental as it ensures that the fear of insecurity among many buyers, especially those that feel that transactions may not be secure, is reduced. For an online business to be successful, online business dealers need to come up with different insurance plans. Comment by Keith A Hartley: Support with in-text citations.Comment by Keith A Hartley: Re- write for clarity. Support with in-text citations. The last data principle is availability. This means that data should always be available and accessible for use by authorized users. In case attackers are able to bring down an e-commerce server successfully, it means that data will not be available for users. Ensuring the security of an online e-commerce business is very crucial and cannot be neglected at any cost. It is essential for companies as it ensures that customers can transact their business smoothly and are secure (Held & Bowers, 2001). Through providing proper security measures, the e-commerce business can protect itself as well as its customers from cyber- related attacks. To ensure that the e-commerce businesses are entirely the owners of e-commerce should provide:Comment by Keith A Hartley: I disagree. Support with in-text citations or re-write to be more realistic.Their serves and admin are secureComment by Keith A
  • 14. Hartley: Re-write the title to improve grammar and clarity. Is this supposed to be a sub-section under Current Situation? In most cases, the e-commerce platforms usually come with a default password, which is very easy to guess. It is, therefore, essential to ensure that these passwords are changed and a stronger password used instead so that to prevent chances of hacking. The e-commerce owners should provide to use multiple usernames and passwords and ensure to change them from time to time. It is also essential to ensure that the project can give a notification in case an unknown platform tries to log into the system.Comment by Keith A Hartley: Opinion? I disagree. Support with an in-text citation or re-write.Comment by Keith A Hartley: This paragraph is unclear. Add more content and explanation. How does this relate to your research questions.Use of anti- malware and antivirus Comment by Keith A Hartley: Why is this a level 1 heading?Comment by Keith A Hartley: Every sentence begins with ‘through’. Re-write. Through the use of stolen cards, hackers can place orders even without the notice of the owner. Through tThe use of antivirus and malware can help to reduce this fraud. Through the use of anti-fraud and antivirus can be used to deal with some of the issues associated with e-commerce. Through the use of sophisticated algorithms, they can flag any malicious transactions and thus giving the e-commerce website owners a
  • 15. chance to take proper measures. The use of anti-fraud and antivirus helps companies to develop a fraud risk score, which helps in determining the legitimacy of transactions.Comment by Keith A Hartley: What’s a fraud risk score? Securing the website through the use of SSL certificates Secure sockets layers (SSL) are certificates that are used to link a transaction to different network paths. They are most often associated with details of a credit card as well as transaction details. During transmissions, the SSL certificate ensures that the transmitted data is encrypted and thus preventing any interception during the transmission (Held & Bowers, 2001). The use of SSL certificates is essential as it ensures the sent information from one destination to another. Owners of e- commerce websites should strive to use SSL certificates to ensure the security of all transactions that take place.Comment by Keith A Hartley: I don’t think this is correct. Review and update. Support with in-text citation.Comment by Keith A Hartley: Strive means it’s optional? Is that what you mean? Why wouldn’t or couldn’t a company use SSL? Through the application of multi-layer security, e-commerce such as a content delivery network (CDN) to protect the sites, especially from DDoS attacks, as well as malicious traffic. The filtering of malicious traffic is mainly achieved through machine learning. Application of two-factor authentication
  • 16. plays a critical role also in meeting the security of e-commerce websites. This is primarily achieved by sending an authentication message to the user email, or an SMS to the users registered phone number (Dixit, 2016). This is very important as it only ensures that only the users have an opportunity to access the services and thus reducing the chances of data breaches and fraud. Comment by Keith A Hartley: What is multi-layer security? Are you going to introduce and explain this concept?Comment by Keith A Hartley: Spell out acronyms the first time they are used.Comment by Keith A Hartley: Really? Support with in-text citation.Comment by Keith A Hartley: What is two-factor authentication? Introduce, explain, and provide in-text citations.Comment by Keith A Hartley: Spell out.Comment by Keith A Hartley: Re- write for clarity. With the current increased in customers' concerns about the integrity and confidentiality of their data, most of them are majorly concerned with the authorization and privacy of e- commerce websites (Dixit, 2016). This is because the more customers are sure that the security of their data is secure, the more they are likely to be satisfied with the provided services. Apart from benefiting customers, data security is of great importance to the organization as it ensures the organization does not suffer from significant losses associated with data
  • 17. breaches. It is crucial to ensure the encryption of data to ensure maximum security is achieved. One of the highest priorities is providing customer’s data, and transactions are safe, as this enhances the loyalty of the users, which will lead to an increase in customers due to the rise in better customer referrals (Reuvid, 2005). Because the security of e-commerce is very paramount, more research needs to ensure the effectiveness of the various methods that can be used to enhance the safety of e- commerce websites. More research needs to be conducted to ensure the safety of e-commerce is attained.Comment by Keith A Hartley: Verify this is an accurate paraphrase of the source.Comment by Keith A Hartley: Re-writeComment by Keith A Hartley: This is confusing since it seems to be going back to a generic discussion of the problem/current situation after talking about specific technical recommendations. Additional research I will doComment by Keith A Hartley: I did not grade any of this. Your draft capstone papers should only include work you’ve done not what you will do in future drafts. Security is vital in the modern-day, and this is what most organizations are spending most of their time trying to achieve. I will evaluate the importance of cloud computing in enhancing the security of e-commerce business. Cloud computing refers to the delivery of resources, especially computer resources, which
  • 18. includes databases, servers, software, and networking, to data centers through the use of the internet. Through the use of cloud, computing users are able to enjoy elastic resources in a manner that satisfies their demands. With most organizations moving their resources to the cloud, cloud providers have come up with different strategies to ensure that maximum data protection is achieved. To achieve maximum data protection, cloud computing combines numerous control levels and thus creating better atmosphere conditions for businesses. To fully understand the importance of cloud computing, I will evaluate how companies that have adopted the use of cloud computing have benefited and enhanced their e-commerce websites. In addressing this, I will look at benefits that arise from taking to cloud computing services as well as the risks associated with the same. I will also address how cloud computing enhances the security of different stored resources. I will also evaluate other best measures that can be put in place to ensure that the security of e-commerce websites is achieved.Analysis and Methods, I will use I will analyze some of the multinational companies that have adapted and shifted to cloud computing. I will also take other organizations that have not moved to cloud computing technology so that to effectively compare the benefits as well as the risks which arise from adapting to the cloud computing technology (Reuvid, 2005). Also, through the comparison, I will
  • 19. be able to understand the reasons why some of the companies have shifted to cloud computing technology and why some are reluctant to adopt cloud computing for their e-commerce websites.Proposed