Professional Documents
Culture Documents
E-Commerce, Cyber Security and Cloud Computing
E-Commerce, Cyber Security and Cloud Computing
E-Commerce, Cyber Security and Cloud Computing
E-commerce,
Cloud computing
and Cyber
security
A look at the concept, opportunities and
threats
Zainab Aftab
E-commerce
DEFINATION
Table 1.0
There are a number of internet users who use their large social
followings to promote various goods and services. These people,
known as influencers, present a powerful marketing opportunity.
for savvy eCommerce sellers.
With social media becoming such a huge part of our everyday
lives, influencers are set to play an increasingly important role in
how products are marketed — and eCommerce stores are best
positioned to take advantage of this.
THREATS
HERE ARE FOUR THREATS FOR THE E-COMMERCE
INDUSTRY:
Competition
Although the eCommerce industry’s low barrier to entry is, on the
one hand, Strength, it also poses a significant threat for existing
sellers. This is because of how easy it is for just about anyone —
anywhere — to launch a new eCommerce store and compete with
other online shopping businesses. It’s important to know that this
element of competition doesn’t affect the success of the eCommerce
industry as a whole, but affects individual businesses.
Fraud
The world of eCommerce is fuelled by digital payments,
whether that involves credit or debit cards, bank
transfers, or even cryptocurrencies. This makes it a huge
target for fraudsters, who now have an easy way to cash
out on their illicit activities. Fraudsters can buy goods
online using others’ payment details — while staying
completely anonymous — and send those items to
neighborhood doorsteps, where they’ll be swiped while
the homeowner is out at work. Unfortunately, it’s
incredibly difficult to combat internet fraud, which is
why it’s such a big threat for the industry.
Data concerns
Aside from blatant fraud, there’s a lot of potential for things to go
wrong with online shopping — especially when it comes to users
data. Shopping online requires you to hand over a lot of sensitive
data, including your payment details, address, and other assorted
information. If this information gets into the wrong hands, it can
have devastating consequences. Also, since the introduction of new
data-related regulations like the European Union’s GDPR, there are
new complexities in the data aspects of running an online business.
Monopolies
Cloud Computing
Security
Many cloud providers offer a broad set of policies, technologies,
and controls that strengthen your security posture overall, helping
protect your data, apps, and infrastructure from potential threats.
SWOT ANALYSIS ON
CLOUD COMPUTING
Cloud computing is defined as "future of internet" and has the potential to be
widespread in the world
At the underlying philosophy of cloud computing lays the wide usage area of
Internet. In the course of time, the numbers of companies increase for using cloud
computing.
In the past, users used to download software and ran it on their personal
computer. Later on servers began to give this service in a faster and more reliable
way.
Whereas internet begins to use all over the world effectively, cloud computing
begins to more popular.
Because of that, attributes of cloud computing should be analyzed.
SWOT analysis which is one of the analysis methods to find attributes of a system
finds out strengths, weaknesses, opportunities and threats of cloud computing in a
systematic way. Assessments of SWOT analysis are depicted in Table I:
internal origin is consists of strengths and weaknesses of a cloud computing svstem.
Strength areas
• preserved and managed
carefully. It not these areas may pass through weaknesses easily
Weaknesses also are in the internal areas Cloud computing service providers or administrators should manage
these areas with proper and enfectve metnods not on v to keen threats awav from the svstem but alsc to
transtorm these weaknesses areas to the strength
areas. On the other hand weakness areas should be monitored ever time and prevent from transforming to the
threats.
Internal origin areas can be controlled by cloud computing service providers or administrators with a right
strategy. But cloud computing service providers
o conlo ine exteman areas
External origin is consists of opportunities and threats of a cloud combuting svstem.
Managing
• external origin is more ditticult than
internal origin because of depending to out of cloud computing system. Therefore external origin cannot be
controlled all time directly. Thus administrators of cloud computing should be aware of external origins
Tront strateoles and memoas
opportunities can be taken
Threats should be monitored and analvzed ever time because they are not onlv harmfu but also in the external
origin side. Cloud computer providers and administrators should get under contro the threats Especially
information security threats must be suppressed with attention. If external origin areas cannot be managed,
there is no benefit of strength
security Hacking
Social Engineering
Physical Security Attacks
Viruses and Malware
(malicious software)
Ransomware attacks
CYBER SECURITY
Cyber security is the practice of defending
computers, servers, mobile devices, electronic
systems, networks, and data from malicious
attacks. It's also known as information
technology security or electronic information
security. The term applies in a variety of
contexts, from business to mobile computing,
and can be divided into a few common
categories.
What are the types
of cyber security
Multiple types of cybersecurity work together to protect an
organization’s IT environment. Types of cybersecurity
include:
1. Network security
2. Application security
3. Endpoint security including Internet of Things (IoT)
security
4. Data security
5. Identity and access management (IAM)
6. Database and infrastructure security
7. Cloud and mobile device security
8. Disaster recovery and business continuity planning
What to expect in 2023
We can’t predict the future, but one certainty
remains: the number of cyberattacks will
continue to increase in 2023. The costs of
cyberattacks will also increase due to several
factors: worldwide inflation, energy crisis,
geopolitical conflicts, and expansion of the
organizations’ attack surfaces. On the other
hand, crises can sometimes be seen as
opportunities, leading security vendors to
innovate in order to provide better products
and services. Moreover, organizations will
demand new and more powerful solutions to
face cyberattacks and reduce the risks.
https://sell.amazon.com/learn/what-is-
ecommerce#:~:text=Ecommerce%20is%20a%20method%20of,
media%20to%20drive%20online%20sales.
https://www.techtarget.com/searchcio/definition/e-commerce
Reference https://www.google.com.pk/search?
Page q=eccomerence+concept+opputunities+and+threats&ie=UTF-
8&oe=UTF-8&hl=en-au&client=safari
https://azure.microsoft.com/en-us/resources/cloud-computing-
dictionary/what-is-cloud-
computing#:~:text=Simply%20put%2C%20cloud%20computing
%20is,resources%2C%20and%20economies%20of%20scale.
http://www.iraj.in/journal/journal_file/journal_pdf/5-131-
143099374360-63.pdf
https://www.javatpoint.com/what-is-cyber-security