P. 1
e.commerce

e.commerce

|Views: 834|Likes:
Published by san143

More info:

Published by: san143 on Jan 06, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

01/06/2013

pdf

text

original

It’s a known saying Prevention is the best medicine and this implies equally well to

compute security. The” first step is to keep the security of your data files such that only the

right people can see them. This is especially crucial for any of the following types of data

and files.

User passwords

Billing files

E-COMMERCE TECHNOLOGY AND MANAGEMENT

NOTES

229

ANNA UNIVERSITY CHENNAI

System and user logs

Credit card information

Trusted remote system information

Compiler

Administration tools

User passwords and usage logs should be kept secure to keep pirate from looking

at those files to figure out how to gain further access to your system. Keeping your password

files shadowed or hidden keeps pirates from remotely acquiring your file and then running

password cracking programs on the file in their own time.

Finally, be sure to protect administration tools as well as compiler. General users

to your system should not have access to these tools because, if they fall into wrong hands,

the tools can be used to create programs that aid the pirate in greasing security.”

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->