Threat of online security..


Nowadays, people rely on computer to create, store an manage critical information. Consequently, it is important for users to aware that computer security plays a major role in protecting their data from loss, damage, and misuse. Similarly, online security has been online trader's main concern in protecting their websites from potential threats, such as phishing, security hacking, information theft, virus, worms and etc.

However, the increasingly developed technologies sarcastically increase the risk every computer user faced. Everyone who owns a computer with internet connection is able to equip themselves with 'hacking' knowledge by making some research online. Internet provides the opportunities for users to share the knowledge without filtering the content. Therefore, everyone can learn skill that may jeopardize online security via internet and therefore increase the online security risk.

Nowadays, computer users are facing the threats of cybercrime, phishing, internet and network attacks such as computer viruses, worms, Trojan horses and back doors.

Cybercrime is defined as online internet-based illegal acts. Hackers, crackers and corporate spies is part of cybercrime, who have advanced computer and network skills that access into computers and networks illegally with the intention to destroy data, stealing proprietary data and information.

Phishing is a scam in which a perpetrator send an official looking email that attempts to obtain your personal information and financial information. In other words, this method is to collect information through fake websites. For example, some phishing email messages ask you to reply with your information, or a pop up window that looks like a website, that collects the information. The damages caused by phishing can be crucial. The following case illustrate potential thereat caused by phishing.

For example, in 21 June 2007, a spear phishing incident at the Office of the Secretary of Defense (OSD) stole sensitive U.S. defense information, leading to significant changes in identity and message-source verification at OSD. This incident has cost administrative disruptions and personal inconveniences, as well as huge financial loss in making system recovery. More info..

Internet and network attack that jeopardize security include macro virus, worm, and Trojan horse.

Macro virus is a piece of code that is secretly introduced into a system in order to corrupt it or destroy data. Macro virus such as Melissa and ILOVEYOU were propagated through Microsoft outlook email and whose payloads were delivered as Visual Basic for Application (VBA) programs attached to email messages. Virus attack can damage the operating system, causing the loss of data and other possible losses.

A worm is a program that runs independently, copies itself repeatedly and consuming the resources of its host in order to maintain itself which it is capable of propagating a complete version of itself onto another machine. The repeatedly copied files use up the available space and slow down a computer operating speed.

On the other hand, a Trojan horse is a program that appears to have a useful function but that contains a hidden function that presents a security risk. Trojan may arrive in the form of file that looks like an interesting game or program. When this program is run, the Trojan program is installed and executed every time the attacked computer is turned on. This particular Trojan horse enabled the perpetrator to capture user Ids and passwords, to display, delete messages and upload files on the affected computer.

A back door is a set of instruction in a program that allow users to bypass security control when accessing a program, computer, or network. Once perpetrators gain access to unsecured computers, they often install a back door or modify an existing program to include a back door, enabling them to continue access the computers remotely without user's knowledge.

In conclusion, risk exposed by computer users is increasing with the developed technology. therefore, safeguards developer must be always up to date to enhance the defenses against online security threats. In the same time, users must be educated and informed about the crucial damages and loss caused by imposing online online security threats.

Prepared by Wong Kai Lei

Reviewed post: Identity theft-Cases on stolen laptops, hacking and lost CD



I read a post which is about the identity theft and i reliased that how a grave consequance will happen if we do not get awareness of this issue. As identity theft is a crime of stealing someone's personal, identifying information for the purpose of using that information fraudulently. Those personal and identifying information are including social security numbers, credit card and banking account numbers, usernames, passwords and patient records. While these information have been stolen which helped the criminal do the fraudulent activities such as opening new credit accounts, taking out loans in the victim's name, stealing money from financial accounts, or using available credit. There are a lot of cases are happened around us as the victims were be in a huge debt but without applying any loan.



Trickier Methods that would use by Identity Theft
Hereby i would like to share with you some of the trickier methods which identity theft usually use and we should get to know more about their tactics as we can alert of not being one of the victims.

1. Pretexting

A trickier method that thieves fabricate false pretenses under which to obtain your sensitive financial information from banks or other financial institutions. For example, they will impersonate as your relative and obtain your information from a phone company or bank.

2. Direct Theft



It is an straight line method for stealing information directly from you. They can directly get your credit card information, bank statements, and the like by stealing your mail, swiping your purse or pickpocketing your wallet.


3. Skimming

Skimming is where the theft use sophisticated storage device to connect with a card reader and then access that information for malicious use. While this is a very perilous trick as such a device can directly be installed on any legitimate card reader without recognition the card reader is compromised.

4. Redirecting your mail

It is where those companies send a change of address form and from this, theft will divert your mail to a separate address and gain access to your account statements and other information. As another word, they will directly steal from your mailbox.

5. Phishing

It is using fraudulente-mail messages that appear to come from legitimate businesses in order to gain the personal information. Those personal data such as account numbers and passwords, credit card numbers may be abused by theft.





Does Encryption is useful for protecting your personal information?
It can't deny that encrytion will help us to protect our personal data but for me, this is a subjective question. For my opinion, eventhough there are a lot of high technology of encrytion to secure the data. However there are still a lot of hackers successful broke in to get those high confidential data.
Some of the cases happened were due to the people carelessness. Some of the businessmen send their notebooks for maintenance service but they did not store those customers confidential information in a secure location where it will give a chance to competitors stole their information.

Nomatterhow, we still have to prevent those identity theft. Here are some ways which i would like to share with you:
  • Protect your Social security number
  • Treat your trash and mail carefully
  • Be on guard when using the Internet
  • Select intricate passwords
  • Verify sources before sharing information
  • Safeguard your purse and wallet
  • Store information in secure locations
At last, i want to share my personal experience with you. It is a real life case.


During the time when i get hurry to search a good university or college to further my study, i received a private call. The person that talking on the phone is a China girl who speak with China accent. She promoted me to study at China and kept persuaded me with a lot of reasons. I asked her how she can get my phone number and she told me that may be when my friends applied for the China University form and give them my number.
Come on!!! This is a one of the trick as they have gained access to the school and obtain those student data. Therefore, we should always alert of this kind of phone call or email to avoid be trapped into a snare.

Reviewed post from:
Prepared by Wong Chuan Chi

Google Changes Everything


" If you were confusing of something, just go and 'Google Up'. We always heard of this word -- 'Google Up'. What does it mean? Generally, it means that we would be able to look up and search for whatever information that is needed by surfing Internet using the google software.
Google was developed by Larry Page and Sergey Brin who was joined in later in year 1996 when they were pursuing their Ph.D in Stanford University, California. The domain google.com was then registered and incorporated as Google Inc in year 1998. The name ' Google' originate from a common misspelling of the word ' googol' . Its mission is ' to organize the world's information and to make it universally accessible and useful'. This search engine had attracted a growing number of users especially teenagers and youngsters who fond of its simple design and useful results since its development.
Nowadays, Google is well known of its web search engine and it even ahead of Yahoo and Live Search. Google consists of billion of web pages to enable user to 'google' for the information they required by merely key in the keywords although sometimes it only generate a maximum amount of 1000 results for specific query. Apart from searching information, Google also included a various type of services such as Image Search, Google News, Google Product Search, Google Groups, Google Maps, Google Earth, Google Video, Google Translate, Gmail and so on.
Gmail also known as Google Mail is a free web-based e-mail services. We can use it to search for our daily e-mails. Google Video is another useful and free video sharing websites which enables users to upload, search and watch videos from the larger Internet. It is very similar to YouTube. We can use this provided services to share funny, interesting and meaningful videos with people all around the world. Google Translate is also an useful services cater by Google Inc. It can translate a section of text, messages and even web pages into another language that the user desire. By using this services, languages barriers is no longer a problem to anyone of us, we can select whatever language that is suitable and convenient to us during net surfing.
Another usefulness of Google is fast and convenient. Why do I said so? Well, let's have a 80th flashback. We always heard of our parents, relatives, lecturers said that Y Generation students are so lucky and fortunate as they can easily completed their degree by using advanced technologies. Yup, they are right. Students nowadays are doing easier in their studies compared to our seniors. They are able to complete their assignments and thesis in a shorter time as they would not need to go to the libraries to search and look for necessary information. What they need to do is just finding the relevant information through Internet by " Google Up".
In conclusion, Google is a very beneficial web tool in tackling our daily requirements and problems. It makes our life more interesting and easier. Thus, whenever you are confusing or curious of something, what you need to do is just.......... 'GOOGLE UP'.
Prepared by Chong Hui Qi'

Internet is a public network that connecting millions of computers throughout the world. Through telephone wires ans satellite links, internet users can share information in a variety of forms. It si very convenient as we do not need to use other traditional method anymore, but Internet is not a safe place anymore because hackers have te ability to intercept and use some information sch as credit card numbers and expiry dates to falsely do transactions. Data is sent back and forth through various servers which personal information and financial data are being housed. We need to take some precautions to increase internet security and decrease date stolen probability.

How we want to avoid the ttheft from the website? There are some suggestions stated below:

Use password that are hardly to guess

To protect information on the Internet and networks, variety of encryption techniques are being used to keep data secure and private. Encryption is a process of converting readable data into unreadable characters to prevent unauthorized access. Avoid using passwords that are easy for someone to guess such as, birth date or own name. If it is possible, use a combination of numbers and alphabets. Do not ever write down the password and put it into briefcase or wallet.

Do not give personal information to unknown parties

Avoid giving your personal information to unknown parties online, via e-mail and over the phone. Personal Financial Information such as name, date of birth, telephone and identity card number should not be given through online although the mail comes from the bank or other important management that handled by behalf of the institution or its affiliates.

Regularly scan computer

Do regularly scan computers using legitimate anti-spyware program to scan your computer and remove any infected files because spyware can be hidden in software programs that may affect the performance of your computer and give attacker access into the data.

Biometric fingerprints

Use a high technology security or any powerful tools which are easier and convenient for you to protect data. As technology is advancing, many system or parts are now provided with fingerprint access. Biometric fingerprint can be used to prevent unauthorized physical and logical access to factory, warehouse, office, laboratory, ATM machines, notebook PCs and any other computer network. Benefits of using this method are it wont lose although it is being stolen n which the theft will not be able to access into the private data .

Avoid accessing financial information in public

Prevent logging to check any bank balance or other private data when using a wireless access that provided by outside coffee shop or public. Although these systems are convenient, but you do not know how sturdy their firewalls are.

Additional informations:
1) Six ways to safeguard your online assets

2) Keep your financial data safe online

prepared by Wong Kai Lei

One of the most famous example of e-commerce failure would be the e-tailer Boo.com which was launched on 3rd November 1999, that added fears about stability and viability of existing and other future online retailers. Boo.com was funding by investors such as Benetton and Bernard Arnault, the chairman of LVMH, Europe largest luxury goods group. This Boo.com not only become the most heavily funded Internet start-up in Europe but also become the high profile. But, the launch has delayed for six months due to technological problems that reported from various sources. Huge spending on consulting fees in order to launched the website and $6 million was spent in fashion ware which has to be discounted in the end because it was no longer fashionable by the time the site was eventually launched. In addition, slow browsing, poor navigation and irritating technology make lost of potential customer and gained Boo a bad reputation.

Reason of failure include poor web design usability where products are zoom all around the page an customer need to practically have to play target practice in order to select the product they want. there were several reports of 'computer text' appearing in web browser instead of graphics, and complaints that customers were unable to purchase products. The Financial Times reported that one customer have been advised by Boo to "limit the amount of transactions they made, to three per twenty minutes". Obviously, this kind of approach could discourage potential and existing customers from shopping over the internet at all. It is very clear from the customer poor online shopping experiences, there was no sufficient testing was undertaken nor were their circumstances were taken into account. E-businesses should ensure their sites are fully tested and refined before promoting them otherwise they will risk losing customer as well as revenue. Test should incorporate actual audience members and include some professionals, and those who know little about trading and those who had never traded online.

With bad marketing, Boo marketed itself as a premium sports, urban street wear and fashion retailer, stocking quality products for the conscious young individual. Premium products came with expensive charges but customer are attracted more to by online at cheaper prices. When clothing is view to be important with nature behavior of customer like to see, feel and try on items before buying, Boo.com's clever teccnology enabled shoppers to view the items in 3-D and gave a distinc visual feel of the products. unfortunately, they did not account for the key internet driver-lower prices. Apart from that, brands that involved in Boo.com did not wish to offer discounts as it will devalue their brand. The publisher of 'Computing' show the three main reasons for web purchases in UK as 'easy and convenience', 'better prices' and 'speed of process', but Boo.com fulfilled none of the criteria.

Pattern of spending from technology cost was the construction of Boo's technology platform which involved hefty programming for multi-currency sales and product delivery. In addition to the initial outlay of the website, there were high maintainance expenses with five thousand pounds a month for creating 3d photographs of its products for the website. There is also feedbackfrom employees about excessive employment benefits and luxurious spending but these benefit were later justified as in order to attract 'some of the brightest brains in Europe'. Although there had been improvements in the website, but Boo.com was forced into liquidition when it's investor refused to inject any more cash into the business as it had already spent $380 million. Boo did suceed in creating a 'hip and trendy' image suitable for attracting young shoppers but on the other hand, the performance of the site gave the brand a reputation of being customer unfriendly.

A website should be vigorously tested and the structure and site should be completely ready before marketing the brand. using professionals to ensure the site is one hundred percent robust, will deter any embarrassing publicity from damaging the brand and ensuring customers of a stress free shopping experience. budget and sound marketing plan should be in place beforehand and followed. Expensive advertising campaigns maybe effective, but more investment should be placed on retaining existing customers through good Customer Relationship Management.

Prepared by Wong Kai Lei



When a discussion was given in the topic of the successful E-Commerce nowadays, for sure Amazon, Ebay, and Dell will come to mind. We will discuss and share with you one of the mentioned company which successfully captured the consumers' heart, ebaY.




eBay, the world's largest online marketplace which offer a great opportunity to consumers in buying and selling any item at anytime. The key success that ebay hold which is built on commerce, sustained by trust, and inspired by opportunity. What make the global leader with million of people everyday on commerce? Online payment and communication would be some of the others criteria that cause ebay success. Those corporate media with ebay which are paypal, Skpe, Shopping.com, StubHub and Stumble Upon .


Get to know how success ebay is, let's have a quick view of ebay.
  • eBay was founded in September 1995
  • It has a global presence in 37 markets, including the U.S
  • It has 233 million registered users worldwide
  • Its marketplaces net revenue for first quarter 2007 totaled $1.25 billion, with 49% from US operations and 51% from our International business
  • ebay users worldwide trade more than $1.839 worth of goods on the site everyday second
  • Approximately 1.3 million sellers around the world use eBay as a primary or secondary source of income.
  • September 2006, eBay members worldwide have left more than five billion feedback comments regarding their eBay transactions
sources from:
http://pages.ebay.co.uk/community/aboutebay/news/pressreleases/fastfacts/04_2005.html


eBay success causes
There may have some causes to make eBay a successful E-commerce. One of the reasons is offering an exciting feature which provided buyers and sellers a quick, easy, and safe way to negotiate price online. It helps the consumers bargain for the best price on eBay and this would probably build customer satisfaction as to bid desired item at reasonable price. ebay extensively offers products in different categories such as collectible, vehicles, real estate, office equipment and others. It has a safe and reliable reputation protected by the company.
eBay has good strategies in terms of web site design, customer services, technical proficiency, advertising, accuracy of billing and guarantees and warranties. All these affords that eBay made satisfying small and large consumers. Talented workforce, product innovation, brand name and expertise in technology are the strength that ebay has in order to survive in this competitive market.


eBay always understand about its customers and here is some tutorials for the eBay new comers:
how to buy: http://pages.ebay.com/bestoffer/buyer/index.html


Other than the tutorials, eBay also provides various online help features which that help consumers a hand and assist them while they are facing problem in some activities. The online help features are including help topics, learning center, resolution center, eBaY university and contact us. eBay has considerate to the consumers situation and provides a lot of guidelines for them to refer and since then build up consumers network and satisfaction accordingly.
eBaY has also created a friendly environment to the consumers as they can easily find the instruction and the layout and arrangement of the website looked tidy, in order and comfortable. The guarantees and warranties which provided by ebay has build up customers confidence and trustworthy.
In consequences, eBaY has put in more affords and make improvement for their company as a return to consumers' support. Hence, eBaY will continue to grow in the future.
sources from:
prepared by Wong Chuan Chi

Introduction
E-commerce, also known as electronic marketing, it is not just the buying and selling activities. It defines as the process of buying, selling, or exchanging products, services or information via computer network. Nowadays, it brings more convenient and entertainment to the users in those activities such as downloading songs, purchasing clothes on online boutique shop, bidding on the online auction and so on. In fact, the most important feature of E-commerce is it allows people to buy or sell anything they want at anytime of the day or night. Now, let us turn back to the time tunnel and get to know about the history of E-commerce and its evolution to this advancement society.

The history and evolution of E-commerce
When there is no invention of electricity during prehistoric period, all business transactions were done face by face via letters. Gradually, telegraph and telephone were took place of it and then turn to fax machine in the mid 1980's. These telephone and fax machine were the first E-commerce transaction. Follow by the technology advancement, more new technology was replace the old technology which make it more consistency and more faster. Turning back to the history, it is come from the development of Electronic Data Interchange (EDI). EDI is a set of standard developed in the 1960's to exchange business information and do electronic transaction. Mosaic web browser was came after this and it was quickly adapted into downloadable browser, Netscape which allowed easier access to E-commerce. The third step in E-commerce development was DSL which allowed quicker access and a persistent connection to the internet.


Years & Event
1960's
Electronic Data Interchange (EDI) was formulated to facilitate business transaction electronically.

1969
ARPANET, was developed by America deparment of defence for researching new reliable network and later this enhanced into internet nearly 20 years.

1991
Tim Berners-Lee developed World Wide Web that started the first Internet transaction. These technology supported exchange of data that was in text format only.

1993
Mosaic was developed by Marc Andreessen, this is the first graphic web browser launched to interchange text and graphic and loads of people started downloading it. Later on, he develop Netscape. On the other hand, Microsoft come out with Microsoft Explorer.


1994
First business deal took place in this year and since then there have been billion of dealings.

1998
DSL was launched into market that provided much faster access and persistent connection to the network.

E-commerce spread into a significant group globally within a span of 4 years from 1996 to 2000. Another major improvement in E-commerce came with the development of Linux a platform more reliable and open sourced that allowed itself to be customized by its users and to a tough competition to Microsoft that compelled its development much better version of networking.

Amazon and Ebay were the first international companies that implemented electronic transaction.Initially public offering by Amazon, Ebay and Netscape have tremendous and almost everyone started implement business on internet.

prepared by Wong Chuan Chi

All~ About~ Me


Hi, everyone. I am Racheal Chong Hui Qi'. You guys can call me Racheal. Erm.... actually this is my first time blogging and it makes me feel very excited. By the way, thanks for this assignment which provide an opportunity for me to try something new.

First of all, I would like to start off by introducing myself. I am a 21 years old girl who is currently pursuing a degree course of accountancy in Tunku Abdul Rahman University. I am an ordinary girl who came from Ipoh and that's why most of my friends called me "Ipoh girl". Honest speaking, it was such a tough days for me to stay apart from my family for the first time I moved here. After 2 years experience of living outside, i have adapted to this life and it has broaden my understanding that life can also be wonderful and colourful depends on how you spend on it, but i will still miss my family who cares and love me all the time very very much.

Although i need to stay far away from my hometown, freedom is what i get in return. Despite, i learned how to arrange and plan my time effectively as time management is very important in completing and achieving our goals. I also started to do household by myself and learned a lot of community's moral and some of the defencing way in order not to bully by someone else. Moreover, I am stronger and used to settle my own problem rather than crying in front of my parents.

My hobbies are singing, listening music, travelling, swimming and watching movies. These exercises can released my stress and make me happier whenever I feel depressed. Definitely, I am also same with nowadays youngsters who fond of net suring during leisure time. The website that i visited most is http://www.hotmail.com/ and http://www.yahoo.com/ . I used to sign in these two websites once i turned on my computer to check and sent mails daily. http://www.youtube.com/ is another website that i used to watch some funny and interesting videos and MVs. http://www.utar.edu.my/ , the utar official website, i will log in frequently to update myself with the news that happen recently in Utar, so that I will not be the last person to know of it. I will sign in to http://www.msn.com/ every night to chit-chat with my friends and family since this is the cheapest method to communicate with each others. I also visited http://www.tom365.com/ and http://www.33md.com/ to download movies. There are a lot of movies uploaded in these websites such as Hong Kong drama, Korean and Japanese drama, American movies, animations and so on, but i prefer Hong Kong drama most of the time.

That's all of my introduction. our group will post some of the E-Commerce information later. please drop by and have a look on it. Feel free to leave some comments if possible. Have a nice day!!!

I am Wong Kai Lei!!!

Hello everyone!! I'm Wong Kai Lei. I'm pursuing my degree in Business Administration in UTAR and currently is in year 3 semester 1. I'm from Temerloh, Pahang. I love to shop and read. Whenever I'm free, I'll either go shopping or reading at home. I use to shop with my friends because they can give me opinions when I'm choosing clothes, accessories or etc. I love to shop with my mum too because she'll pay for everything!! My housemates always complaint that i shopped too much but, human wants will always be unlimited. "Unlimited needs and wants". When I'm not out for any activities, i read at home. Books i read normally related to crime investigations or any suspense story which will never bring any benefits to the course i take but, at least i can improve my English by reading.

Top 5 websites i visited the most:

1) http://www.facebook.com/

This website allows me to connect with my friend abroad and locally as well. Thanks to facebook, I now can keep in touch with my friends by knowing how well their life going on. The bond of our friendship also getting tigher!!

2) http://kylie1201.blogspot.com/

This is my personal blog that have just created. I'll update about myself in this blog and hope that my friends who wish to update with me can leave on comments and give me some feedback.^^Thanks ya!!

3) http://www.hotmail.com/

Hotmail allows me to receive and send mails to my friends and family. Thanks to hotmail, we no longer need to write letters and use stamps to post. Now we can post electronically!!

4) http://www.google.com/

Google is being used most during our assignment peak season. We will search for informations needed for our assignments and amazingly, Google has every information we need. This website never let us down!!Google!!Google!!Google!!

5) http://www.youtube.com/

One of the famous website, youtube can let me release my stress by viewing some funny videos or searching for latest songs. Thank you Youtube!!!

This blog is created for our e-commerce assignment purposes. I'm hoping that, by creating this blog, we can share some of the information that will be post or updated with other blogger as well. By exchanging information, it will help us update our knowledge and move further in this advance environment.

My name is Bell Wong Chuan Chi and i come from Kuantan, Pahang, a place where salt fish will come into mind when mention about its name. Currently i am studying in UTAR Sg. Long campus and major in Bachelor Business Administration Year 3 sem 1. When talk about my hobby, I am very enthusiastic to share about it. Surfing latest food & beverage information is the most enjoyment time for me when i am free. Where the delicious food is located, what is the price, the recipe of making cake, all these are information that i interested in. It may spent me a longer time on online surfing.

The top 5 websites that i visited the most
A lot of information that we have to search in the preparation of our assignments and thesis. This website help me a lot when i am doing research.
2. http://www.hotmail.com/
This is the place where i receive and send mails to my friends. My groupmates will send those information to me which related to our assignments or else i also receive the notification mail which inform me the Facebook daily activity.
3. http://www.facebook.com/
This is the place where can broaden my social networking. I can get to know more friends around the world. Facebook provides a lot of interesting games and it helps me to spent some times when i feel bored.
4. http://www.nj89.com/
If you are interesting to cook, this website will be your lovely website as it provided a variety of recipes such as Chinese cuisine, Japanese cuisine, western food, malay food and pretty much. There are also some healthy drinks that we can learn from it.
5. http://www.sinchew.com.my/
I always reading newspaper online and this will be the most website that i go.
The top 5 internet activities that i will do are downloading songs and movies, searching information, reading newspaper, playing games and writting blog.
Following by this, our group will keep updating more information about E-commerce, hope you will enjoy it.^^