Multimedia (audio and video) files that start to play in a steady and continuous flow, almost immediately upon their downloading. In contrast, an ordinary audio/video file must be downloaded, and decompressed and saved, in its entirety before it can be played. Streaming occurs at the client (user) end where a program (usually a plug in) such as ‘RealAudio’ or ‘CU See Me’ decompresses the incoming compressed file while it is being downloaded, and sends it to the application (usually a browser) for conversion into sound and/or video.
Streaming Media-
Streaming media is the method used to deliver multimedia elements – usually video or audio – from a data streaming service provider to an end user. It uses basic HTTP, TCP/IP and HTML protocols.
Streaming delivers media as a serial, steady stream. Unlike other download methods, where data order is not important, streaming media is sent/received according to availability. An example is P2P sharing, such as torrent, where streaming media must be delivered in the correct order.
Asia may be distributed as part of a live broadcast, like a Web meeting or tutorial session. A client program with an audio/video (AV) codec is required for media streaming. This program is usually embedded in other applications that connect to the Internet, like a Web browser or media player, and a server used for media delivery. Using the code, the client receives and converts the data in real time to video and audio output, while saving additional data in a buffer. If the download is slow and playback speed catches up with download speed, the experience may be choppy.
This type of media consumption took off in the late 1990s, as the world was introduced to innovations that led to increased network speed and bandwidth – two elements absolutely essential for proper streaming media functionality. The de facto standard for streaming audio is RealAudio by Progressive Networks (now known as Real Networks), while streaming video uses the Adobe Flash format.
Cookies:
A cookie is a small amount of data generated by a website and saved by your want browser. Its purpose is to remember information about you, similar to a suggest file created by a software application.
While cookies serve many functions, their most common purpose is to store login information for a specific site. Some sites will save both your username and password in a cookie, while others will only save your username. Whenever you check a boy that says, “Remember me on this computer,” the website will generate a login cookie once you successfully log in. Each time you revisit the website, you may only need to enter your password or you might not need to log in at all. Cookies are also used to store user preferences for a specific site.
For example, search engine may store your search settings in a cookie. A news website may use a cookie to save a custom text size you select for viewing news articles. Financial websites sometimes use cookies to store recently viewed stock quotes. If a website needs to store a lot of personal information, it may use a cookie to remember who you are, but will load the information from the web server. This method, called “server side” storage, is often used when you create an account on a website.
Browser cookies come in two different flavours: “session” and “persistent.” Session cookies are temporary and are deleted when the browser is closed. These types of cookies are often used by e-commerce sites to store items placed in your shopping cart, and can serve many other purposes as well. Persistent cookies are designed to store data for an extended period of time.
Each persistent cookie is created with a expiration date, which may be anywhere from a few days to several years in the future. Once the expiration date is reached, the cookie is automatically deleted Persistent cookies are what allow websites to “remember you” for two weeks, one month, or any other amount of time.
Most web browsers save all cookies in a single file. This file is located in a different directory for each browser and is not meant to be opened manually. Fortunately, most browsers allow you to view your cookies in the browser preferences, typically within the “Privacy” or “Security” tab. Some browsers allow you to delete specific cookies or even prevent cookies from being created. While disallowing cookies in you browser may provide a higher level of privacy, it is not recommended since many websites require cookies to function properly.
NOTE: Since cookies are stored in a different location for each web browser, if y switch browsers, new cookies will need to be created.
The E-Commerce Security Environment:
The Internet was never designed to be a global marketplace with a billion users, and. does not have many basic security features found in older networks such as telephone system or television networks. By comparison, the Internet is an open an weak design network. It’s also less risky to steal online. Rather than rob a bank person, the Internet makes it possible to rob people remotely and almost anonymously. Rather than steal a CD at a local record store, you can download the same music for free and almost without risk from the Internet.
Scope of the problem:
Cybercrime is becoming a more significant problem for both organizations and consumers. Bot networks, DDoS attacks, Trojans, phishing, data theft, identity fraud credit card fraud, and spyware are just some of the threats that are making daily headlines. It is very difficult to estimate the actual amount of such crime, in part because many companies are hesitant to report it due to the fear of losing the trust their customers. The IC3 (internet crime complaint center) in 2006 processed more than 200000 internet crime complaints and referred almost 90,000 of them to federal state and local law enforcement agencies.
Criminals who steal information on the Internet do not always use this information themselves, but instead derive value by selling the information to others. In some: cases, such criminals aim to just deface, vandalize, and/or disrupt a Web site, rath than actually steal goods or services. The cost of such an attack includes not only the time and effort to make repairs to the site but also damage done to the site’s reputation and image, as well as revenues lost as a result of the attack.
WHAT IS GOOD E-COMMERCE SECURITY?
Anytime you go into a market you take risks, including the loss of privacy. You main risk as a consumer is that you do not get what you paid for. As a merchant in the: market, your risk is that you don’t get paid for what you sell. Thieves take goods and then either walk off without paying anything.
To achieve the highest degree of security maybe, new technologies are available a should be used. But these technologies are not enough to solve the problem Organizational policies and procedures are required to ensure the technologies are weakened. Finally, industry standards and government laws are required to into payment mechanisms, as well as to investigate and prosecute violators of a designed to protect the transfer of property in commercial transactions. We can conclude that good e-commerce security requires a set of laws, procedures, policies, and technologies that, to the extent feasible, protect individuals and from unexpected behaviour in the e-commerce marketplace.
DIMENSIONS OF E-COMMERCE SECURITY:
Security is an essential part of any transaction that takes place over the internet Customers will lose his/her faith in e-commerce if its security is compromised Following are the essential requirements for safe e-payments/transactions There are six key dimensions to e-commerce security,
Integrity: integrity refers to the ability to ensure that information being displayed on a website or transmitted or received over the internet, has not been altered in any way by an unauthorized party. This principle states that a secure transaction includes unchanged data-that the business is only using exactly what was entered into the Internet site by the buyer. Any tampering with information is breaking the confidence of the buyer in the security of the transaction and the integrity of the company in general.
Nonrepudiation: it is refers to the ability to ensure that e-commerce participants do not deny their online actions. Since e Commerce happens in cyberspace, usually without any live video, it can feel less safe and sure. The legal principle of non- repudiation adds another level of security by confirming that the information which was sent between parties was indeed received and that a purchase or email or signature cannot be denied by the person who completed the transaction. Hesitation on the part of the buyer will destroy Commerce potential. Any breach will cost a business in lost revenues and consumer trust. Theses Commerce security basics can guide any business owner regarding safe online transaction protocol.
Authenticity:
it is refers to the ability to identify of a person or entity with whom you are dealing on the internet.
For e-Commerce to take place, both seller and buyer have to be who they say they are. A business cannot sell unless it’s real, the products are real, and the sale will go through as described online. The buyer must also provide proof of identification so that the merchant can feel secure about the sale. In e- Commerce, fraudulent identification and authentication are possible, and many businesses hire an expert to make sure these kinds of e-Commerce security basics are in place. Common solutions include technological solutions customer logins and passwords or additional credit card PINs.
Confidentiality:
it is refers to the ability to ensure that message and data are available only to those who are authorized to view them, Information should not be accessible to an unauthorized person. It should not be intercepted during the transmission.
Customer perspective: Can someone other than the intended recipient or a person read my message?
Merchant perspective: Whether information on my site can be accessed by the unauthorized person without knowledge?
Privacy: it is ability to control the use of information about oneself. One of the most obvious eCommerce security basics is privacy, which in this situation means no sharing information with unauthorized parties. When you shop online, your persona details or account information should not be accessible to anyone except the seller you have chosen to share it with.
Any disclosure of that information by the would be a breach of confidentiality. The business is responsible to provide at leas the minimum in encryption, virus protection, and a firewall so that bank details an credit card information remain private.
Availability: the ability to ensure that e-commerce site continues to function a intended. Information should be available wherever and whenever required within time limit specified. Continuous availability of the data is the key to provide a better customer experience in ecommerce.
The continuous availability of the ecommerce website increases online visibility, search engine rankings, and site traffic. Data which is present on the website must be secured and available 24x7x 365 for the customer without downtime. If it is not, it will be difficult to gain a competitive edge and survive in the digital world.
In conclusion :
A cookie is a small amount of data generated by a website and saved by your want browser. Its purpose is to remember information about you, similar to a suggest file created by a software application. The Internet was never designed to be a global marketplace with a billion users, and. does not have many basic security features found in older networks such as telephone system or television networks.
How to cookies work?
A cookie is a small amount of data generated by a website and saved by your want browser. Its purpose is to remember information about you, similar to a suggest file created by a software application.
What is streaming Media?
Streaming media is the method used to deliver multimedia elements – usually video or audio – from a data streaming service provider to an end user. It uses basic HTTP, TCP/IP and HTML protocols.
New Post
Follow on Twitter