Today, Information Technology Field is the fastest growing field among common people and is making history. Very importantly, Digital Technology has created a revolution in this IT field, with a phenomenal influence. The present era is significantly dependent on Internet today, starting from Online Games to Shopping to Confidential Banking process; everything is trusted and dependent on the word World Wide Web. This change has speeded up things in our daily routine, which resembles drastic change among our traditional lifestyle to this millennium era.
The birth of Internet had started with an intention of serving major fields, like Military, as Intranet for their Secured communications and information passages within their internal departments with High Speed and safe delivery, and which eventually emerged into a common man life.
World Wide Web
As we all know, there are few terms and procedures needed to be followed for operating any kind of transactions in this Physical world, which are also applicable for Cyberspace. These predefined terms and procedures are called as Cyber Laws. Considering the intersections of various fields on Internet, these laws are an attempt to apply laws designed for the physical world to human activity on the World Wide Web.
With the huge development in World Wide Web, emerging into the Human Kind, market / common man had got better access to perform transactions through this medium called Cyberspace, for the sake of more convenience. Among all the areas, Commerce is playing a vital role in this Cyberspace revolution, which is further derived as e-commerce, and defined as “the buying and selling of products or services over electronic systems such as the Internet and other computer networks.”- Wikipedia.
The threat of Cyberspace began with Copyright issues, though the content published on any website can be considered as a book or a magazine at a book store. The copyright rules are also applicable for the content published in websites. As part of the Technology, a temporary file of the content is generated each time while a person accesses a website in the local machine, which is unavoidable due to the present transmitting schema. This has been an advantage for hackers to plagiarize, reproduce, duplicate and use in many ways, thereby violating copyright laws. Apart from the above issue, when it comes to a financial transaction like purchasing a product through a website is also unsecure in a way - During the process of an e-commerce transaction, a customer has to share his personal/financial information to complete his purchase, which is not totally secure. Technically, all E-commerce websites won’t encrypt the receiving confidential data, and the user is not aware of it. In some cases, users are deceived about Secured Socket Layers. As a matter of fact, most of the common users are not aware of checking the security levels of the site they are browsing, which in turn raises wide chances for fraud activities. Very importantly, some of the small to medium scale companies are relied on third party web hosting services, knowingly or unknowingly sharing the access to the program / content / information, which can play a crucial part in manipulations.
Although it’s necessary for a common man to have sufficient knowledge to understand a website’s security levels, vast change in the functionality of Secured Socket Layers is needed, considering high risk of fraud activities.
As I’m focusing on Operations of Secured Socket Layers in E-commerce sites, I am analyzing different sources of information on the functionality and the criteria of SSL.
After reviewing the schema of the Secured Socket Layers, I would like to come up with a better standard SSL schema.
Although we are aware of the fact that security and hacking well resemble Tom and Jerry, as they keep chasing one another, security levels have to keep on updating its algorithm for better standards, so as to stay away from the plagiarism, manipulating, fraud activities, reproducing, duplicating in a single word any Unauthorized activity.