Evaluation of algorithms and security protocols to mitigate the risks in commercial transactions carried out by public companies


Abstract:

The security problems in electronic commerce in transactions are very evident in public companies. The objective of this research is to analyze security algorithms and protocols to mitigate risks and vulnerabilities within commercial transactions that help us identify computer attacks, whether internal or external. Deductive method and exploratory research were used to analyze the information from the reference articles and information available online; regarding different types of protocols and algorithms that protect the information in its entirety and confidentiality, thus providing the respective security to the information of public companies. It resulted in a control of the security and privacy factors, by having RSA algorithms with formulas to encrypt and decrypt public keys, combinations of commercial transactions, asymmetric and symmetric cryptography and the SET protocol, which facilitates the algorithms in decision-making within the organizations. It was concluded that the SET protocol is the best in facilitating greater security to mitigate vulnerabilities, threats and risks of its processes in public organizations.

Año de publicación:

2020

Keywords:

  • vulnerabilities
  • Protocol security
  • risks
  • Security Information
  • algorithm

Fuente:

scopusscopus

Tipo de documento:

Conference Object

Estado:

Acceso restringido

Áreas de conocimiento:

  • Gestión de riesgos
  • Ciencias de la computación

Áreas temáticas:

  • Funcionamiento de bibliotecas y archivos