Researcher Collab

E-Commerce Resilience Strategies for Mitigating 6G Security Threats

Advances in information security, privacy, and ethics book series

With e-commerce constantly changing, the introduction of 6G technology presents both possibilities and difficulties. This chapter examines how e-commerce and 6G intersect, emphasizing how important it is to have strong security measures in place to counter new threats. The chapter starts with a summary of the 6G era's e-commerce environment and looks at the security issues that come with it before going into detail about the particular risks that 6G technology poses to e-commerce platforms. After that, the chapter turns its attention to methods for making e-commerce platforms more resilient to these attacks. It looks at how important it is to strengthen access controls and authentication, encrypt data for better security, and create effective disaster recovery plans.

Authors: S. Sureshkumar, R. Thamilselvan, K. Usha Rani, Vellayan Srinivasan, A. N. Arularasan, B. Yuvasri, Pankaj Dadheech

DOI: https://doi.org/10.4018/979-8-3693-7421-4.ch009

Publish Year: 2024