Common Weaknesses and Attacks Associated with E-Commerce and Social Networking Application

Only available on StudyMode
  • Download(s) : 1332
  • Published : December 3, 2012
Open Document
Text Preview
Common weaknesses and attacks associated with e-commerce and social networking applications Security of transactions is critical in building the confidence of customers in a specified e-commerce site. This security depends heavily on an organization's ability to ensure authenticity, availability, privacy, integrity and disruption of unwanted intrusions. Malicious program known as sniffer programs often disrupt the privacy transactions especially when one uses unauthorized networks. They are found at network connection end points. When transactions are carried out, confidentiality is necessary thus it requires removing of any data showing transaction paths. This has become a common problem in the e-commerce sites. Another particularly common problem facing e-commerce and social network applications is the trojan horse. Back Orifice, Netbus and BO2K are the most common types. They are hacker tools that enable a remote hacker to control, examine and monitor the user’s information. These Trojans are dangerous since they can provide the hacker a platform for sending information and make it appear as if the real owner of the computer has done so. This can be a significant risk since cyber terrorism can be easily carried out. E-laundering has become an extremely common issue in the IT world. South Africa, for example, experienced laundering for the period March 1999 to September 2000 where they lost a total of R165.7 million. This is not the only case. A recent scam was rampant, where a Nigerian wrote a letter posing as a lawyer to a deceased rich man. This is another case where it would be easy for an unsuspecting victim to lose money. Hackers have developed a way in which they can use mobile phones to hack into personal information of the user. This is known as phone phreaking. They often pose as a legitimate voice mail checker and guess an extension’s password. They then forward inbound calls placed to that extension to another location. When the phreaker calls in...
tracking img