Preview

eCommerce

Satisfactory Essays
Open Document
Open Document
303 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
eCommerce
1- Why is it less risky or easier to steal online? - Hiding your identity online is easier - Hacking can be done from anywhere

2- Explain why E-commerce site might not report a cyber attack crime

-Reputation is very important -Trust 3- 6 Dimensions of E-commerce security (slide 7)

4- How would you protect your company from DoS attack? -Make the servers or website redundant -Firewall
5- Name the majors point of vulnerability in typical website?
Three key points of vulnerability in e-commerce environment:
1. Client
2. Server
3. Communications pipeline (Internet communications channels)
6- Why is adware or spyware is consider to be a security threat?
Spyware may change the configuration of your computer. . For example, a spyware program may disable an audio device or change your desktop background, or it might collect online banking passwords and social security numbers stored on your computer. Adware may slow your computer and flood your screen with pop-up advertisements.

7- What are some activites that a company can do to stop or slow down attack threats?

8- Explain some of the modern day flows with encryption? - Computationally slow, decreased transmission speed, increased processing time -Encryption or security slows down your pc -Technology is becoming smarter 9- How does ur public key encryption works?

10- Comapring between firewalls and proxy walls?
Firewall
Hardware or software
Uses security policy to filter packets
Two main methods:
Packet filters
Application gateways
Proxy servers (proxies)
Software servers that handle all communications originating from or being sent to the Internet

11- Is a computer with antivrus protected from antivirus?

12- Identify the 5 steps in security e-commerce plan? slide 39

13- What is tiger teams?

-companies that bring people to attack their system, to test their system.

You May Also Find These Documents Helpful

  • Good Essays

    You Decide- Sec572 Week 2

    • 577 Words
    • 3 Pages

    To develop network security strategies that will ensure that the organization's network is protected from both internal and external security risks. A summary of the steps I can take to mitigate the risk in the following areas: Denial-of-Service attacks (DoS), Distributed Denial-of-Service attacks (DDoS), Masquerading and IP Spoofing, Smurf attacks, Land.c attacks, Man-in-the-Middle attacks.…

    • 577 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Is3110 Week5 Quiz

    • 218 Words
    • 2 Pages

    5. List and explain three basic protection steps you can take to ensure all servers are hardened, thus reducing incidents.…

    • 218 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1310 Unit 3

    • 541 Words
    • 3 Pages

    Do you understand how to secure your computer since you reviewed the material? Explain your answer.…

    • 541 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Week3 Hacking

    • 391 Words
    • 2 Pages

    Workstation and Desktop devices are prone to viruses, malware, and malicious software, especially if the user surfs the Internet and World Wide Web. Given that users connect to the Internet and World Wide Web, what security countermeasures can organization implement to help mitigate the risk caused from viruses, malware, and malicious software?…

    • 391 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Week 5 Quiz

    • 531 Words
    • 3 Pages

    5 List and explain three basic protection steps you can take to ensure all servers are hardened, thus reducing incidents.…

    • 531 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Since then companies began to become more aware of the problems associated with computer and security. Only in 2013, the Utah government reported twenty-million cyber-attacks each day, so it suggests that there are trillions of cyber-attacks worldwide (Millions of Cyber Attacks Each Day, 2015). So, the steps that companies take are an organizational framework with new operations towards employee education, organizational policies, IT and network advisors to limit access as a job-related function (Trim & Yam-Im, 2010). Meaning education combined with limiting the number of people having full access to everything decreases the chance of a cyber-attack and with the security of an IT specialist proactively monitoring the system. For example, Lockheed-Martin's cyber-kill chain that stops the stages of malware by reconnaissance, weaponization, delivery, exploit, installation, command & control, and actions (Mattern, Felker, Borum, & Bamford, 2014).…

    • 750 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    E-Business

    • 644 Words
    • 3 Pages

    Describe the insight generation process used at Ben & Jerry’s. What benefits did Ben & Jerry’s achieve from utilizing the process?…

    • 644 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    How to reduce the attack surface with what hardening steps and network security management best practices, (100) 2) ensure secure authentication, authorization, and accounting, (100) and 3) prevent or respond to intrusions. (100)…

    • 310 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Quiz Week 5

    • 381 Words
    • 2 Pages

    5. List and explain three basic protection steps you can take to ensure all servers are hardened, thus reducing incidents.…

    • 381 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Malware, Spyware & Adware

    • 2084 Words
    • 9 Pages

    Spyware is a software program that collects personal information of the users without their formal consent. Unlike viruses and worms, spyware does not usually self replicate, or intrude into the system directly or spread from one system to another; instead, it intrudes into a system by deceiving the user or exploiting software vulnerabilities in a system. Once it gets into the system, its implications can range from disturbing to devastating. It propagates using personalization cookies, tracking cookies, Trojans, drive-by downloads, hacking and piggybacking.…

    • 2084 Words
    • 9 Pages
    Better Essays
  • Satisfactory Essays

    E- commerce

    • 375 Words
    • 6 Pages

    ________ refers to the ability to ensure that messages and data are only available to those authorized to view them.…

    • 375 Words
    • 6 Pages
    Satisfactory Essays
  • Satisfactory Essays

    E- Commerce

    • 881 Words
    • 4 Pages

    VAN, value added network is an independent company that provides connection and EDI transaction forwarding services to business…

    • 881 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    Ecommerce Initiative

    • 1196 Words
    • 5 Pages

    This paper focuses on pointing out the way planning electronic commerce initiatives. In order to support the ideas that are going to be shown, four online articles will be cited. The articles are: Ethics in advertising by Dr. Gomathi Viswanathan, Advertising Regulation – How to avoid inciting the FTC’s wrath by Jay N. Sawyer, and New Online Marketing Regulation – The dos and don’ts by Alan J. Grainger.…

    • 1196 Words
    • 5 Pages
    Powerful Essays
  • Best Essays

    Walmart Ecommerce

    • 3423 Words
    • 14 Pages

    "Scary (But True) Facts About Wal-Mart | Business Pundit." Business Pundit: Your Daily Dose of Smart Business Opinion. Web. 1 Dec. 2011. .…

    • 3423 Words
    • 14 Pages
    Best Essays
  • Good Essays

    Ecommerce

    • 627 Words
    • 3 Pages

    eBay is an online person-to-person trading community on the Internet. Buyers and sellers are brought together whereby the sellers are allowed to list items for sale and buyers to bid on interested items. The items are categorized by topics, where each type of auction has its own category.…

    • 627 Words
    • 3 Pages
    Good Essays

Related Topics