Preview

E- commerce

Satisfactory Essays
Open Document
Open Document
375 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
E- commerce
Week 4
Quiz
 Question 1
1 out of 1 points

All of the following are factors in contributing to the increase in cybercrime except:

Selected Answer:

the Internet's similarity to telephone networks.
Answers:
the ability to remotely access the Internet.

the Internet's similarity to telephone networks.

the ability to anonymously access the Internet.

the Internet is an open, vulnerable design.

 Question 2
1 out of 1 points

________ refers to the ability to ensure that messages and data are only available to those authorized to view them.

Selected Answer:

Confidentiality
Answers:

Confidentiality

Integrity

Privacy

Availability

 Question 3
1 out of 1 points

Which of the following is not a key point of vulnerability when dealing with e-commerce?

Selected Answer:

the credit card companies
Answers:
the client computer

the server

the communications pipeline

the credit card companies

 Question 4

1 out of 1 points

Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as:

Selected Answer:

spyware.
Answers:

spyware.

a backdoor.

pupware.

adware.

 Question 5
1 out of 1 points

What is the most frequent cause of stolen credit cards and card information today?

Selected Answer:

the hacking and looting of corporate servers storing credit card information
Answers:
lost cards

the hacking and looting of corporate servers storing credit card information

sniffing programs

phishing attacks

 Question 6
1 out of 1 points

Which dimension(s) of security is spoofing a threat to?

Selected Answer:

integrity and authenticity
Answers:
integrity

availability

integrity and authenticity

availability and integrity

 Question 7
1 out of 1

You May Also Find These Documents Helpful

  • Satisfactory Essays

    lesson10

    • 285 Words
    • 2 Pages

    Which of the following account lockout policy modifications could you make to ensure that user passwords cannot be intercepted by analyzing capture packets?…

    • 285 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    2) ________ refers to the ability to ensure that messages and data are only available to those…

    • 2051 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    Sdpi Case Study

    • 162 Words
    • 1 Page

    Sensitive personal data or information- which includes passwords, sexual orientation, financial, medical and biometric information.…

    • 162 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Level 3 Teaching Assistant

    • 1040 Words
    • 5 Pages

    Personal data- This includes names and addresses, medical or health records, dates of birth, etc. It needs to be kept secure.…

    • 1040 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Systems Analysts

    • 362 Words
    • 2 Pages

    1. Do you feel comfortable with the concepts of the question? If not, how can I help you understand it better? Yes, this pertains to the security of private information.…

    • 362 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Short Research on PAYLESS

    • 654 Words
    • 3 Pages

    4. Accommodated applications: Breaching the one of the major applications of the corporation was the biggest achievement for the hackers to get in with the database & to gain as much information about the client’s credit cards details to use it for their own benefit as security functions were not completely & properly installed.…

    • 654 Words
    • 3 Pages
    Good Essays
  • Better Essays

    ISM Workshop

    • 1008 Words
    • 5 Pages

    Confidentiality: Measure the information is belonging to a authorised people, and they are the only one who able to get access.…

    • 1008 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    eCommerce

    • 303 Words
    • 2 Pages

    Spyware may change the configuration of your computer. . For example, a spyware program may disable an audio device or change your desktop background, or it might collect online banking passwords and social security numbers stored on your computer. Adware may slow your computer and flood your screen with pop-up advertisements.…

    • 303 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Computer Security

    • 768 Words
    • 4 Pages

    Counter attacks: Documents should have a password, a firewall should be used to bar hackers, user account should have a password or a screen lock and data should be…

    • 768 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Ecommerce

    • 612 Words
    • 3 Pages

    Select two of the above four sites, and perform a SWOT analysis for each of them.…

    • 612 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    E Commerce

    • 483 Words
    • 2 Pages

    From an end client viewpoint it might be extremely helpful to buy merchandise and administrations over the Internet. The methodology is generally snappy and requests might be set in a moderately brief time of time while never needing to leave the home or office (flyertalk.com, 2013). Further, an end client can book from various organizations while never needing to physically move around. They will likewise profit from the capability to book inns and administrations 24 hours a day, 7days a week and give consistent turnover to the business.…

    • 483 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    E-Commerce

    • 2530 Words
    • 11 Pages

    The advance and growth in IT & internet have enabled revolutionary vast changes in the way businesses and people trade. Trading in its simplest definition is all about communication. The spread of computers worldwide and the usage of information technology have played a major role in facilitating and enhancing the communication between traders therefore gave the ignition for E-commerce to come to light.…

    • 2530 Words
    • 11 Pages
    Powerful Essays
  • Best Essays

    BBC, 2013 ‘US is main source of EU credit card fraud – Europol’ 8/6 [online]…

    • 4912 Words
    • 20 Pages
    Best Essays
  • Good Essays

    Computer Crime

    • 791 Words
    • 4 Pages

    Some organizations transfer information between themselves, example Government entities and small businesses, like Colleges, Schools etc. They store Information for learning purposes, like: video, voice, images etc. Most of those Entities / Organizations are not properly secured, which makes their Computer system…

    • 791 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Ecommerce

    • 6457 Words
    • 26 Pages

    Identify the item & supplier: Selection of appropriate model & supplier, with the help of office supply catalog. The person in the purchasing department has to check more than one catalog and contact the suppliers to find out the availability, present cost or may be latest version.…

    • 6457 Words
    • 26 Pages
    Good Essays