Common Weaknesses and Attacks Associated with E-Commerce and Social Networking Application

Topics: Computer security, Security, Information security Pages: 4 (1233 words) Published: December 3, 2012
Common weaknesses and attacks associated with e-commerce and social networking applications Security of transactions is critical in building the confidence of customers in a specified e-commerce site. This security depends heavily on an organization's ability to ensure authenticity, availability, privacy, integrity and disruption of unwanted intrusions. Malicious program known as sniffer programs often disrupt the privacy transactions especially when one uses unauthorized networks. They are found at network connection end points. When transactions are carried out, confidentiality is necessary thus it requires removing of any data showing transaction paths. This has become a common problem in the e-commerce sites. Another particularly common problem facing e-commerce and social network applications is the trojan horse. Back Orifice, Netbus and BO2K are the most common types. They are hacker tools that enable a remote hacker to control, examine and monitor the user’s information. These Trojans are dangerous since they can provide the hacker a platform for sending information and make it appear as if the real owner of the computer has done so. This can be a significant risk since cyber terrorism can be easily carried out. E-laundering has become an extremely common issue in the IT world. South Africa, for example, experienced laundering for the period March 1999 to September 2000 where they lost a total of R165.7 million. This is not the only case. A recent scam was rampant, where a Nigerian wrote a letter posing as a lawyer to a deceased rich man. This is another case where it would be easy for an unsuspecting victim to lose money. Hackers have developed a way in which they can use mobile phones to hack into personal information of the user. This is known as phone phreaking. They often pose as a legitimate voice mail checker and guess an extension’s password. They then forward inbound calls placed to that extension to another location. When the phreaker calls in...

References: Collings, T., & Wall, K. (2005). Red Hat Linux Networking and System Administration. Indianapolis: Wiley.
Network Security and Defensive Countermeasures (n.d.).Retrieved from
Stavrou, A., & Institute for Security Studies (South Africa). (2002). Mission Impossible? : E-Security In South Africa 's Commercial And Financial Sectors. Pretoria, South Africa: Institute for Security StudiesRufi, A. W., & Cisco Networking Academy Program. (2007). Network Security 1 and 2 Companion Guide. Indianapolis, Ind: Cisco Press
Wyckoff, A. (1999). The economic and social impact of electronic commerce: Preliminary findings and research agenda. Paris: OECD.
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • E Commerce Essay
  • E commerce Essay
  • E-commerce Essay
  • Details of social networking serives Essay
  • E- commerce Essay
  • E-commerce: Electronic Commerce and Implementation Essay
  • E-Commerce Model: Social Networking Sites Essay
  • Essay on Social Media in E-Commerce

Become a StudyMode Member

Sign Up - It's Free