1. Why is it less risky to steal online? Explain some of the ways criminals deceive consumers and merchants.
- Its easy to steal online because of the almost no risk of being caught, and the lack of
security on the internet.
- Criminals use legimate looking services identities which trick consumers and place fraudulent orders to online merchants.
security on the internet.
- Criminals use legimate looking services identities which trick consumers and place fraudulent orders to online merchants.
2. Give an example of security breaches as they relate to each of the six dimensions of e-commerce security. For instance, what would be a privacy incident?
- Integrity: Redirecting a bank wire transfer to a different account.
- Nonrepudiation: Merchants don't receive a physical copy of a signature.
- Authenticity: Someone who claims to be someone he is not.
- Confidentiality: If a hacker breaks into a site and gains a credit card number.
- Privacy: Personal information being used in a unauthorized manner.
- Availabilty: The site may not be operational.
- Integrity: Redirecting a bank wire transfer to a different account.
- Nonrepudiation: Merchants don't receive a physical copy of a signature.
- Authenticity: Someone who claims to be someone he is not.
- Confidentiality: If a hacker breaks into a site and gains a credit card number.
- Privacy: Personal information being used in a unauthorized manner.
- Availabilty: The site may not be operational.
3. How would you protect your firm against a Denial of Service attack?
- Constantly updating system with encryptions, firewalls etc.
- Constantly updating system with encryptions, firewalls etc.
4. How does spoofing threaten a Web site’s operations?
- It threatens the integrity of the site. Hackers can redirect customers to a fake website and gain their private information.
- It threatens the integrity of the site. Hackers can redirect customers to a fake website and gain their private information.
5. What are some of the steps a company can take to curtail cybercriminal activity from within a business?
- Encryption, Firewalls
- Encryption, Firewalls
6. Identify and discuss the five steps in developing an e-commerce security plan.
- 1. Perform a risk assessement
2. Develop a security policy
3. Develop an inplementation
4. Create a security organization
5. Perform a security audit
- 1. Perform a risk assessement
2. Develop a security policy
3. Develop an inplementation
4. Create a security organization
5. Perform a security audit
7. What are tiger teams, who uses them, and what are some of the tactics they use in their work?
8. How do the interests of the four major payment systems stakeholders impact each other?