11. Legally and technically securing E-Commerce Flashcards

1
Q

What is good E-Commerce Security?

A
  • To achieve highest degree of security
    • new technologies
    • Organizational policies and procedures
    • Industry standards and government laws
  • Other factors
    • time value of money
    • Cost of security vs. potential loss
    • Securty often breaks at weakest link
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Customer and merchant perspective on the different dimensions of E-commerce security

A
  • Confidentially

→ can someone other than the addressed person read my messages? (customer)

→ are messages or confidential data accessible to anyone other than those authorized to view them? (merchant)

  • Authenticy

→ Who am I dealing with? (customer)

→ What is the real identity of the customer? (merchant)

  • Privacy

→ Can I control the use of information about myself? (customer)

→ What use, if any, can be made of personal data collected as part of an E-Commerce transaction? (Merchant)

  • Integrity

→ Has information I transmitted or received been altered? (customer)

→ Has data on the site been altered without authorization? (merchant)

  • Nonrepudiation

→ Can a party to an action with me lter deny taking the action? (customer)

→ Can a customer deny ordering products? (merchant)

  • Availability

→ Can I get access to the site? (customer)

→ Is the site operational?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The tension between security and other values

A
  • ease of use:
    • The more security measures added, the more difficult a site is to use and the slower it becomes
    • too much security can harm profitability while not enough security can potentially out you out of business
  • Public Safety and criminal uses of the internet
    • Tension between tthe desires of individuals to act anonymously and the needs of public officials to maintain public safety
    • Use of Technology by criminals to plan crimes or threaten nation-state
    • the internet also provides terrorists with convenient communications channels
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Most common security Threats in the E-commerce environment

A
  • Malicious code
    • viruses
    • worms
    • trojan horses
    • drive-by downloads
    • backdoors
    • bots, botnets
    • threats at both client and server levels
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Potentially unwanted programs (PUPs)

A

= Malware = any software intentionally ddesigned to cause damage to a computer or server

  • Broweser parasites
  • Adware
  • Spyware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Phishing

A
  • E-mail scams
  • Social engineering
  • Identity theft
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Hacking

A
  • Hackers vs. crackers
  • Types of hackers: White black grey hats
  • Hacktivism
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cybervandalism

A

= disrupting, defacing, desroying website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Data Breach

A

= losing control over corporate information to outsiders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Credit card fraud/theft

A

= hackers target merchant server, use data to establish credit under false identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Denial of Services (DoS)

A

= attack: hackers flood site wih useless traffic to overwhelm network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Sniffing

A

= eavesdropping program that monitors information traveling over a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Encryption

A
  • transforms data into cipher text readable only by sender and receiver
  • Secures stored information and information transmission
  • Provides 4 of 6 Key dimensions of E-commerce Security
    • message integrity
    • nonrepudiationAuthendtication
    • Confidentially
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Firewall

A
  • hardware or software
  • uses security policy to filter packets
  • two main methods
    • packet filters
    • Application gateways
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Proxy servers

A
  • software servers that handle all communications originating from or being sent to the internet
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Developing an E-Commerce security plan

A
  1. Perform a risk assessment
  2. Develop a security policy
  3. Develop an implementation plan
  4. Create a security organization
  5. Perform a security audit
17
Q

Copyright

A
  • Protects original forms of expression (but not ideas) from being copied by others for a period of time
  • ‘look and feel’ copyright infringement lawsuits
  • Digital Millenium Copyright Act 1998
18
Q

Trademarks

A
  • Identify, distinguish goods, ad indicate their source
  • Purpose
    • Ensure consumer gets what is paid for / expected to receive
    • Protect owner against piracy and misappropiation
  • Infringement
    • Market confusion
    • Bad faith
  • Dilution
    • Behavior that weakens connection trademark and product
19
Q

Patents

A
  • Grant owner 20-year monopoly on ideas behind an invention
    • machines
    • man-made products
    • compositions of matter
    • Processing methods
  • Invention must be new, non-obvious, novel
  • Encourages Inventors
  • Promotes dissemination of new techniques through licensing
  • Stifles competition by raising barriers to entry
20
Q
A