#5 E-business Network and Website Security Flashcards

1
Q

E- business Security Risks

A

Physical
Internal
External
Transactional

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Physical Risks

A

Network Equipment and Physical Location

Electrical Power Backup

Internet Connectivity Redundancy

Outsourcing risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Network Equipment and Physical Location

A
  • Equipment and rooms always locked, location annonymous
  • Fire suppression systems, train employees
  • Substantial construction and design of facilities
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Electrical Power Backup

A
  • Batteries, Power Generators
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Internet Connectivity Redundancy

A
  • To have more than 1 connection to the internet
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Internal Security Risks

A

Unhappy employees, poor secuirty awarenes and planning

Passwords
Biometrics
Smart Card (embedded memory chip with user ID for authentication of remote user)
Backup and Restore Policies
Disaster Recovery Planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Outsourcing risks

A
  • Web hosting services
  • fee for service arrangement for power, connectivity, security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

External Security

A

Bypass network defences
Hackers
Viruses

Counter by
Firewalls (packet fiiltering, circuit level, application level)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Hackers

A
  • intruders that deliberately gain unauthorized access
  • most common=send confusing data
  • Crashing a program= take control of computers
  • Buffer overlow cause crashes
  • White hat: good hackers
  • Black hat: steal valuable information, disrupt service or damage
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Viruses (External Secuirty

A

Standard
Worms
Macro Virus
Trojan Horses
Virus Hoaxes

Counter measures
Antivirus software
Employee Education
Updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Standard

A
  • small destructive programs inserted to other files
  • erase files/hardrives, prevent from booting, saving, printing and send repetitive e-mail messages
  • spread via email, attachments or when infected program executes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Worms

A
  • replicate itself in computer memory
  • use resources, slowing and crashing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Macro Virus

A
  • Infect Macro (word/excel/removable drives)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Virus Hoaxes

A

Faslse warnings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Trojan Horses

A
  • Maliciouse disguised as fun or useful
  • Steal passwords, plant destructive programs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Transactional Secuirty

A

Authentication
Integrity
Non repudiation
Confidentiaty

Security Protocols
Encryption
Public Keys
VPN
Tunneling
WTLS
WLANs
Secuirty audit
penetrative testing

17
Q

Secuirty Protocols

A

Secure Sockets Layer (SSL): public key encryption and digital certificates and included in web browsers/servers

Transport Layer Security (TLS): assure no third part access to internet
Record/Handshake

SET (Secure Electronic Transctions): presenting credit card transaction on internet

18
Q

Encryption

A

translaltion of data into a cipher text, where it is decrypted into plain text at the destination

19
Q

Public Keys

A

Public: posted into public directory
Private: given only to those requesting

20
Q

VPN

A

Private networks that use Internet to transmit data

21
Q

Tunneling

A

encapsulate on protocol witin another protocol

22
Q

WTLS

A

encryption and digital certificates

23
Q

WLANs

A

most vulnerable as hackers require few resoures

24
Q

Security audit

A

review policy, emplooyee training and physical secuirty

25
Q

penetrative testing

A

insurance, NDA, Scanning tools, Scope, Documentation