Chapter 4 Flashcards
As internet never was designed to be a global marketplace, it lacks ____________________
many basic security features.
Define Integrity
Ability to ensure that information being displayed on a web site or transmitted or received over the internet has not been altered in any way by an unauthorised party
Give a customer and a merchant perspective of integrity
Customer - Has information transmitted or received been altered?
Merchant - Has data on the site been altered without authorization? Is data being received from customers valid?
Define: Non-Reputation
Ability to ensure that e-commerce participants do not deny (i.e. repudiate) their online actions
Give a customer and a merchant perspective of non-reputation
Customer - Can a party to an action with me later deny taking that action?
Merchant - Can a customer deny ordering a product?
Define: Authenticity
Ability to identify the identity of a person or entity with whom one is dealing on the internet
Ex. can I trust who this person or company is saying they are?
Define: Confidentiality
Ability to ensure that message and data are available only to those who are authorised to view them
Define: Privacy
Ability to control the use of information about oneself
Define: Availability
Ability to ensure that an e-commerce site continues to function as intended
What is a major factor that can disrupt the customers “ease of use” and or their e-transaction causing less repetition in customer purchases?
Security! To many verification process can cause customers to become very annoyed and either give up on a purchase or cause less purchases in the future.
An increased level of security on a website can also cause…
A slower, less efficient website.
What are some examples of “malicious code”?
Virus’s, worms, adware, trojan’s etc
What is one of the most common ways computers get infected with malicious code?
Drive by download- malware coming from downloaded files that a user requested
What are some differences between viruses and worms?
Viruses are usually created to damage while worms are created to collect information and spread rapidy from computer to computer
What is the “backdoor” feature of infectious software?
Allowing a person to remotely access infected devices
Potentially Unwanted Programs (PUPS) are…
program that install themselves on a computer, typically without users informed consent – increasingly found on social networks
List 3 different kinds of PUPS
Adware - a PUP that serves pop-up ads to computer, usually installed on a computer to generate these pop ups
Browser Parasite - – program that can monitor and change the settings of a users browser
Spyware - program used to obtain information such as a user’s keystrokes, e-mail, instant messages and so on
Define : Phishing
any deceptive, online attempt by a third party to obtain confidential information for financial gain
What are hackers and crackers?
Hacker – individual who intends to gain unauthorised access to a computer system
Cracker – with the hacking community, a term typically used to denote a hacker with criminal intend
What is encryption?
process of transforming plain text or data into cipher text that cannot be read by anyone other than the sender and the receiver. The purpose of encryption is (a) to secure stored information and (b) to secure information transmission.
Define: Cipher text
text that has been encrypted and thus cannot be read by anyone other than the sender and the receiver.
The message integrity provides…
assurance that the message has not been altered
Non-repudiation prevents …
the user from denying he or she send the message
Authentication provides …
verification of the identity of the person (or computer) sending the message
Confidentiality gives …
assurance that the message was not read by others
The key(cipher) is
any method for transforming plain text to cipher text