Chapter 5 Flashcards

1
Q

Major security risk and their costs/// E-commerce security environment

A
Internet is a vulnerable network
Costs: 
1. Cost of the actual crime
2. costs required to recover from cyber attcaks
3.reputation damage 
4. reduce trust in online activities
5. loss of ponentional sensitive info
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Most costly cybercrimes

A

malware
web-based attacks
Denial of service
Malicious insiders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Dimensions of e-commerce security

A
  1. Integrity
    Ability to ensure that the info over a website has not been altered in any way
  2. Nonrepudiation
    Ability people don deny online actions
  3. Authencity
    Ability to identify the identity of a person who we are making business with
  4. Confidentiality
    Ability to ensure that data is available only to those who are authorized to view it.
  5. Privacy
    The ability to control the use of infrmation about one self
  6. Availability
    ability to ensure that e-commerce site continue to function
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

3 points of vulnerability ///

Most common of most damaging threats of security

A

client//server// communication pipeline

////////////////////////////////////////////////////////////////////////

1. Malicious code
  Include threats as viruses, worms, ransonware, trojan 
  horses
* Exploit kit
* malvertising
    Only adevertising that use malicious code
* drive by download
* backdoor
* bots
* Botnet
2. Potentially Unwanted Programs
 Program that installs itself on a Computer usually without the users consent
* Adware
*Browser parasite
*Cryptojacking
*Spyware
  1. Phising
    Social engineering
  2. BEC (business email compromise)
5. hacker
    cracker
    Cyvervandalism
    Hactivism 
6. Data breach
    Credential stuffing
  1. Credit card fraud/theft
  2. Indentity Fraud
  3. Spoofing, Pharming, and Spam (junk) websites
  4. Sniffer and man in the middle
  5. Denial of service (DOS) and distributed Denial of service (DDOS)
  6. Mobile Platform security issues

CLOUD security issues

INTERNET OF THINGS SECURITY ISSUES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Technology solutions

A

Encryption

Cipher text.
Text encrypted only can be read by the sender and receiver

substitution cipher

Transposition cipher

Symmetric Key cryptographic

Public key cryptographic

Hash function

Digital Signature

Digital envelope

Digital certificates and Public key infrastructure

Pretty good privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Secure channels of communication

A

Secure sockets layer (SSL)
Transport layer security (TLS)
HTTPS

Session Key

Virtual Private network (VPN)

Firewalls

Proxy servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Major payment methods

A

xxxx

How well did you know this?
1
Not at all
2
3
4
5
Perfectly