E-commerce Security (I) Flashcards

1
Q

Customer and merchant perspectives on the dimensions of e-commerce security

A

Integrity
Nonrepudiation
Authenticity
Confidentiality
Privacy
Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Integrity dimension

A

The ability to ensure that the information being
displayed on a website or transmitted or received
over the Internet has not been altered in any way by an unauthorized party

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Nonrepudiation dimension

A

The ability to ensure that e-commerce participants
do not deny (i.e., repudiate) their online actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Authenticity dimension

A

The ability to identify the identity of a person or entity with whom you are dealing on the Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Confidentiality dimension

A

The ability to ensure that messages and data are available only to those who are authorized to view them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Privacy dimension

A

The ability to control the use of information about oneself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Availability dimesnion

A

The ability to ensure that an e-commerce site or app continues to function as intended

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

E-commerce security environment

A

S11 SLIDE DIAGRAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Ease of use in security

A

The more security measures that are added, the more difficult something is to use

eg: transferring files from corporate computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

3 key points of vulnerability in e-commerce

A

Client
Server
Communications pipeline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

5 steps of developing an e-commerce security plan

A
  1. Perform a risk assessment
  2. Develop a security policy
  3. Develop an implementation plan
  4. Create a security organization
  5. Perform a security audit
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly