Exam 2 Flashcards
Dimensions of ecommerce security
Integrity Nonrepudiation Authenticity Confidentiality Privacy
Integrity
ability to ensure that info being displayed on a website or transmitted or received over the internet has not been altered in any way by an authorized party.
Nonrepudiation
ability to ensure that e-commerce participants do no deny their
online actions
Authenticity
ability to identify the identity of a person or entity with whom you are
dealing on the internet
Confidentiality
ability to ensure that messages and data are available only to
those who are authorized to view them.
Privacy
ability to control the use of info about oneself
DOS attacj
flooding a website with useless traffic to inundate and overwhelm the network
DDOS attack
These attacks can lead to website shutdown, making it impossible for customers to access it or make purchases. System operations can shut down indefinitely.
Encryption
Process of transforming plain text or data into cipher text that cannot be read by anyone other than the sender and the receiver. Purpose is to secure stored info and secure info transmission
5 Steps in developing e-commerce plan
- Perform a risk assessment: assessment of risks and points of vulnerability
- Develop a security policy: set of statements prioritizing the info risks, identifying acceptable risk targets, and identifying the mechanisms for achieving these targets.
- Develop an implementation plan: the action steps you’ll take to achieve the
security plan goals - Create a security organization: educates and trains users, keeps management aware of security threats and breakdowns, and maintains the tools chosen to implement security
- Perform a security audit: involves the routine review of access logs
Whats not a key factor for establishing ecommerce security
Data integrity
Confidentiality is confused with
Privacy
IoT- Internet of Things
Devices such as internet connected fridges or security cameras can be used to launch service requests against services
Asymmetric key cryptography is also known as
Public key cryptography
Methods of securing channels
Vpn
Digitsl certificates
Ssl/TLS
Firewall
Hardware or software that acts as a filter to prevent unwanted packets frim entering a network
First step in developing an ecommerce security plan
Perform a risk assessment
Paypal
Ex of online stored value payment system
PCI-DSS is a standard estsblished by
The credit card industry
NFC
Set if short range wireless technologies used to share info among devices with 2” of each other
Cryptocurrencies
Ripple
Monero
Ethereum
Online Marketing Communications used in each stage if consumer decision process
Awareness-need recognition-> search ->evaluation of alternatives -> purchase -> post purchase behavior-loyalty