IA 2 - UNIT 2 Flashcards
It involves using the internet, intranet, extranet, or other networks to support business processes.
E-Business
- Primarily refers to online buying, selling, marketing, and servicing products and services.
- Includes payment and delivery of products/services online.
E-Commerce
phishing attack primary targets
- retail services
- financial institutions
- ISP
Identified privacy and security as significant
concerns.
2001 Study
(Udo)
Buyer concerns about website security remain
critical.
2014 Findings
(Hartono et al.)
Importance of information security in e-commerce financial transactions.
2016 Emphasis
(Jotwani &
Dutta)
Types of Security
Threats
- Denial of Service (DoS)
- Spying Attacks
- Unauthorized Access
Overloading servers to make services unavailable.
Denial of Service
(DoS)
Interception of sensitive information during transactions (e.g., man-in-the-middle attacks).
Spying Attacks
You are gaining access to user accounts or sensitive data without permission.
Unauthorized Access
Types of DoS Attacks
- DDoS
- Virus Infection
- Computer Worms
- Involves multiple compromised systems (botnets).
- Often undetected by the owners of infected systems.
DDoS
- Deliberately corrupts or deletes data.
- Spread via email attachments or downloads.
Virus Infection
Self-replicating does not necessarily damage
but consumes bandwidth.
Computer
Worms
Types of Spying Attacks
- Sniffing
- Man in the Middle Attack
- Key Logging
Applications or devices that read, monitor, and
capture network data exchanges.
Sniffing
An attack where the attacker intercepts and
relays messages between two parties.
Man in the Middle Attack
a spying attack that records
each user’s keystroke on a computer.
Keylogging
Consequences of Spying Attacks
Gaining access to sensitive information can lead to:
- Identity theft
- Financial fraud
- Corporate espionage
is an organized framework of concepts, beliefs, principles, policies, procedures, techniques, and measures that protect system assets against threats.
security
Methods Supporting the AIC Objectives
- Authentication
- Encryption
- Access Control
- Firewalls
- Intrusion Detection and Prevention
- Systems (IDPS)
- Message Digest/Checksum
- Honeypot
- Digital Signature & Certificate
- Technologies that measure and analyze unique physiological or behavioral characteristics are used to verify or identify individuals.
- These technologies are convenient, as they eliminate the need for cards or passwords, and they are unique to each person, making them a reliable form of authentication.
Biometrics for
Authentication
Fingerprints were collected for bank verification
and mobile SIM registration.
Nigeria