You are on page 1of 2

Tutorial 

 
19 August 2019 
 
1. A Hacker is someone who seeks and exploits weaknesses in a      computer
system or computer network. 

2. Hacking can take place through several points such as Computer Network,
Password and Phishing.

3. A method that could steal data through databases in known as SQL Injection

4. Any computer program that can replicate itself and spread from one computer
to another without input from its creator in known as Worms.

5. Two types of security protection that could prevent computer systems from
online threats are Firewall and Anti-Virus

6. The four types of e-payment system are Electronic Wallet, Credit Card, E-
Cash and E-Cheque

7. The four properties of e-cash are Monetary Value, Interoperability,


Retrievability, and Security

8. The roles of issuing banks in facilitating internet payment system are Verify
Customer Accounting Balance and Issue the Card

9. Accounts created by depositing funds into an account and from which funds
are paid out or withdrawn as needed can be made through E-Wallet

10. Participants in an online payment system are Consumer, Merchant, Clearing


House, Acquiring Banks and Consumers Card Issuing Bank

11. Smart cards can come into two types and they are Contact and Contactless

12. Electronic Billing Presentment and Payment (EBPP) system infrastructure


comprises of three components, and they are Biller Direct, Consolidator and
Infrastructure Providers

13. Symmetric Cryptosystem is when both Public Key and Private Key use the
Same secret key to scramble messages.  

14. Secure Socker Layer (SSL) is the digital process of verifying that people or
entities are whom or what they claim to be. 

15. A typical Digital Certificate is a data file or information, digitally signed and


sealed by the encrypted using RSA encryption techniques, that can be verified by
anyone through website domain. 

16. Secure Socket Layer (SSL) is used by the most companies to provide Security
and Privacy and establishes a Secure session between a browser and a server. 
17. Secure Electronic Transaction (SET) is built on reducing risk associated
merchant fraud, and ensuring that the purchaser is an authorized user of credit
card. 

18. The e-commerce security environment consists of four layers, and these layers
are Laws and Industry Standard, Organizational Policies and Procedure,
Technology Solution and Data

19. The six dimensions of e-commerce security are Integrity, Nonrepudiation,


Authenticity, Confidentiality, Privacy, and Availability 

20. The ability to ensure that e-commerce players do not deny their online


actions is known as Nonrepudiation

21. The ability to ensure that an e-commerce website to continuously function as


intended is known as Availability

22. The ability to identify the identity of a person or entity with whom both an
online company and online customers are dealing with on the Internet in known as
Authenticity

23. The three key points of vulnerability in an internet payment system


infrastructure that are prone to online attacks are Client , Server and
Communication Channel

24. An online activity and attempt by a third party to obtain confidential


information for financial gain is known as Phishing

25. The five stages in developing an online security plan are Perform a Risk
Assessment, Develop a security policy, create an implementation plan, create a
security organization, perform a security units.
 

You might also like