Professional Documents
Culture Documents
19 August 2019
1. A Hacker is someone who seeks and exploits weaknesses in a computer
system or computer network.
2. Hacking can take place through several points such as Computer Network,
Password and Phishing.
3. A method that could steal data through databases in known as SQL Injection
4. Any computer program that can replicate itself and spread from one computer
to another without input from its creator in known as Worms.
5. Two types of security protection that could prevent computer systems from
online threats are Firewall and Anti-Virus
6. The four types of e-payment system are Electronic Wallet, Credit Card, E-
Cash and E-Cheque
8. The roles of issuing banks in facilitating internet payment system are Verify
Customer Accounting Balance and Issue the Card
9. Accounts created by depositing funds into an account and from which funds
are paid out or withdrawn as needed can be made through E-Wallet
11. Smart cards can come into two types and they are Contact and Contactless
13. Symmetric Cryptosystem is when both Public Key and Private Key use the
Same secret key to scramble messages.
14. Secure Socker Layer (SSL) is the digital process of verifying that people or
entities are whom or what they claim to be.
16. Secure Socket Layer (SSL) is used by the most companies to provide Security
and Privacy and establishes a Secure session between a browser and a server.
17. Secure Electronic Transaction (SET) is built on reducing risk associated
merchant fraud, and ensuring that the purchaser is an authorized user of credit
card.
18. The e-commerce security environment consists of four layers, and these layers
are Laws and Industry Standard, Organizational Policies and Procedure,
Technology Solution and Data
22. The ability to identify the identity of a person or entity with whom both an
online company and online customers are dealing with on the Internet in known as
Authenticity
25. The five stages in developing an online security plan are Perform a Risk
Assessment, Develop a security policy, create an implementation plan, create a
security organization, perform a security units.