You are on page 1of 5

Subject: E-Commerce

Chapter 5: E-Commerce Security and Payment Systems

1. What Is Good E-commerce Security?

To achieve highest degree of security.

2. List 6 Dimensions of E-commerce Security?


a. Integrity
b. Nonrepudiation
c. Authentication
d. Confidentiality
e. Privacy
f. Availability

3. Three key points of vulnerability in e-commerce environment?


a. Client.
b. Server.
c. Communications pipeline (Internet communications channels).
4. List Malicious Code?
a. Exploits and exploit kits
b. Malvertising
c. Drive-by downloads
d. Viruses
e. Worms
f. Ransomware
g. Trojan horses
h. Backdoors
i. Bots, botnets
5. Define Phishing and tell its Tactics?

Phishing is Any deceptive, online attempt by a third party to obtain confidential information for financial gain.

• Tactics

– Social engineering

– E-mail scams and B E C phishing

– Spear phishing

6. What is Credit Card Fraud/Theft and what are Central security issue?

Credit Card Fraud/Theft is one of most feared occurrences, despite federal law limits on liability.

Central security issue are:-


a. E-signatures.
b. Multi-factor authentication.
c. Fingerprint identification.

7. Define the following terms:-


I. Spoofing,
II. Pharming, and
III. Spam (Junk) Websites.

– Spoofing:- Attempting to hide one’s true identity by using someone else’s e-mail or I P address.

– Pharming:- Automatically redirecting a U R L to a different address, to benefit the hacker.

– Spam (Junk) Websites:- Offer collection of advertisements for other sites, which may contain
malicious code.

8. Differentiate Denial of Service (D o S) and Distributed Denial of Service (D D o S) Attacks?

Denial of service (D o S) attack:-

a. Flooding website with pings and page request

b. Overwhelm and can shut down site’s web servers

c. Often accompanied by blackmail attempts

d. Botnets

Distributed Denial of Service (D D o S) attack:-

a. Uses hundreds or thousands of computers to attack target network.


b. Can use devices from Internet of Things, mobile devices.
9. What are Mobile Platform Security Issues?

a. Little public awareness of mobile device vulnerabilities.

b. 2018: Symantec blocked over 10,500 mobile apps per day.

c. Vishing.

d. Smishing.

e. SMS spoofing.

f. Madware.

10. What are Cloud Security Issues?


a. DDoS attacks.
b. Infrastructure scanning.
c. Lower-tech phishing attacks yield passwords and access.
d. Use of cloud storage to connect linked accounts.
e. Lack of encryption and strong security procedures.
11. What are Internet of Things Security Issues?
a. Challenging environment to protect.
b. Vast quantity of interconnected links.
c. Near identical devices with long service lives.
d. Many devices have no upgrade features.
e. Little visibility into workings, data, or security.
12. List Technology Solutions?

• Protecting Internet communications

• Securing channels of communication

• Protecting networks

• Protecting servers and clients

13. What is Encryption and provides what?

Encryption Transforms data into cipher text readable only by sender and receiver.

– Provides 4 of 6 key dimensions of e-commerce security:

 Message integrity

 Nonrepudiation

 Authentication

 Confidentiality

14. List securing Channels of Communication?


a. Secure Sockets Layer (S S L)/Transport Layer Security (T L S)
b. Virtual Private Network (V P N)
c. Wireless (Wi-Fi) networks.
15. List Protecting Networks?
a. Firewall
b. Proxy servers (proxies)
c. Intrusion detection systems
d. Intrusion prevention systems

NB:-Worldwide, companies spend more than $124 billion on security hardware, software, services.

16. Managing risk includes what?

Managing risk includes:-

a. Technology

b. Effective management policies

c. Public laws and active enforcement

17. What are the Limitations of online credit card payment

Limitations of online credit card payment:-

a. Security, merchant risk

b. Cost

c. Social equity
18. Define Block chain and list its benefits?

Block chain

Enables organizations to create and verify transactions nearly instantaneously using a distributed P2P
database (distributed ledger).

• Block chain Benefits:-

– Reduces costs of verifying users, validating transactions, and risks of storing and processing
transaction information.

– Transactions cannot be altered retroactively and therefore are more secure.

19. What are Four (EBPP) business models?

Four EBPP Electronic Billing Presentment and Payment business models are:-

a. Online banking model (most widely used)

b. Biller-direct

c. Mobile

d. Consolidator.

Chapter 6: E-commerce Marketing and Advertising Concepts

20. List five stages in consumer decision process?

Five stages in consumer decision process are:-

a. Awareness of need

b. Search for more information

c. Evaluation of alternatives

d. Actual purchase decision

e. Post-purchase contact with firm

21. What are two most important factors shaping decision to purchase online?

– Utility.

– Trust.

22. List Features of Internet marketing (vs traditional)?

Features of Internet marketing (versus traditional) are:-

a. More personalized

b. More participatory
c. More peer-to-peer

d. More communal

The most effective Internet marketing has all four features

23. What are Multi-Channel Marketing Plan?

Website

Traditional online marketing

Social marketing

Mobile marketing

Offline marketing

You might also like