E-Commerce Security and Payment Systems
24 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the most-used application of the Internet?

  • Email (correct)
  • Messaging Applications
  • Internet Telephony Applications
  • Online Message Boards
  • The World Wide Web (WWW) was invented in 1995.

    False

    What is the term for technology that transmits voice and audio communication over the Internet using VoIP?

    IP Telephony

    What is the markup language that provides web designers with tags to format web pages?

    <p>HyperText Markup Language (HTML)</p> Signup and view all the answers

    Which of the following is NOT a common cyberattack?

    <p>Social Media Marketing</p> Signup and view all the answers

    Which of the following is a popular Filipino app that uses encryption to secure payment information?

    <p>GCash</p> Signup and view all the answers

    What is the acronym for the protocol that is used to transfer web pages from a server to a browser?

    <p>HTTP</p> Signup and view all the answers

    Which of the following is NOT a type of business model in e-commerce?

    <p>Business-to-Government (B2G)</p> Signup and view all the answers

    Mobile apps are platform-specific, meaning they are designed to operate only on a particular mobile device’s hardware and operating system.

    <p>True</p> Signup and view all the answers

    What is the name of the marketplace for distributing Android apps?

    <p>Google Play</p> Signup and view all the answers

    What is a Denial of Service (DoS) attack?

    <p>An attempt to make a computer, network, or service unavailable to its intended users by overwhelming it with a flood of illegitimate requests.</p> Signup and view all the answers

    What is phishing?

    <p>A type of social engineering attack that tricks individuals into sharing sensitive information, often through emails, messages, or fake websites that appear legitimate.</p> Signup and view all the answers

    What is the name of the stage in the development of the Internet where private companies made the Internet accessible to millions of people worldwide?

    <p>Commercialization</p> Signup and view all the answers

    Which of the following is NOT a key component of the security in e-commerce?

    <p>Reliability</p> Signup and view all the answers

    Which of the following is a cybersecurity threat that aims to make a computer or network unavailable to its intended users?

    <p>Denial of Service (DoS)</p> Signup and view all the answers

    What is Electronic Billing Presentment and Payment (EBPP)?

    <p>A system that allows companies to send bills and statements electronically instead of using paper.</p> Signup and view all the answers

    Which of the following is NOT a popular payment system used in e-commerce?

    <p>Bank Transfers</p> Signup and view all the answers

    What is the name of the law that strengthens legal protection against cyber threats in the Philippines?

    <p>Cybercrime Prevention Act of 2012</p> Signup and view all the answers

    The Philippines has a dedicated body to focus on Supply Chains and E-Commerce.

    <p>True</p> Signup and view all the answers

    Which of the following is NOT a factor that can hinder the progress of SDG 9?

    <p>Reduced inflation</p> Signup and view all the answers

    Which of the following is NOT an initiative to support MSMEs in the Philippines?

    <p>National Broadband Plan</p> Signup and view all the answers

    Which of the following is a popular platform for e-commerce in the Philippines?

    <p>Lazada</p> Signup and view all the answers

    Which of the following is a key role in e-commerce that involves managing online store operations, sales, and marketing efforts?

    <p>E-commerce Manager</p> Signup and view all the answers

    Match the following e-commerce careers with their primary responsibilities.

    <p>E-commerce Manager = Oversees the entire e-commerce strategy, from online store operations to sales and marketing efforts. Digital Marketing Specialist = Designs and executes email campaigns to nurture leads and drive conversions. Content Strategist / Content Writer = Manages inventory, shipping, and fulfillment processes. Customer Service Specialist = Provides support to customers, resolving inquiries, and maintaining positive customer relationships. Supply Chain and Logistics Coordinator = Creates content for product descriptions, blogs, and social media to attract and retain customers. Email Marketing Specialist = Focuses on digital campaigns to drive traffic and convert leads.</p> Signup and view all the answers

    Study Notes

    E-Commerce Security and Payment Systems

    • E-commerce security involves protecting sensitive data during online transactions.
    • Key components of security include integrity, non-repudiation, authenticity, confidentiality, privacy, and availability.
    • Examples of e-commerce platforms using security measures in the Philippines include Shopee and Lazada.
    • Common cyber threats include denial-of-service (DoS) attacks, phishing, credit card fraud, hacking, and identity fraud.
    • Examples of attacks include denial-of-service attacks on Philippine Airlines and phishing attempts from BDO, and a data breach at COMELEC.

    Technology Solutions for E-Commerce Security

    • Encryption transforms sensitive data into unreadable text, protecting it from unauthorized access.
    • Filipino apps like GCash use encryption for secure payments.
    • Public Key Cryptography secures transactions for banks, like RCBC.
    • SSL/TLS protocols and VPNs safeguard communication channels.

    Management Policies for E-Commerce Security

    • Companies need a comprehensive security plan.
    • Regularly conducting security audits is crucial.
    • Adhering to laws like the Cybercrime Prevention Act of 2012 is important.
    • Security plan components include : risk assessment, security policy, implementation plan, dedicated security team and periodic security audits.
    • Examples include Metrobank's security protocols and Globe Telecom's audits.

    E-Commerce Payment Systems

    • Various payment systems like credit/debit cards, PayPal, mobile payments, and digital cash facilitate secure online purchases.
    • Examples include Zalora Philippines using encryption, PayPal for international payments, and GCash and PayMaya for mobile payments in the Philippines.
    • Electronic Billing Presentment and Payment (EBPP) allows companies to send bills electronically instead of paper, reducing costs and improving efficiency for consumers. Examples include BPI Express Online and GCash, and PLDT's Bill Direct feature.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Explore the essential aspects of e-commerce security, including the protection of sensitive data during online transactions. This quiz covers major security components, common cyber threats, and technology solutions like encryption and cryptography used in the Philippines. Test your knowledge on how platforms like Shopee and GCash ensure secure transactions.

    More Like This

    Use Quizgecko on...
    Browser
    Browser