Podcast
Questions and Answers
What is the most-used application of the Internet?
What is the most-used application of the Internet?
The World Wide Web (WWW) was invented in 1995.
The World Wide Web (WWW) was invented in 1995.
False
What is the term for technology that transmits voice and audio communication over the Internet using VoIP?
What is the term for technology that transmits voice and audio communication over the Internet using VoIP?
IP Telephony
What is the markup language that provides web designers with tags to format web pages?
What is the markup language that provides web designers with tags to format web pages?
Signup and view all the answers
Which of the following is NOT a common cyberattack?
Which of the following is NOT a common cyberattack?
Signup and view all the answers
Which of the following is a popular Filipino app that uses encryption to secure payment information?
Which of the following is a popular Filipino app that uses encryption to secure payment information?
Signup and view all the answers
What is the acronym for the protocol that is used to transfer web pages from a server to a browser?
What is the acronym for the protocol that is used to transfer web pages from a server to a browser?
Signup and view all the answers
Which of the following is NOT a type of business model in e-commerce?
Which of the following is NOT a type of business model in e-commerce?
Signup and view all the answers
Mobile apps are platform-specific, meaning they are designed to operate only on a particular mobile device’s hardware and operating system.
Mobile apps are platform-specific, meaning they are designed to operate only on a particular mobile device’s hardware and operating system.
Signup and view all the answers
What is the name of the marketplace for distributing Android apps?
What is the name of the marketplace for distributing Android apps?
Signup and view all the answers
What is a Denial of Service (DoS) attack?
What is a Denial of Service (DoS) attack?
Signup and view all the answers
What is phishing?
What is phishing?
Signup and view all the answers
What is the name of the stage in the development of the Internet where private companies made the Internet accessible to millions of people worldwide?
What is the name of the stage in the development of the Internet where private companies made the Internet accessible to millions of people worldwide?
Signup and view all the answers
Which of the following is NOT a key component of the security in e-commerce?
Which of the following is NOT a key component of the security in e-commerce?
Signup and view all the answers
Which of the following is a cybersecurity threat that aims to make a computer or network unavailable to its intended users?
Which of the following is a cybersecurity threat that aims to make a computer or network unavailable to its intended users?
Signup and view all the answers
What is Electronic Billing Presentment and Payment (EBPP)?
What is Electronic Billing Presentment and Payment (EBPP)?
Signup and view all the answers
Which of the following is NOT a popular payment system used in e-commerce?
Which of the following is NOT a popular payment system used in e-commerce?
Signup and view all the answers
What is the name of the law that strengthens legal protection against cyber threats in the Philippines?
What is the name of the law that strengthens legal protection against cyber threats in the Philippines?
Signup and view all the answers
The Philippines has a dedicated body to focus on Supply Chains and E-Commerce.
The Philippines has a dedicated body to focus on Supply Chains and E-Commerce.
Signup and view all the answers
Which of the following is NOT a factor that can hinder the progress of SDG 9?
Which of the following is NOT a factor that can hinder the progress of SDG 9?
Signup and view all the answers
Which of the following is NOT an initiative to support MSMEs in the Philippines?
Which of the following is NOT an initiative to support MSMEs in the Philippines?
Signup and view all the answers
Which of the following is a popular platform for e-commerce in the Philippines?
Which of the following is a popular platform for e-commerce in the Philippines?
Signup and view all the answers
Which of the following is a key role in e-commerce that involves managing online store operations, sales, and marketing efforts?
Which of the following is a key role in e-commerce that involves managing online store operations, sales, and marketing efforts?
Signup and view all the answers
Match the following e-commerce careers with their primary responsibilities.
Match the following e-commerce careers with their primary responsibilities.
Signup and view all the answers
Study Notes
E-Commerce Security and Payment Systems
- E-commerce security involves protecting sensitive data during online transactions.
- Key components of security include integrity, non-repudiation, authenticity, confidentiality, privacy, and availability.
- Examples of e-commerce platforms using security measures in the Philippines include Shopee and Lazada.
- Common cyber threats include denial-of-service (DoS) attacks, phishing, credit card fraud, hacking, and identity fraud.
- Examples of attacks include denial-of-service attacks on Philippine Airlines and phishing attempts from BDO, and a data breach at COMELEC.
Technology Solutions for E-Commerce Security
- Encryption transforms sensitive data into unreadable text, protecting it from unauthorized access.
- Filipino apps like GCash use encryption for secure payments.
- Public Key Cryptography secures transactions for banks, like RCBC.
- SSL/TLS protocols and VPNs safeguard communication channels.
Management Policies for E-Commerce Security
- Companies need a comprehensive security plan.
- Regularly conducting security audits is crucial.
- Adhering to laws like the Cybercrime Prevention Act of 2012 is important.
- Security plan components include : risk assessment, security policy, implementation plan, dedicated security team and periodic security audits.
- Examples include Metrobank's security protocols and Globe Telecom's audits.
E-Commerce Payment Systems
- Various payment systems like credit/debit cards, PayPal, mobile payments, and digital cash facilitate secure online purchases.
- Examples include Zalora Philippines using encryption, PayPal for international payments, and GCash and PayMaya for mobile payments in the Philippines.
- Electronic Billing Presentment and Payment (EBPP) allows companies to send bills electronically instead of paper, reducing costs and improving efficiency for consumers. Examples include BPI Express Online and GCash, and PLDT's Bill Direct feature.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Explore the essential aspects of e-commerce security, including the protection of sensitive data during online transactions. This quiz covers major security components, common cyber threats, and technology solutions like encryption and cryptography used in the Philippines. Test your knowledge on how platforms like Shopee and GCash ensure secure transactions.