Podcast
Questions and Answers
What is a major drawback of symmetric key encryption?
What is a major drawback of symmetric key encryption?
- It can be used without sharing keys.
- It relies on a single key for encryption and decryption. (correct)
- It requires a vast number of unique keys for all users. (correct)
- It is immune to computational attacks.
In public key encryption, how is a message encrypted?
In public key encryption, how is a message encrypted?
- Utilizing the sender's public key.
- With the recipient's public key. (correct)
- Using the same private key that will later decrypt it.
- By a randomly generated encryption key.
What information is included in a digital certificate?
What information is included in a digital certificate?
- Sender's personal address.
- Recipient's private key.
- Expiration date of the certificate. (correct)
- Sender's password.
What role do Certification Authorities (CAs) play in digital certificates?
What role do Certification Authorities (CAs) play in digital certificates?
Which statement correctly describes the relationship between public and private keys?
Which statement correctly describes the relationship between public and private keys?
Why is it problematic to send a symmetric key over an insecure medium?
Why is it problematic to send a symmetric key over an insecure medium?
What function do digital certificates serve?
What function do digital certificates serve?
What best describes public key infrastructure (PKI)?
What best describes public key infrastructure (PKI)?
What is meant by the term 'nonrepudiation' in e-commerce security?
What is meant by the term 'nonrepudiation' in e-commerce security?
Which of the following is NOT one of the six key issues of e-commerce security?
Which of the following is NOT one of the six key issues of e-commerce security?
Where can data be intercepted in e-commerce transactions?
Where can data be intercepted in e-commerce transactions?
What is the first step in ensuring data security during transmission?
What is the first step in ensuring data security during transmission?
What does confidentiality refer to in the context of e-commerce security?
What does confidentiality refer to in the context of e-commerce security?
What is encryption primarily used for in e-commerce?
What is encryption primarily used for in e-commerce?
How can a user's personal data be compromised when left unattended on a computer?
How can a user's personal data be compromised when left unattended on a computer?
What is one major limitation of communicating credit card information via email?
What is one major limitation of communicating credit card information via email?
What is the primary function of HTTPS protocols?
What is the primary function of HTTPS protocols?
What should be avoided regarding client credit card information in an e-commerce setting?
What should be avoided regarding client credit card information in an e-commerce setting?
What is an effective measure to secure the Admin Panel?
What is an effective measure to secure the Admin Panel?
What type of software is primarily used to detect and remove malware?
What type of software is primarily used to detect and remove malware?
Which of the following measures helps protect user data on e-commerce websites?
Which of the following measures helps protect user data on e-commerce websites?
What is a benefit of using Anti-Virus software, aside from detecting viruses?
What is a benefit of using Anti-Virus software, aside from detecting viruses?
What is a potential danger of clicking on infected links sent via communication platforms?
What is a potential danger of clicking on infected links sent via communication platforms?
What security measures should be taken to protect a payment gateway?
What security measures should be taken to protect a payment gateway?
What is the primary difference between symmetric key cryptography and public key cryptography?
What is the primary difference between symmetric key cryptography and public key cryptography?
What ensures the authenticity of information in digital communications?
What ensures the authenticity of information in digital communications?
Which of the following best describes cyber vandalism?
Which of the following best describes cyber vandalism?
What constitutes credit card fraud?
What constitutes credit card fraud?
Which attack is characterized by an attempt to manipulate data by pretending to be a trusted source?
Which attack is characterized by an attempt to manipulate data by pretending to be a trusted source?
What type of code is designed to cause harm to computer systems?
What type of code is designed to cause harm to computer systems?
What is the main effect of a Denial of Service (DoS) attack?
What is the main effect of a Denial of Service (DoS) attack?
What technique involves listening in on other people's communications?
What technique involves listening in on other people's communications?
What is a primary benefit of using third-party payment processors like PayPal and Stripe?
What is a primary benefit of using third-party payment processors like PayPal and Stripe?
What role do effective firewalls play in e-commerce security?
What role do effective firewalls play in e-commerce security?
Which of the following is a necessary step in ensuring PCI-DSS compliance?
Which of the following is a necessary step in ensuring PCI-DSS compliance?
Why is it important to educate staff and clients about security?
Why is it important to educate staff and clients about security?
What should a robust security policy include?
What should a robust security policy include?
What is a critical step following a risk assessment in security management?
What is a critical step following a risk assessment in security management?
What is one of the additional security implementations mentioned for e-commerce stores?
What is one of the additional security implementations mentioned for e-commerce stores?
What is the purpose of creating a security organization?
What is the purpose of creating a security organization?
Flashcards are hidden until you start studying
Study Notes
E-commerce Security Issues
- Integrity: Safeguarding against unauthorized changes to data.
- Nonrepudiation: Ensuring parties cannot deny their actions after transactions.
- Authenticity: Verifying the source of data and identity.
- Confidentiality: Preventing unauthorized access to sensitive information.
- Privacy: Maintaining control over personal data and its disclosure.
- Availability: Ensuring data is accessible and not delayed or removed.
Data Interception Points
- Data can be intercepted in three main areas:
- In the browser: Users input sensitive information which can be accessed if the device is left unattended.
- Between the browser and the server: Data in transit may be intercepted, even if encrypted.
- In the server: Vulnerable to external attacks and unauthorized access.
Security Measures
-
Encryption: Converts plaintext to ciphertext, protecting data during transmission.
- Symmetric key cryptography: Same key for encryption and decryption.
- Public key cryptography: Different keys for encryption (public) and decryption (private).
-
Digital Signature: E-signature that verifies the authenticity of information through encryption.
-
Security Certificates: Unique digital IDs for website identity verification.
Common Security Threats
- Hacking and Cyber Vandalism: Includes website defacement and malware creation.
- Credit Card Fraud: Unauthorized use of credit card information for purchases.
- Spoofing: Impersonating trusted entities to steal sensitive data.
- Malicious Code: Includes viruses, worms, and Trojans that harm systems.
- Denial of Service Attack: Overloading systems to restrict access for authorized users.
- Sniffing: Eavesdropping on network traffic to capture sensitive information.
E-commerce Security Solutions
- Implement HTTPS and SSL Certificates: Encrypt data transfer, improving security and search ranking.
- Use Anti-Malware and Anti-Virus Software: Protect systems from various malware infections.
- Secure Admin Panel and Server: Use strong, frequently changed passwords and restrict access based on roles.
- Safeguard Payment Gateways: Avoid storing credit card data; use third-party processors.
- Deploy Firewalls: Block unauthorized access and mitigate cyber-attacks.
- Educate Employees and Clients: Provide training on secure data handling and update access rights for former employees.
- Perform Regular Security Scans: Identify malware and ensure data backups.
- Conduct Risk Assessments: Catalog information assets and their importance to the organization.
- Develop a Security Policy: Define protection protocols and roles.
- Create an Implementation Plan: Outline actionable steps for achieving security goals.
- Establish a Security Organization: Dedicated team to manage security policies and guidelines.
Drawbacks of Symmetric Key Encryption
- Vulnerability to Key Theft: Same key must be shared over potentially insecure channels.
- Management Complexity: Requires a vast number of keys for millions of users.
Public Key Encryption
- Utilizes a pair of keys for secure messaging: one public (shared) and one private (kept secret).
- Digital certificates link public keys to identities, authenticated by trusted Certification Authorities (CAs).
- Digital Certificate Details: Includes subject's name, public key, serial number, expiration date, issuing authority’s signature, and more.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.