e-commerce
13 Questions
3 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Information should be available wherever and whenever required within a time limit specified.

Availability

There should be a mechanism to authenticate a user before giving him/her an access to the required information.

Authenticity

It is the protection against the denial of order or denial of payment. Once a sender sends a message, the sender should not be able to deny sending the message. Similarly, the recipient of message should not be able to deny the receipt

Non-Repudiability

Data should be recorded in such a way that it can be audited for integrity requirements.

<p>Auditability</p> Signup and view all the answers

Information should not be accessible to an unauthorized person. It should not be intercepted during the transmission.

<p>Confidentiality</p> Signup and view all the answers

Information should not be altered during its transmission over the network.

<p>Integrity</p> Signup and view all the answers

It is an essential part of any transaction that takes place over the internet. Customers will lose his/her faith in e-business if its security is compromised.

<p>Security</p> Signup and view all the answers

Information should be encrypted and decrypted only by an authorized user.

<p>Encryption</p> Signup and view all the answers

It is a very effective and practical way to safeguard the data being transmitted over the network.

<p>Encryption</p> Signup and view all the answers

Ensures the authenticity of the information through encryption and password.

<p>Digital Signature</p> Signup and view all the answers

It is a unique digital id used to verify the identity of an individual website or user.

<p>Security Certificates</p> Signup and view all the answers

Hackers can easily create fake versions of legitimate websites without incurring any cost

<p>Counterfeit Sites</p> Signup and view all the answers

Some fraudsters change the content of a website. Their goal is usually to either divert traffic to a competing website or destroy the affected company’s reputation.

<p>Malicious Alterations to Websites</p> Signup and view all the answers

Flashcards

Availability

Information must be accessible when and where needed, within a given time limit.

Authenticity

Users must be verified before accessing information.

Non-Repudiation

Preventing sender or recipient from denying actions related to information exchange.

Auditability

Data must be recorded for integrity checks.

Signup and view all the flashcards

Confidentiality

Unauthorized access and interception of data transmission mustn’t occur.

Signup and view all the flashcards

Integrity

Data must not be altered during transmission.

Signup and view all the flashcards

Security

Protecting e-business transactions from compromise to maintain customer trust.

Signup and view all the flashcards

Encryption

Encoding information to protect it during transmission.

Signup and view all the flashcards

Digital Signature

Verifying authenticity via encryption and passwords.

Signup and view all the flashcards

Security Certificates

Unique digital IDs confirming website or user legitimacy.

Signup and view all the flashcards

Counterfeit Sites

Fake websites mimicking legitimate ones.

Signup and view all the flashcards

Malicious Alterations

Deliberately changing website content to harm or redirect traffic.

Signup and view all the flashcards

More Like This

Databases vs
1 questions

Databases vs

CleanConsciousness avatar
CleanConsciousness
Chapter 42: Disabilities
40 questions
Impact of IT and Social Media on Society
8 questions
Use Quizgecko on...
Browser
Browser