Podcast
Questions and Answers
What type of attack can prevent legitimate users from accessing an online store?
What type of attack can prevent legitimate users from accessing an online store?
Which of the following is NOT a consequence of data theft in e-commerce?
Which of the following is NOT a consequence of data theft in e-commerce?
What is one effective method for enhancing security in e-commerce?
What is one effective method for enhancing security in e-commerce?
Which of the following is NOT an essential requirement for safe e-payments?
Which of the following is NOT an essential requirement for safe e-payments?
Signup and view all the answers
How might Trojan horses be employed in cyber attacks?
How might Trojan horses be employed in cyber attacks?
Signup and view all the answers
What is the role of encryption in e-commerce security?
What is the role of encryption in e-commerce security?
Signup and view all the answers
Which factor contributes to uncertainty during online transactions?
Which factor contributes to uncertainty during online transactions?
Signup and view all the answers
What does non-repudiability in e-commerce mean?
What does non-repudiability in e-commerce mean?
Signup and view all the answers
What is a digital signature in the context of e-commerce?
What is a digital signature in the context of e-commerce?
Signup and view all the answers
Which of the following poses a security risk for businesses in e-commerce?
Which of the following poses a security risk for businesses in e-commerce?
Signup and view all the answers
Study Notes
E-Commerce Security Systems
- Security is crucial for online transactions
- Customer trust is lost if security is compromised
- Essential requirements for secure payments:
- Confidentiality: Information must not be accessible to unauthorized users
- Integrity: Information must not be altered during transmission
- Availability: Information must be available when needed
- Authenticity: Users must be authenticated before accessing information
- Non-Repudiability: Sender/recipient cannot deny actions
- Encryption: Data must be encrypted and decrypted only by authorized users
- Auditability: Data must be auditable for integrity
E-Commerce and Internet Marketing Security Environment
- Encryption: Data is encrypted using secret codes, only the receiver can decrypt it
- Digital Signatures: Authenticate information through encryption and passwords
- Security Certificates: Unique digital IDs verify user/website identity
- Security Risks in E-commerce:
- Counterfeit Websites: Fake versions of legitimate sites, damaging reputation
Security Threats in E-Commerce
- Malware, Viruses, and Online Frauds:
- Hackers use malware to cause financial losses and reputation damage.
- Trojan horses, worms, and viruses infect systems.
- Uncertainty and Complexity in Online Transactions:
- Online transactions can be vulnerable to fraud in areas like payment, dispute resolution, and delivery
E-commerce Website Security Measures
- Multi-Layer Security:
- Use Content Delivery Networks (CDNs) to block Distributed Denial-of-Service (DDoS) attacks
E-Commerce Policies
- Terms of Service: Rules and regulations for website usage.
- Privacy Policy: Required by law (e.g., GDPR), for data processing consent, anonymity, and breach notification
- Returns and Exchanges Policy: Policies for returns and exchanges
- Shipping Policy: Details regarding shipping options, costs, and times.
- Taxes: Must adhere to sales tax regulations in relevant jurisdictions based on nexus
Static vs Dynamic Websites
- Static Websites: Fixed pages, simple layout, fast loading, low cost
- Advantages: Fast, cheaper hosting
- Disadvantages: Difficult to change, limited functionality
- Dynamic Websites: Interactive & functional pages, frequently updated content, complex structures, higher costs
- Advantages: Interactive, easy updates, versatile, quicker responsiveness
- Disadvantages: Slower loading times, higher costs, more complex
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.