1. Why is it less risky to steal online? Explain some of the ways criminals deceive consumers and merchants.
The internet makes it possible to rob people remotely and anonymously. People can get download free music, steal people e-mails, and use viruses to shut down web site.
2. Give an example of security breaches as they relate to each of the six dimensions of e-commerce security. For instance, what would be a privacy incident?
Integrity- Rewiring a bank account
Nonrepudiation- Someone could order something online then deny it
Authenticity- Someone who claims to be something he is not violated this dimension
Confidentiality- Someone gets on someone else's personal site
Privacy- Someone uses someone else's personal information
Availability- Someone could shut down a web site
3. How would you protect your firm against a Denial of Service attack?
You could make it where users of the site have to log in
4. How does spoofing threaten a Web site’s operations?
Spoofing threatens the integrity of a site. they can end up stealing business from the site.
5. What are some of the steps a company can take to curtail cybercriminal activity from within a business?
Message encryption protects the messages by making them only accessible by the sender and receiver.
6. Identify and discuss the five steps in developing an e-commerce security plan.
Perform a Risk Assessment, Develop a Security Policy, Develop an implementation Plan, Create a Security Organization, Perform a Security Audit.
7. What are tiger teams, who uses them, and what are some of the tactics they use in their work?
A Tiger Team is a group of programmers or users who volunteer or are hired to expose error or security holes in new software or to find out why a computer network's security is being broken.
8. How do the interests of the four major payment systems stakeholders impact each other?