5 steps in Developing an E-commerce Security Plan

1 min read

what is the first step in developing an e-commerce security plan

5 steps in Developing an E-commerce Security Plan

1. Perform a risk assessment
2. Develop a security policy
3. Develop an implementation plan
4. create a security organization
5. perform a security audit

The Role of Laws and Public Policy

New laws have granted local and national authorities new tools and mechanisms for identifying, tracing and prosecuting cybercriminals

National Infrastructure Protection Center – unit within FBI whose mission is to identify and combat threats against U.S. technology and telecommunications infrastructure

USA Patriot Act

Homeland Security Act

Government policies and controls on encryption software


Typically, the more security measures added to an e-commerce site, the slower and more difficult it becomes to use.

A worm does not need to be activated by a user in order for it to replicate itself.

A Trojan horse appears to be benign, but then does something other than expected.

Phishing attacks rely on browser parasites.

Spoofing involves attempting to hide a true identity by using someone else's e-mail or IP address.

The easiest and least expensive way to prevent threats to system integrity is to install anti-virus software.

Credit cards are the dominant form of online payment throughout the world.

In the United States, the primary form of online payment is: A) PayPal.
B) credit cards.
C) debit cards.
D) Google Wallet.

________ refers to the ability to ensure that e-commerce participants do not deny their online actions.
A) Nonrepudiation
B) Authenticity
C) Availability
D) Integrity

________ refers to the ability to identify the person or entity with whom you are dealing on the Internet.
A) Nonrepudiation
B) Authenticity
C) Availability
D) Integrity

Which of the following is an example of an integrity violation of e-commerce security?
A) A Web site is not actually operated by the entity the customer believes it to be.
B) A merchant uses customer information in a manner not intended by the customer.
C) A customer denies that he or she is the person who placed the order.
D) An unauthorized person intercepts an online communication and changes its contents.

An example of a privacy violation of e-commerce security is:
A) your e-mail being read by a hacker.
B) your online purchasing history being sold to other merchants without your consent.
C) your computer being used as part of a botnet.
D) your e-mail being altered by a hacker.

________ refers to the ability to ensure that messages and data are only available to those authorized to view them.
A) Confidentiality
B) Integrity
C) Privacy
D) Availability

Which of the following is not a key point of vulnerability when dealing with e-commerce?
A) the client computer
B) the server
C) the communications pipeline
D) the credit card companies

Accessing data without authorization on Dropbox is an example of which of the following?
A) social network security issue
B) cloud security issue
C) mobile platform security issue
D) sniffing

Most of the world's malware is delivered via which of the following?
A) botnets
B) Trojan horses
C) viruses
D) worms

Which of the following is the leading cause of data breaches?
A) theft of a computer
B) accidental disclosures
C) hackers
D) DDoS attacks

All of the following are examples of malicious code except:
A) worms
B) viruses
C) sniffers
D) bots

All of the following statements about public key encryption are true except
A) public key encryption uses two mathematically related digital keys.
B) public key encryption ensures authentication of the sender.
C) public key encryption does not ensure message integrity.
D) public key encryption is based on the idea of irreversible mathematical functions.

Which of the following is the current standard used to protect Wi-Fi networks?

Which of the following dimensions of e-commerce security is not provided for by encryption?
A) confidentiality
B) availability
C) message integrity
D) nonrepudiation

A ________ is hardware or software that acts as a filter to prevent unwanted packets from entering a network.
A) firewall
B) virtual private network
C) proxy server

What is the first step in developing an e-commerce security plan?
A) Create a security organization.
B) Develop a security policy.
C) Perform a risk assessment.
D) Perform a security audit.

Paypal is an example of what type of payment system?
A) digital checking system
B) accumulating balance system
C) online stored value payment system
D) digital credit card system

________ relies on human curiosity, greed, and gullibility to trick people into taking action that will result in the downloading of malware.
social engineering

A fingerprint or retina (eye) scan is an example of ________.

A(n) ________ is a feature of viruses, worms, and Trojans that allows an attacker to remotely access a compromised computer.

Malicious code is sometimes also referred to as ________.

Comments (0)

Leave a Comment

Type the above code here

Read Next

Official Skynet Business College-Limuru Contacts, Courses ,intakes ,fee structures and Location 2018

1 min read

Official skynet business college-limuru contacts p.o. box 49585-01000 nairobi courses offered at skynet business college-limuru 1. diploma in business management (knec) for a maximum of 15 traine...

Continue reading

Top 50 schools in kenya KCSE 2016 RESULTS

1 min read

1. alliance high school national 276 a- 81.783 kiambu2. moi high kabarak private 272 a- 79.862 nakuru3. precious b. riruta county 135 a- 79.604 nairobi4. kapsabet boys national 249 a- 79.062 nandi5. m...

Continue reading

KCPE & KCSE Dates - Schools opening dates for Grade 4, Class 8, and Form 4 2020

1 min read

Education cs george magoha has announced the reopening of schools for grade 4, class 8, and form four learners on monday, 12th. october, 2020 kcpe examinations to start on march 22, 2021 and end...

Continue reading

KSh 3bn set Aside to sponsor 17,000 students to Join private universities in Kenya Placed by KUCCPS

1 min read

 did you know that about sh3 billion has been set aside to support government-sponsored students in private universities. kenya universities colleges central placement service (kuccps.net) chief...

Continue reading

Official Directorate of Criminal Investigation (DCI) contacts, website and location

1 min read

Directorate of criminal investigationcontactsp.o. box 30036 - 00100 nairobi kiambu road opp. forestry department headquarters, karura+254 20 512090/1 websitehttp://www.cid.go.ke...

Continue reading

paypal to equity calculator

1 min read

How to withdraw money from paypal to equity bank accountgo to equity’s website and click on the paypal withdrawal link. this will lead you to the equity bank paypal withdrawal service...

Continue reading

Search Now

Trending Now