explain why an e-commerce site might not want to report being the target of cybercriminals

1 min read

Explain why an e-commerce site might not want to report being the target of cybercriminals

Answer : fear of losing the trust of consumers.

How do biometric devices help improve security? What particular type of security breach do they reduce?

1.      Why is it less risky to steal online? Explain some of the ways criminals deceive consumers and merchants.
 
dIt is less risky to steal online because the Internet makes it possible to rob people remotely and almost anonymously.  A few of the ways criminals deceive consumers and merchants are by Trojans, phishing, data theft, or identity theft.
 
2.      Give an example of security breaches as they relate to each of the six dimensions of
e-commerce security. For instance, what would be a privacy incident?
Integrity (ability to ensure that information being displayed on a Web site or transmitted or received over the Internet has not been altered in any way by an unauthorized party), Non repudiation (the ability to ensure that e-commerce participants do not deny their online actions), and Authenticity (the ability to identify the identity of a person or entity with whom you are dealing on the Internet).
 
3.      How would you protect your firm against a Denial of Service attack?
 
I would protect my firm against a Denial of Service attack by assigning a duty to part of my company to watch for these attacks to start coming in and block them immediately.
 
4.      How does spoofing threaten a Web site’s operations?
 
Spoofing threatens a Web site's operations by for ex if hackers redirect customers to a fake Web site they can then collect and process orders, effectively stealing business from the true site.
 
5.      What are some of the steps a company can take to curtail cybercriminal activity from within a business?
 
Some steps a company can take to curtail cybercriminal activity from within a business by using firewalls or a proxy server so that they will be caught before they're able to destroy everything.
 
6.      Identify and discuss the five steps in developing an e-commerce security plan.
 
Five steps in developing an e-commerce security plan is perform a risk assessment (an assessment of the risks and points of vulnerability), develop a security policy (a set of statements prioritizing the information risks, identifying acceptable risk targets, and identifying the mechanisms for achieving these targets), develop an implementation plan (the action steps you will take to achieve the security plan goals), create a security organization (educates and trains users, keeps management aware of security threats and breakdowns, and maintains the tools chosen to implement security), and perform a security audit (which involves the routine review of access logs).
 
7.      What are tiger teams, who uses them, and what are some of the tactics they use in their work?
 
 Tiger teams are groups of hackers that are used by corporate security departments to test their own security measures. White hats are the good hackers who help organizations locate and fix security flaws.  Black hats are hackers who act with the intention of causing harm,  Grey hats are hackers who believe they are perusing some greater good by breaking in and revealing system flaws.
 
8.      How do the interests of the four major payment systems stakeholders impact each other?
 
The interests of the four major payment systems stakeholders impact each other because the stakeholders may have different preferences with respect to the different dimensions.  The main stakeholders in payment systems are consumers, merchants, financial intermediaries, and government regulators.
 

why may some organisations choose not to report a cyber-crime upon its detection?
why companies don't report cyber crimes
cybercrime are not reported to the authority
what would happen if cyber crimes are not reported to the authority
why are individual victims reluctant to report computer crime what about private corporations
how many cyber crimes go unreported
what would happen if cybercrimes are not reported to the authority brainly
why is technological crime unreported

Comments (0)

Leave a Comment

Type the above code here

Read Next

Caution to 2016 KCSE Candidates: Beware of Fake News! The Kenya Universities and Colleges Central Placement Service (KUCCPS)

1 min read

Fake newsall news are posted in approved newspapers and kuccps website.the kenya universities and colleges central placement service wishes to reiterate that it is still processing the 2017/2018...

Continue reading

KNEC – Quality Assessment & Credible Exams - KCPE & KCSE Registration Forms

2 min read

 knec – quality assessment & credible examshttps://www.knec.ac.ke/ the kenya national examinations council is dedicated to offering excellent services. here is our servic...

Continue reading

KUPPET Opposes KNUT’s Proposal For Disbandment Of TSC kenya 2019

2 min read

Kenya union of post-primary education teacher (kuppet) laikipia branch has opposed calls by knut national secretary general wilson sossion to have the teacher service commission (tsc) disbanded.the un...

Continue reading

Official The Golden Gate College Contacts, Courses ,intakes ,fee structures and Location 2018

1 min read

Official the golden gate college contacts p. o. box: 176-30307 mosoriotcourses offered at the golden gate college1. diploma in information science (knec) for a maximum of 10 trainees2. craft in inf...

Continue reading

Advertising 625 posts - TSC REPLACEMENT 2018 JOBS current jobs deadline - 18th September, 2018

2 min read

Tsc replacement 2018 tsc  jobs. view the current tsc job vacancies.  452 posts for primary schools and 173 posts for post primary institutions).tsc is seeking applications for various t...

Continue reading

list of kenya Deputy Governors

2 min read

County numbercounty name deputy governor 1.mombasa h.e dr. william kingi kazungu 2.kwale h.e fatuma mohamed achani 3.kilifi h.e gideon edmund saburi 4.tana rive...

Continue reading