Term
Top 10 Threats to E-Commerce, 5 relate to fraud
List these |
|
Definition
Misc Fraud Advance Fee Fraud Auction fraud Credit card fraud Overpayment fraud |
|
|
Term
Top 10 Threats to E-Commerce, 5 relate to fraud
List the ones that don't |
|
Definition
Non-delivery FBI-Related scams ID Theft Computer crimes Spam |
|
|
Term
How are users tricked in e-commerce? |
|
Definition
Phishing and pharming attacks |
|
|
Term
How does phishing often give itself away? |
|
Definition
It arrives as spam and does not discriminate between receipients |
|
|
Term
|
Definition
Redirecting someone from a legit website to a hackers one, can be done via DNS poisoning. |
|
|
Term
Which two types of communications do e-commerce use instead of emails |
|
Definition
Messaging features within websites Traditional email ltd to notification of messages awaiting retrieval |
|
|
Term
Securing an e-commerce site has three layers to secure which are |
|
Definition
User side During transport of data At the merchant side |
|
|
Term
What considerations for sec at the user side (2) |
|
Definition
Physical access control to the machine User auth and authorisation |
|
|
Term
What considerations for sec at the transport (2) |
|
Definition
|
|
Term
What sec at the merchant side (3) |
|
Definition
Secure storage of user info User's privacy protection Auth of parties involved |
|
|
Term
Three types of certificates |
|
Definition
Self issues Legit Extended validity |
|
|
Term
What are the threats to E-Commerce? |
|
Definition
Fraud Identity theft Non-delivery Spam |
|
|
Term
List TEN. THAT'S RIGHT, TEN Fraud scenarios |
|
Definition
Steals CC details Manipulates the price of products fake orders on behalf of other users Cancel orders of other users Modify shipping address of order Shut down online store Harvest email Ids for spam Reset passwords of users Gifts himself a gift voucher from another user Places two orders for the price of one |
|
|
Term
How could a user notice they've been 'pharmed' |
|
Definition
Lack of SSL or invalid certifiate |
|
|
Term
What is the consequence of phishing to the user? |
|
Definition
Parting with the requested information leaves the user vulnerable to theft and financial loss |
|
|
Term
What does phising force companies to do? |
|
Definition
Communicate with their users in other ways |
|
|
Term
What way might merchants talk to their customers besides emails? |
|
Definition
Incorp. messaging features within websites |
|
|
Term
What two threats besides phishing and pharming are there to e-commerce? |
|
Definition
Defacement Denial of service |
|
|
Term
What two phishing and pharming exploit? |
|
Definition
|
|
Term
What considerations are there when securing an e-commerce site? (5) |
|
Definition
Client, data in transmit, e-commerce server, backend system, database |
|
|
Term
What security do you consider at the user side? |
|
Definition
Physical access control to the machine
User authentication and authorisation |
|
|
Term
What considerations are there during transport of data? |
|
Definition
Confidentiality
Data integrity |
|
|
Term
Security at the merchant side needs which considerations? |
|
Definition
Secure storage of user info
User privacy protection
Authentication of parties involved |
|
|
Term
What is the most widely used security mechanism for e-commerce? |
|
Definition
|
|
Term
What provides encryption of the communications link and confirmation that server belongs to merchant? |
|
Definition
|
|
Term
|
Definition
Allow the merchant to ID the consumer (unless the consumder has a certificate) |
|
|
Term
|
Definition
Encryption of the comms link
Confirmation that server belongs to merchant |
|
|
Term
What four measures are there to boost confidence? |
|
Definition
Verified by Visa
Verisign
Mastercard SecureCode
TrustE |
|
|
Term
How do schemes like Verified by Visa work? |
|
Definition
Users berify the legitimate use of their card number by providing a password |
|
|
Term
What is an extended validity certificate? |
|
Definition
Like a legit certificate, but more |
|
|
Term
What three types of certificates can you get? |
|
Definition
Self-issued Legitimate Extended validity |
|
|
Term
What did some bloody academics break? |
|
Definition
Created a rogue certification authority |
|
|
Term
What does a rogue certificate authority allow to happen? |
|
Definition
|
|
Term
How does the rogue certificate authority generate certificates? |
|
Definition
|
|
Term
What are the required actions for E-Commerce? |
|
Definition
Appropriate use of technologies
Improved awareness to increase consumer confidence |
|
|
Term
What type of protection is needed for e-commerce? |
|
Definition
Authentication of merchant server Authentication of client computer Protection during transmit for C&I Secure storage Privacy protection Physical access to client machine |
|
|
Term
What is available to protect e-commerce? |
|
Definition
SSL to protect during transmit Certificates to authenticate Encryption at the client end Further authentication through things like 'Verified by Visa' |
|
|