Preview

Common Weaknesses and Attacks Associated with E-Commerce and Social Networking Application

Powerful Essays
Open Document
Open Document
1233 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Common Weaknesses and Attacks Associated with E-Commerce and Social Networking Application
Common weaknesses and attacks associated with e-commerce and social networking applications
Security of transactions is critical in building the confidence of customers in a specified e-commerce site. This security depends heavily on an organization 's ability to ensure authenticity, availability, privacy, integrity and disruption of unwanted intrusions. Malicious program known as sniffer programs often disrupt the privacy transactions especially when one uses unauthorized networks. They are found at network connection end points. When transactions are carried out, confidentiality is necessary thus it requires removing of any data showing transaction paths. This has become a common problem in the e-commerce sites.
Another particularly common problem facing e-commerce and social network applications is the trojan horse. Back Orifice, Netbus and BO2K are the most common types. They are hacker tools that enable a remote hacker to control, examine and monitor the user’s information. These Trojans are dangerous since they can provide the hacker a platform for sending information and make it appear as if the real owner of the computer has done so. This can be a significant risk since cyber terrorism can be easily carried out.
E-laundering has become an extremely common issue in the IT world. South Africa, for example, experienced laundering for the period March 1999 to September 2000 where they lost a total of R165.7 million. This is not the only case. A recent scam was rampant, where a Nigerian wrote a letter posing as a lawyer to a deceased rich man. This is another case where it would be easy for an unsuspecting victim to lose money.
Hackers have developed a way in which they can use mobile phones to hack into personal information of the user. This is known as phone phreaking. They often pose as a legitimate voice mail checker and guess an extension’s password. They then forward inbound calls placed to that extension to another location. When the phreaker calls



References: Collings, T., & Wall, K. (2005). Red Hat Linux Networking and System Administration. Indianapolis: Wiley. Network Security and Defensive Countermeasures (n.d.).Retrieved from http://www.brighthub.com/computing/smb-security/articles/107026.aspx Stavrou, A., & Institute for Security Studies (South Africa). (2002). Mission Impossible? : E-Security In South Africa 's Commercial And Financial Sectors. Pretoria, South Africa: Institute for Security StudiesRufi, A. W., & Cisco Networking Academy Program. (2007). Network Security 1 and 2 Companion Guide. Indianapolis, Ind: Cisco Press Wyckoff, A. (1999). The economic and social impact of electronic commerce: Preliminary findings and research agenda. Paris: OECD.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Unit 6 Chapter Exercises

    • 335 Words
    • 2 Pages

    References: Sobell, Mark G. A Practical Guide to Fedora™ and Red Hat® Enterprise Linux®, 6th Edition. Prentice Hall, 2012. VitalBook file.…

    • 335 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 7 Chapter Exercises

    • 458 Words
    • 3 Pages

    References: Sobell, Mark G. A Practical Guide to Fedora™ and Red Hat® Enterprise Linux®, 6th Edition. Prentice Hall, 2012. VitalBook file.…

    • 458 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    IS3445 Project Part 4

    • 565 Words
    • 2 Pages

    The security of a web application should become top priority when it comes to ensuring the security of the information that the application contains. When we, as an organization, think of security, we should all think of ways that the attacker would attempt to breach the application in order to gain access to the network, or exploit the vulnerability to his or her own benefits. There are many weaknesses pertaining to web applications, and these weaknesses each have an attack associated with it, with the attacker having his or her own motivation for the attack. The attacker’s motivation deeply depends on the type of attack that has occurred at that time. Listed below is a list of the common weaknesses and attacks associated with e-commerce and social networking applications.…

    • 565 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Kraemer, K. L., Dedrick, Jason., & Melville, Nigel. (2007). Global E-Commerce: Impacts of National Environment and Policy. , (), . Retrieved March 15, 2008, from http://web.gsm.uci.edu/kzhu/PDFfiles/Papers_Abstract/book_GEC_TOC_preface.pdf…

    • 1387 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    All rights reserved. Page 5 Types of Threats  Malicious software  Device failure  Application failure  Natural disaster  Intrusive cracker NT2580 Introduction to Information Security © ITT Educational Services, Inc.…

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Better Essays

    The last few years have been marked by numerous malicious applications that have increasingly targeted online activities. As the number of online activities continues to grow strong, ease of Internet use and increasing use base has perfected the criminal targets. Therefore, attacks on numerous users can be achieved at a single click. The methods utilized in breaching Internet security vary. However, these methods have increasingly become complicated and sophisticated over time. With the increase in threat levels, stronger legislations are being increasingly issued to prevent further attacks.…

    • 1097 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Cmgt 400 Week 2

    • 1100 Words
    • 3 Pages

    The internet is approximately 40 years old and is continuing to grow at a rapid pace. This rapid growth and use of the internet for practically everything you can do in life has also cause a major increase in threats. Cyber-criminals are often breaking into security on many major websites and making the news. Information Security is turning into an important part in protect a business’s information.…

    • 1100 Words
    • 3 Pages
    Better Essays
  • Better Essays

    Students use mobile devices, ranging from smartphones to tablets to laptops, to access class schedules, grades, email, and social network sites. Many devices have the capability to store user ID’s and passwords but personal security measures on these devices are not stringent, making it easy for an unauthorized person to intercept this information. Even though a college computer network may have numerous levels of protection, the system cannot easily track student authentication when mobile devices are used. This lack of authentication provides easy access for even a semi-skilled hacker to the user ID/password combination. Once the hacker has this information, he or she can take over…

    • 1432 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Security Dialogue 43(6) 495–512 © The Author(s) 2012 Reprints and permission: sagepub. co.uk/journalsPermissions.nav DOI: 10.1177/0967010612463488 sdi.sagepub.com…

    • 10783 Words
    • 44 Pages
    Powerful Essays
  • Powerful Essays

    References: Sarrel, M. (2003, December 30). Network Security: Know Your Weaknesses | Roundup | PCMag.com . Technology Product Reviews, News, Prices & Downloads | PCMag.com | PC Magazine. Retrieved January 30, 2013, from http://www.pcmag.com/article2/0,2817,140…

    • 1453 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    With the Internet and e-commerce becoming the way of purchasing for many people, security got much more complicated”. “ (Barr, Builiding Cross-Enterprise Security Teams, 2010)…

    • 1779 Words
    • 6 Pages
    Better Essays
  • Better Essays

    The Internet society believe that the Internet should be used by everyone freely, meaning that the number one objective is to promote the development, security and stability of the World Wide Web. Malicious attacks such as viruses, spams, spyware and other viscous attacks on hardware and software have become well known wide spread through the web. These attacks often result in irreparable damage and abuse the very freedom the Internet principles were based on (Internet security," 2012).…

    • 1786 Words
    • 8 Pages
    Better Essays
  • Powerful Essays

    Privacy of communications is essential to ensure that data cannot be modified or viewed in transit. Distributed environments bring with them the possibility that a malicious third party can perpetrate a computer crime by tampering with data as it moves between sites.…

    • 4620 Words
    • 19 Pages
    Powerful Essays
  • Better Essays

    Computer crimes are criminal activities, which involve the use of information technology to gain an illegal or an unauthorized access to a computer system with intent of damaging, deleting or altering computer data. Computer crimes also include the activities such as electronic frauds, misuse of devices, identity theft and data as well as system interference. Computer crimes involve activities of software theft, whereas the privacy of the users is hampered. These criminal activities involve the breach of human and information privacy, as also the theft and illegal alteration of system critical information. The different types of computer crimes have caused the introduction and use of newer and more effective security measures.…

    • 1193 Words
    • 5 Pages
    Better Essays
  • Good Essays

    The Internet has been developing for three decades eventually during the mid-nineties, the commercial use of the internet triggered high expectations in both executives and investors. (Brache and Webb, 2000; White, 2000; Senn, 2000) Online shopping is broadly defined as an activity that includes finding online retailers and products, searching for product information, selecting payment options and communicating with other consumers and retailer as well as purchasing products or services. Therefore, online shopping is one of the most important online activities. It has also made significant contributions to the economy. (Cai,Y. and Cube, B.J. 2008) according to Verdict (2007), In 2006 online spending grew by 33.4% to £10.9bn and it predicts that in the UK online spending will reach £28.0bn in 2011.Even in the time of recession, for instance, in the UK, online shopping volumes are continuing with double-digit growth (IMRG,2008), whereas the performance of traditional shopping is unsatisfactory. It has a wide…

    • 442 Words
    • 2 Pages
    Good Essays