2. Some companies prefer not to have disaster recovery plans. Under what circumstances does this make sense? Discuss. [5]
3.A body scan at airports created a big debate. Debate both points of this issue and relate it to EC security. [10]
4. . Your B2C site has been hacked. List two organizations where you would report this incident so that they can alert other sites. How do you do this, and what type of information do you have to provide?[5] 1. Consider how a hacker might trick people into giving him their user IDs and passwords to their Amazon.com accounts. What are some of the ways that a hacker might accomplish this? What crimes can be performed with such information? [10]
2. Some companies prefer not to have disaster recovery plans. Under what circumstances does this make sense? Discuss. [5]
3.A body scan at airports created a big debate. Debate both points of this issue and relate it to EC security. [10]
4. . Your B2C site has been hacked. List two organizations where you would report this incident so that they can alert other sites. How do you do this, and what type of information do you have to provide?[5] 1. Consider how a hacker might trick people into giving him their user IDs and passwords to their Amazon.com accounts. What are some of the ways that a hacker might accomplish this? What crimes can be performed with such information? [10]
2. Some companies prefer not to have disaster recovery plans. Under what circumstances does this make sense? Discuss. [5]
3.A body scan at airports created a big debate. Debate both points of this issue and relate it to EC security. [10]
4. . Your B2C site has been hacked. List two