Preview

Ecommerce Theories & Practices

Satisfactory Essays
Open Document
Open Document
1740 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Ecommerce Theories & Practices
1. Consider how a hacker might trick people into giving him their user IDs and passwords to their Amazon.com accounts. What are some of the ways that a hacker might accomplish this? What crimes can be performed with such information? [10]

2. Some companies prefer not to have disaster recovery plans. Under what circumstances does this make sense? Discuss. [5]

3.A body scan at airports created a big debate. Debate both points of this issue and relate it to EC security. [10]

4. . Your B2C site has been hacked. List two organizations where you would report this incident so that they can alert other sites. How do you do this, and what type of information do you have to provide?[5] 1. Consider how a hacker might trick people into giving him their user IDs and passwords to their Amazon.com accounts. What are some of the ways that a hacker might accomplish this? What crimes can be performed with such information? [10]

2. Some companies prefer not to have disaster recovery plans. Under what circumstances does this make sense? Discuss. [5]

3.A body scan at airports created a big debate. Debate both points of this issue and relate it to EC security. [10]

4. . Your B2C site has been hacked. List two organizations where you would report this incident so that they can alert other sites. How do you do this, and what type of information do you have to provide?[5] 1. Consider how a hacker might trick people into giving him their user IDs and passwords to their Amazon.com accounts. What are some of the ways that a hacker might accomplish this? What crimes can be performed with such information? [10]

2. Some companies prefer not to have disaster recovery plans. Under what circumstances does this make sense? Discuss. [5]

3.A body scan at airports created a big debate. Debate both points of this issue and relate it to EC security. [10]

4. . Your B2C site has been hacked. List two

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Disaster recovery and business continuity planning are processes that help organizations prepare for disruptive events. Management's involvement in this process can range from overseeing the plan, to providing input and support, to putting the plan into action during an emergency.…

    • 494 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Passwords and personal account data obtain by illegal parties could be used for malicious purposes…

    • 1164 Words
    • 7 Pages
    Good Essays
  • Good Essays

    Mat 540 Quiz

    • 3391 Words
    • 14 Pages

    | A disaster recovery plan details what you are going to do if disaster strikes and threatens to or actually does knock out your IT system. Answer…

    • 3391 Words
    • 14 Pages
    Good Essays
  • Good Essays

    People have been competing in the activity of log rolling since the late 1800’s. Over the years, log rolling has developed into a unique pastime that honors its history as thousands of log rollers compete in competitions all across the United States and Canada. Log rolling has really grown in popularity in the recent years, and the United States Log Rolling Association is now petitioning for log rolling to be recognized by the International Olympic Committee as a sport. As a member of the IOC, it is my duty to review the activity of log rolling and determine if it meets the four points of criteria that define what qualifies as a sport.…

    • 1392 Words
    • 6 Pages
    Good Essays
  • Better Essays

    Cmgt 400 Week 2

    • 1100 Words
    • 3 Pages

    Amazon.com website went online in 1995 (Byers, 2006). Amazon offers there services and products through the website Amazon.com to many countries around the world, which includes: United States, Canada, France, Spain, Japan, Italy, Germany, United Kingdom, and China (Amazon, 2012). Amazon has been around for approximately 17 years and continuous to be a successful business. One of the reason for this is because Amazon investing time in Information Security. Amazon has a massive amount of information on servers around the globe contain sensitive information, not only information for Amazon but also for Amazon’s customers. Some examples of the information Amazon maintains on the servers they own: product information, warehouse information, call center information, customer service information, service information, customer account information, bank information, cloud computing information, digital media download information, and reviews of customers for product information (Amazon, 2012).…

    • 1100 Words
    • 3 Pages
    Better Essays
  • Powerful Essays

    Ais Ch. 11

    • 910 Words
    • 4 Pages

    3. Attacks involving manipulating and tricking individuals into divulging confidential information, such as imposter emails…

    • 910 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Tim J. Watts goes more into the dark side of the “hacker” community by bringing up the constant back in forth between computer security officers and the so called hackers. This article, being written this year is able to reflect on the events of September 11, 2001 and new homeland security measures. He represents this viewpoint of a dangerous hacker in his definition: “While some hackers are harmless, others break into systems with the intent to steal information or to do destruction to the system. Hackers performing the latter pose a serious threat to the economic future of the United States” (Watts). Tim Watt outright blames the hacker community of accessing information that should be private. Only looking and reflecting on the serious threat…

    • 154 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    3) Suppose your business had an e-commerce Web site where it sold goods and accepted credit card payments. Discuss the major security threats to this Web site and their potential impact. What can be done to minimize these threats?…

    • 280 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Data security would be a method that corporations use to keep important and confidential information protected. Access to this type of secure information is limited to those who have the authorization to view it. Data security is enforced so that private information that a corporation has about its employees, customers and others that they conduct business with is kept safe from any potential corruption from those who want to use it to their advantage. Many companies go to great lengths to keep their data safe and sound from hackers who can get confidential information from their systems. If a company is not careful and does not protect their confidential information many problems can occur. Some of these problems include identity theft of customers and employees. Hackers can steal information such as social security numbers, addresses, credit card information and many other key pieces of information that can let hackers easily access ones identity. The focus of this research paper would be about the Michaels Stores…

    • 813 Words
    • 4 Pages
    Better Essays
  • Better Essays

    Provide three specific examples of how the Internet has aided criminal activity. One of the examples could be considered as identity theft. Identity theft is the use of one person 's personal information by another to commit fraud or other crimes. The most common forms of identity theft occur when someone obtains another person 's social security number, driver 's license number, date of birth, and the like and uses it to open a fraudulent bank, credit card, cellular telephone, or other account, or to obtain false…

    • 1217 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Digital Crime

    • 5203 Words
    • 21 Pages

    Computers are used for many different types of personal and work related activities. Getting on the Internet and researching a topic for a college paper, researching types of flat screen televisions and their various prices, or what about getting on the computer and playing games, or using computers to watch movies and chat with friends and family. From a work standpoint, computers assist in processing orders, calculating and tracking numbers, manufacturing vehicles, sending email, and literally millions of other computer related activities. But, what if computers were used to copy Microsoft’s Office software applications and sell them at 60% cost on the black market? What if computers were used to login to accounts that weren’t the owners and take unauthorized data to sell for identify theft purposes? What if computers were used to hack into databases and “borrowed” data that then provided “insider information” that endowed an unprecedented stock gain for Members of the Board of Directors? These examples would mean that computers were being used for cyber-crimes. There are four primary categories of these types of cyber-crimes that will be the focus of this research paper.…

    • 5203 Words
    • 21 Pages
    Powerful Essays
  • Good Essays

    criminology unit 4

    • 593 Words
    • 3 Pages

    3. What is identity theft? How can identities be stolen? What can be done to reduce the impact of identity theft on victims?…

    • 593 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Computer Misuse Act

    • 277 Words
    • 2 Pages

    An example of computer misuse is the when a group of hackers hacked Apple taking peoples usernames and passwords taking control of their accounts. This group is called Anonymous can be able to hack into any site or company to promote the companies flaws. But this can be fatal to taking people’s money if they use Apples costumer’s usernames and passwords to corrupt and take money out of their accounts causing money loss to Apple and their customers.…

    • 277 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Computer crimes are criminal activities that involve using a computer and a network to gain unauthorized access with the intent of deleting, altering, or damaging computer data. Due to them being extremely versatile, establishing criminal and noncriminal behavior when in use can be very difficult at times. “According to the U.S. Uniform Crime Reporting Statistics, by 2000 more than 300 million users around the globe accessed the World Wide Web. Of those, at least 1 million were engaged in illegal Internet activities (computer crime or "cyber-crime"). Cyber-crimes include Internet-related forgery, embezzlement, fraud, vandalism, and the disposal of stolen goods. The potential threat to the overall development of e-commerce was serious—so much that online security expenditures were expected to double to $30 billion in 2004” (Computer Crime – Definitions). The four most common categories of computer crimes are infrastructure attacks, technological facilitation, information attacks, and promotion.…

    • 733 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Identity Theft Effect

    • 3103 Words
    • 13 Pages

    A major growing problem within the United States is identity theft. Identity theft is the stealing and use of someone's personal information used primarily for monetary gain. I will elaborate on how identity theft occurs and I will describe what criminals can do with the information they obtain. I will also explain some of the prevention plans that companies have put into place to protect themselves and discuss how individuals can protect themselves as well. The Federal Trade Commission estimates that ten million Americans were victims of identity theft in 2002. 27.3 million Americans have been victims of some form of identity theft from 1998 to 2003. In 2004, merchandise…

    • 3103 Words
    • 13 Pages
    Better Essays