Preview

Potential Security Issues Faced by an e-Commerce Software

Good Essays
Open Document
Open Document
517 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Potential Security Issues Faced by an e-Commerce Software
Potential Security Issues faced by an e-Commerce Software
There are many security issues involved with e-commerce. Following is a brief list of potential hurdles or issues: 1. Back Doors and Trojan Horses 2. Viruses and Worms 3. Hackers 4. Active Contents, Active X 5. Eavesdropping & Password Attacks 6. IP Address Spoofing 7. DOS – Denial Of Service attack

1. Back Doors and Trojan Horses
These are software programs and they once they are installed or copied to a computer system, can open doors for further malicious, illegal or unauthorized actions. Trojan Horses apparently look harmless, however, they can be doing something dangerously wrong in the background. ‘Happy99.exe’ is a Trojan Horse that after displaying firework, sends its copies to email addresses found on the system. 2. Viruses And Worms These are also software programs. The difference between a virus and worm is that a virus propagates itself upon certain action by the user. But a worm doesn’t need any interaction to activate itself. ‘Love Bug’ is an example of a worm. It sends its copies to other email addresses, has the ability to damage the files on the target machine. This worm can also forward data from target machine to the attacker. It caused $9 billion loss worldwide. 3. Hackers These are the people who are behind all unauthorized access to other computer systems. They are also called crackers, someone who breaks in. They make software programs to intercept, steal or spy data from target machines. 4. Active Content, Active X Controls Web sites can host active X controls that can utilize various services on the target machine. Active Content is a term for embedded programs on web pages. Although they serve a good purpose and are very useful to perform various actions from web sites which inherently don’t have so much privileges and rights, however, hackers can still program such active X controls or embed

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT260 unit 1 assignment 1

    • 624 Words
    • 3 Pages

    Malware - Can take many forms, but as the name implies, it is malicious software. It can take the form of viruses, bots, spyware, worms, trojans, rootkits, and any other software intended to cause harm. Having proper firewall and security software protection can usually prevent malware from spreading.…

    • 624 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    |Trojan horse - A virus that allows a backdoor into a computer affecting the computer without the users knowledge and allows the information stored |…

    • 829 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1330 Unit 1

    • 345 Words
    • 2 Pages

    It is important to learn the various ways how the malwares, malicious files like the ones in context enters an unprotected PC system.…

    • 345 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It205 Capstone Question

    • 633 Words
    • 3 Pages

    Malicious software, referred to as malware, can contain a variety of threats, from data loss to system failures. There are several types of worms, viruses, Trojan horses and spyware, which can be delivered in a variety of ways. Computer viruses are a type of software or executable file that attaches itself to other programs to be uses. Viruses can cause system failures, rewrite hard drives, or destroy files and programs. Worms are similar to viruses, but are independent programs, rather that attaching to others. Viruses have a tendency to spread more rapidly over networks and through e-mail. Trojan horses are based off their namesake, in which they appear to benign types of programs, but when executed can introduce malware into your system. Spyware is programing that can track computer use. Forms of…

    • 633 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Lab 2

    • 639 Words
    • 2 Pages

    1. What are the various types of malware? How do worms differ from viruses? Do Trojan…

    • 639 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Nt1310 Unit 3 Essay

    • 1872 Words
    • 8 Pages

    There are cybercriminals who commit crimes using the computers and networks. They spread malicious viruses through the networks such as worms and Trojan horses. They hack other people's computers to steal important data and identity or destroy data. A hacker uses a packet sniffer to intercept the unencrypted network traffic and capture the passwords or other important information which was communicated through the network. Botnet or a Zombie computer is a computer which a hacker uses to spread viruses and to commit cybercrimes while the owner of the computer is unaware of it.…

    • 1872 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    “A rose for Emily” is a short story about the last member of her family, and her very old father. The story was published in 1930, by a very well respected author, William Faulkner. When Emily’s father dies, she is completely heartbroken and denies that he is really dead.…

    • 62 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Ais Ch. 11

    • 910 Words
    • 4 Pages

    5. Relatively small programs that infect other application software by attaching to it and disturbing application functioning…

    • 910 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Testbacksecurity

    • 2284 Words
    • 10 Pages

    A worm can deposit copies of itself onto all Web servers that the infected system can reach, so that users who subsequently visit those sites become infected.…

    • 2284 Words
    • 10 Pages
    Good Essays
  • Good Essays

    Computer Memory Hacking

    • 820 Words
    • 2 Pages

    Who Are Hackers ­ A Hacker 's Tools Of The Trade | Hackers | FRONTLINE | PBS. (n.d.).…

    • 820 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    progress check 1

    • 711 Words
    • 3 Pages

    A computer virus is programmed to raid and attack existing computer programs. The virus is sent by an e-mail or activated through a download. The virus program then infects the whole computer system. The virus attaches itself to other programs in the computer and copies itself. Some computer viruses are terrible; they erase files or lock up systems. Viruses must not go untreated.…

    • 711 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Chapter 9 Final Exam Paper

    • 4652 Words
    • 19 Pages

    a) organization mission – organization strategic plan – IS strategic plan – new IT architecture…

    • 4652 Words
    • 19 Pages
    Good Essays
  • Good Essays

    Cracker: A malicious attacker who deliberately intrudes upon systems or networks to gain unauthorized access or unauthorized resources.…

    • 413 Words
    • 2 Pages
    Good Essays
  • Good Essays

    The wise one once said that when in the early 20th century, most of the continent in Europe had imperialism. I believe that imperialism was the primary cause of the conflicts in Europe that became WW1. The definition of imperialism is one territory or country taking control over a lighter one to control them. Most people, historians disagree on whether the primary momentum for imperialism was cultural and economic. In early twentieth century, Spain’s imperial power was dwindling. Although, most people in every continent believe that imperialism was the main causal agent of the first world war. An Imperialism had an unequal relationship, form an empire, forced other countries and citizens, even resulting domination and subordination of economics…

    • 697 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Ethics

    • 916 Words
    • 4 Pages

    Black Hat Hackers; groups of individuals that writes and deploys malware programs and or viruses for profit or for fun.…

    • 916 Words
    • 4 Pages
    Good Essays