Question

E-commerce business -Identify possible vulnerabilities and threats of information assets -Recommended security controls to improve the...

E-commerce business

-Identify possible vulnerabilities and threats of information assets

-Recommended security controls to improve the information security level

Homework Answers

Answer #1

1. There are many different types of threats and vulnerabilities in a E-commerce business. Some of them are accidental, some are purposeful, and some of them are due to human error. The most common security threats are an electronic payments system, e-cash,credit/debit card frauds, etc.

  • Fraud Risk: E-payment has a very huge risk of fraud. The computing devices use an identity of the person for authorizing a payment such as passwords and security questions. But there is a possibility if the passwords and answers to the security questions are matched, like if someone knows your password and security answers, he can easily have access to your profile and have your money.
  • Payment Conflicts: There maybe some errors or technical glitches on a system, and sometime it could result to payment conflicts. Thats why it is recommended to check our pay slip after every pay to make sure everything is alright.
  • E-Cash threats: It is a digital way which helps to do online transactions. Examples of which are Google Pay, Paytm, Phonepe etc. In this we store financial information on the computer, electronic device or on the internet which is vulnerable to the hackers. Some of the threats are:- Backdoor attacks, Denial of Service attacks.
  • Credit/ Debit Card Fraud: There are many scamsters and fraudsters who do Credit card or Debit card scam . Techniques like Phishing, Skimming, using keyloggers and many more.

2. Security Controls to improve the information security level

It is a smart approach to be aware of the threats that are present online. You should also be aware of how you can protect yourself from these E-Commerce threats and prepare for them. Some of the solutions could be:-

  • Use HTTPS: Using HTTPS webiste instead of plain HTTP website.HTTPS protocols not only protect the sensitive information users submit, but their user data as well.
  • Securing Admin panels and servers: Most ecommerce platforms come with default passwords that are ridiculously easy to guess. Using complex password and usernames and changing them frequently.
  • Payment Security: In order to save your business, you should never store credit card information on your servers and ensure your payment gateways security is not at risk. If you fall victim to a security breach, and hackers get their hands on credit card data.
  • Antivirus and Anti-Malware Software: Hackers can use stolen credit card information to place orders from anywhere in the world. An antivirus or an anti-fraud software can help to prevent yourslef from these scams.
  • Use Firewalls and Backing up your data: Using Firewalls and Backing up the data can be very useful if due to any malfunction or glitch datas are lost.
Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
Describe five vulnerabilities associated with the IT system as described and before security controls are implemented....
Describe five vulnerabilities associated with the IT system as described and before security controls are implemented. (a) Based on possible Threat Actors, briefly describe a risk associated with each of these vulnerabilities; using a scale of 1 - 5, assign a Probability of Occurrence and Consequence of Occurrence to each risk. (b) For each of these risks, identify a feasible risk treatment (risk reduction, transference, avoidance, or acceptance) with a short rationale for each. (c) Assume a risk has been...
Identify three kinds of business organizations that would have difficulty in becoming a successful e-commerce organization.?
Identify three kinds of business organizations that would have difficulty in becoming a successful e-commerce organization.?
10. Question 10 Which position conducts information security investigations for organizations to identify threats that could...
10. Question 10 Which position conducts information security investigations for organizations to identify threats that could compromise the organization? 1 point Information Security Architect Information Security Analyst Information Security Auditor Vulnerability Assessor 11. Question 11 ITIL is best described as what? 1 point Privacy regulations for IT systems. A collection of IT Service Management controls. A framework for the development of information systems audit procedures. A collection of IT Service Management best practices. 12. Question 12 Alice sends a message...
a. The Beadterprise is a business that retails African fashion accessories at the Arts Centre Emporium....
a. The Beadterprise is a business that retails African fashion accessories at the Arts Centre Emporium. To drive sales, sales assistants interact with potential customers; telling them the stories of the artifacts; explaining the significance of designs; and selecting accessories that fit clothing, body shapes, and mood of the customer. However, this is only possible with buyers who walk to the shop. Whenever they try to reach the larger market in the diaspora through agents and pictures, they lose the...
Business Problem-Solving Case Walmart and Amazon Duke It Out for E-Commerce Supremacy Walmart is the world’s...
Business Problem-Solving Case Walmart and Amazon Duke It Out for E-Commerce Supremacy Walmart is the world’s largest and most successful retailer, with $487.5 billion in 2014 sales and nearly 11,000 stores worldwide, including more than 4,000 in the United States. Walmart has 2.2 million employees and ranks first on the Fortune 500 list of companies. Walmart had such a large and powerful selling machine that it really didn’t have any serious competitors—until now. Today, Walmart’s greatest threat is Amazon.com, often...
State whether each of the following are true or false. Write the number of the question...
State whether each of the following are true or false. Write the number of the question and the answer, e.g. 1.11. True 1.1 A TPS uses simple procedures to record and store day-to-day transactions. 1.2 Contemporary information systems are interfacing with customers and suppliers using electronic commerce technology, CRM, and SCM over the internet. 1.3 Processes represent the data acquired from an information system. 1.4 All stakeholders of an information system share the same perspective of the system. 1.5 An...
Asia’s e-commerce landscape has been booming in recent years. The swift adoption of smartphones and greater...
Asia’s e-commerce landscape has been booming in recent years. The swift adoption of smartphones and greater access to the internet has allowed consumers in the region to be a major force in the global digital economy. The expansion looks set to continue at a rapid pace. According to a November 2018 report by Fitch Solutions, e-commerce sales in the region are forecast to increase by 14.2% this year, with an estimated average annual increase of 14% over the medium term...
Review the Robatelli's Pizzeria Case Study. Develop another internal controls system, but this time, in the...
Review the Robatelli's Pizzeria Case Study. Develop another internal controls system, but this time, in the purchases and fixed assets business areas. Prepare a 12- to 16-slide presentation describing the purchases and fixed assets business areas. Be sure to incorporate speaker notes as well as appropriate visuals, graphics, fonts, etc. Include any associated risk in these areas. Describe specific internal controls that include authorization of transactions, segregation of duties, adequate records and documentation, security of assets, and independent checks and...
Robatelli's Pizzeria Case StudyIntroduction On the morning of October 31st, Elaine Black, Chief Information Officer at...
Robatelli's Pizzeria Case StudyIntroduction On the morning of October 31st, Elaine Black, Chief Information Officer at Robatelli's Pizzeria, was waiting for both Jim Saxton, database administrator, and Peter Greyton, operations manager, to come to her office for a meeting. While waiting, Elaine was thinking about the surge of telephone and Internet orders expected to be received through the company's customer order center within the next 12 hours. Halloween had always been the most popular day of the year for people...
Which architectural pattern is most appropriate for the following multi-user, web-based system for providing a film...
Which architectural pattern is most appropriate for the following multi-user, web-based system for providing a film and photograph library?(1 Point) Please read textbook Chapter 6.3 Architectural Patterns MVC Pattern which separates presentation and interaction from the system data Layered architecture which organizes the system into layers, with related functionality associated with each layer Repository architecture - all data in a system is managed in a central repository that is accessible to all system components. Components do not interact directly, only...
ADVERTISEMENT
Need Online Homework Help?

Get Answers For Free
Most questions answered within 1 hours.

Ask a Question
ADVERTISEMENT