Discuss the possible security threats in e-commerce systems

Security threats in e-commerce systems

The different types of security threats in e-commerce systems are described below:

i) Malicious Code

  • viruses,
  • worms,
  • Trojan horses,
  • ransomware, and
  • bots.

ii) Adware

iii) Spyware

iv) Social Engineering

v) Phishing

vi) Hacking

vii) Credit Card Fraud and Identity Fraud


Any five of them are described below:

i) Malicious Code: 

Malicious code (sometimes referred to as "malware"). Malware is any software intentionally designed to cause damage to a computer, server, client, or computer network. Malware includes a variety of threats such as viruses, worms, Trojan horses, ransomware, and bots.


ii) Adware: 

Adware is a form of threat where the computer starts for pop-up ads to display when th user visits certain sites. Adware is not typically used for criminal activities but it can be pretty annoying.


iii) Spyware: 

Spyware can be used to obtain information such as a user's keystrokes, copies of email and instant messages, and even take screenshots (and thereby capture passwords or other confidential data). Spyware constituted the least reported PUP, with less than 1% of computers reporting it. Other miscellaneous PUPs were reported by around 33% of computers worldwide.


iv) Social engineering: 

Social engineering relies on human curiosity, greed, and gullibility in order to trick people into taking an action that will result in the downloading o engineering manipulates people into performing actions or exposing confider.


v) Phishing: 

Phishing is any deceptive, online attempt by a third party to ob.. information for financial gain. Phishing attacks typically do not involve malicious code but instead rely on straightforward misrepresentation and fraud, so-called "social engineering" techniques. One of the most popular phishing attacks is the e-mail scam letter.


vi) Hacking: 

Hacking is an attempt to exploit a computer system or a private network inside a computer. Simply put, it is unauthorized access to or control over computer network security systems for some illicit purpose. An example of computer hacking can be: using a password cracking algorithm to gain access to a computer system.

 

vii) Credit card fraud and Identity theft: 

The terms credit card fraud and identity theft are often used interchangeably, but they're not the same. Credit card fraud occurs when someone steals credit card information and uses it to make unauthorized purchases. Whereas Identity theft happens when a thief uses our personal information to assume our identity for one or more purposes.



Comments

Popular posts from this blog

Suppose that a data warehouse consists of the four dimensions; date, spectator, location, and game, and the two measures, count and charge, where charge is the fee that a spectator pays when watching a game on a given date. Spectators may be students, adults, or seniors, with each category having its own charge rate. a) Draw a star schema diagram for the data b) Starting with the base cuboid [date; spectator; location; game], what specific OLAP operations should perform in order to list the total charge paid by student spectators at GM Place in 2004?

Define Business ethics . Explain its significance.

Short Note on Security Architecture of E-governance