Discuss the possible security threats in e-commerce systems
Security threats in e-commerce systems
The different types of security threats in e-commerce systems are described below:
i) Malicious Code
- viruses,
- worms,
- Trojan horses,
- ransomware, and
- bots.
ii) Adware
iii) Spyware
iv) Social Engineering
v) Phishing
vi) Hacking
vii) Credit Card Fraud and Identity Fraud
Any five of them are described below:
i) Malicious Code:
Malicious code (sometimes referred to as "malware"). Malware is any software intentionally designed to cause damage to a computer, server, client, or computer network. Malware includes a variety of threats such as viruses, worms, Trojan horses, ransomware, and bots.
ii) Adware:
Adware is a form of threat where the computer starts for pop-up ads to display when th user visits certain sites. Adware is not typically used for criminal activities but it can be pretty annoying.
iii) Spyware:
Spyware can be used to obtain information such as a user's keystrokes, copies of email and instant messages, and even take screenshots (and thereby capture passwords or other confidential data). Spyware constituted the least reported PUP, with less than 1% of computers reporting it. Other miscellaneous PUPs were reported by around 33% of computers worldwide.
iv) Social engineering:
Social engineering relies on human curiosity, greed, and gullibility in order to trick people into taking an action that will result in the downloading o engineering manipulates people into performing actions or exposing confider.
v) Phishing:
Phishing is any deceptive, online attempt by a third party to ob.. information for financial gain. Phishing attacks typically do not involve malicious code but instead rely on straightforward misrepresentation and fraud, so-called "social engineering" techniques. One of the most popular phishing attacks is the e-mail scam letter.
vi) Hacking:
Hacking is an attempt to exploit a computer system or a private network inside a computer. Simply put, it is unauthorized access to or control over computer network security systems for some illicit purpose. An example of computer hacking can be: using a password cracking algorithm to gain access to a computer system.
vii) Credit card fraud and Identity theft:
The terms credit card fraud and identity theft are often used interchangeably, but they're not the same. Credit card fraud occurs when someone steals credit card information and uses it to make unauthorized purchases. Whereas Identity theft happens when a thief uses our personal information to assume our identity for one or more purposes.
Comments
Post a Comment