Discuss the possible security threats in e-commerce systems

Security threats in e-commerce systems

The different types of security threats in e-commerce systems are described below:

i) Malicious Code

  • viruses,
  • worms,
  • Trojan horses,
  • ransomware, and
  • bots.

ii) Adware

iii) Spyware

iv) Social Engineering

v) Phishing

vi) Hacking

vii) Credit Card Fraud and Identity Fraud


Any five of them are described below:

i) Malicious Code: 

Malicious code (sometimes referred to as "malware"). Malware is any software intentionally designed to cause damage to a computer, server, client, or computer network. Malware includes a variety of threats such as viruses, worms, Trojan horses, ransomware, and bots.


ii) Adware: 

Adware is a form of threat where the computer starts for pop-up ads to display when th user visits certain sites. Adware is not typically used for criminal activities but it can be pretty annoying.


iii) Spyware: 

Spyware can be used to obtain information such as a user's keystrokes, copies of email and instant messages, and even take screenshots (and thereby capture passwords or other confidential data). Spyware constituted the least reported PUP, with less than 1% of computers reporting it. Other miscellaneous PUPs were reported by around 33% of computers worldwide.


iv) Social engineering: 

Social engineering relies on human curiosity, greed, and gullibility in order to trick people into taking an action that will result in the downloading o engineering manipulates people into performing actions or exposing confider.


v) Phishing: 

Phishing is any deceptive, online attempt by a third party to ob.. information for financial gain. Phishing attacks typically do not involve malicious code but instead rely on straightforward misrepresentation and fraud, so-called "social engineering" techniques. One of the most popular phishing attacks is the e-mail scam letter.


vi) Hacking: 

Hacking is an attempt to exploit a computer system or a private network inside a computer. Simply put, it is unauthorized access to or control over computer network security systems for some illicit purpose. An example of computer hacking can be: using a password cracking algorithm to gain access to a computer system.

 

vii) Credit card fraud and Identity theft: 

The terms credit card fraud and identity theft are often used interchangeably, but they're not the same. Credit card fraud occurs when someone steals credit card information and uses it to make unauthorized purchases. Whereas Identity theft happens when a thief uses our personal information to assume our identity for one or more purposes.



Comments

Popular posts from this blog

Suppose that a data warehouse for Big-University consists of the following four dimensions: student, course, semester, and instructor, and two measures count and avg_grade. When at the lowest conceptual level (e.g., for a given student, course, semester, and instructor combination), the avg_grade measure stores the actual course grade of the student. At higher conceptual levels, avg_grade stores the average grade for the given combination. a) Draw a snowflake schema diagram for the data warehouse. b) Starting with the base cuboid [student, course, semester, instructor], what specific OLAP operations (e.g., roll-up from semester to year) should one perform in order to list the average grade of CS courses for each BigUniversity student. c) If each dimension has five levels (including all), such as “student < major < status < university < all”, how many cuboids will this cube contain (including the base and apex cuboids)?

Suppose that a data warehouse consists of the four dimensions; date, spectator, location, and game, and the two measures, count and charge, where charge is the fee that a spectator pays when watching a game on a given date. Spectators may be students, adults, or seniors, with each category having its own charge rate. a) Draw a star schema diagram for the data b) Starting with the base cuboid [date; spectator; location; game], what specific OLAP operations should perform in order to list the total charge paid by student spectators at GM Place in 2004?

Discuss classification or taxonomy of virtualization at different levels.