Tuesday, October 12, 2010

Chapter 5

Chapter 5
1.    Why is it less risky to steal online? Explain some of the ways criminals deceive consumers and merchants.
       The internet makes it possible to rob people remotely and alomst anonymously. Downloading free music from online is stealing but it is easier than stealing original CD from store so that stealing online is a lot less risky.
2.    Give an example of security breaches as they relate to each of the six dimensions of
e-commerce security. For instance, what would be a privacy incident?

       Integrity- Redirecting a bank wire transfer, Nonrepudiation- Ordering items online and deny, Identifying the real person whom they dealing with on the Internet, Confidentiality- Only the authorized person can view the messages and data, Privacy- protecting the informations from the illegitimate or unauthorized users, Availability- ensure that an e-commerce site continues to function as intended.
3.    How would you protect your firm against a Denial of Service attack?
       I would have some sort of security system or censor that can watch hacker like that and block them before they start attacking the web site.
4.    How does spoofing threaten a Web site’s operations?
       Spoofing threaten the intergrity of a site such as redirect customers to a fake website to steal the payment from true site, changing orders and send them to true web site so that the company will ship the wrong order to customers.
5.    What are some of the steps a company can take to curtail cybercriminal activity from within a business?
       An Encryption can protect all the messeges and text from cybercriminal, only sender and receiver can read the messages.     
6.    Identify and discuss the five steps in developing an e-commerce security plan.
        A security plan begins with risk assessment- an assessment of the risks and points of vulnerability, security policy- a set of statements prioritizing the information risks, identifying acceptable risk targets, and identifying the mechanisms for achieving these targets, implementation plan- the steps you will take to achieve the security plan goals, security organization- educates and trains users; keeps management aware of security threats and breakdowns, Access controls determine which outsiders and insiders can gain legitimate access to the networks, Security audit involves the routine review of access logs.
7.    What are tiger teams, who uses them, and what are some of the tactics they use in their work?
      Tiger teams are the hacker teams that corporate security departments used to test their own security measures. White hats are helping organizations locate and fix security flaws. Black hats are hackers who engage in the same kinds of activities but without pay or any buy-in from the targeted organization, and with the intention of causing harm. Gray hats are hackers who believe they are pursuing some grater good by breaking in and revealing system flaws.
8.    How do the interests of the four major payment systems stakeholders impact each other?
     

Monday, October 4, 2010

Chapter 4

Chapter 4
1.    Name the six main pieces of the e-commerce site puzzle.
        Human Resource, Site's design, Organizational capability, telecommunication, Hardware, Software.
2.    Define the systems development life cycle and discuss the various steps involved in creating an e-commerce site.
      System development life cycle is a methodology for understanding the business objectives of any system and designing an appropriate solution. A life cycle methodology does not guarantee success, but it helps in creating documents that communicate to senior management that objectives of the site, important milestones and the uses of resources so that adopting the life cycle is way better than having no plan at all.
3.    What are the three main factors to consider when choosing the best platform for your Web site?
      Page deliver, page generation and page content.
4.    Why is Web server bandwidth an important issue for e-commerce sites?
        To make sure there is enough room for all the customer to hit at the same time.
5.    Compare and contrast the various scaling methods. Explain why scalability is a key business issue for Web sites.
      Scalability refers to the ability of a site to increase in size as demand warrants. Vertical scaling increase the processing power of individual components and Horizontal scaling use to employing multuple computers to share the workload and increase the footprint of the installation.
6.    What are the eight most important factors impacting Web site design, and how do they affect a site’s operation?
       Functionality, Informational, Ease of use, Redundant navigation, Ease of purchase, Multi-browser functionality, Simple graphics, Legible text.
7.    Name and describe three tools used to treat customers individually. Why are they significant to e-commerce?
       Widget are pre-built chunk of code that executes automatically in your HTML and allow wide variety of tasks. CGI is the interaction between browser and server. ASP allow for dynamic pages. 
8.    What are some of the policies e-commerce businesses must develop before launching a site and why?
     Privacy policy and accessibility rules.