Ch. 5 - Security and Payment Systems (E-Commerce)
6) Which of the following is an example of an integrity violation of e-commerce security?
An unauthorized person intercepts an online communication and changes its contents.
5) __ refers to the ability to identify the person or entity with whom you are dealing on the Internet.
Authenticity
32) Which of the following left the WikiLeaks Web site effectively inoperable in August 2012?
DDoS attack
28) Bitcoins are an example of:
Digital cash
23) Malware that comes with a downloaded file that a user requests is called a:
Drive-by download
12) Software that is used to obtain private user information such as a user's keystrokes or copies of email is referred to as:
Spyware
22) P2P payment systems are a variation on what type of payment system?
Stored value payment system
1) All of the the following are factors in contributing to the increase in cybercrime except:
The internet's similarity to telephone networks.
26) Which of the following did Dropbox implement after a series of security snafus in 2011 and 2012?
Two-factor authentication
19) Which of the following dimensions of e-commerce security is not provided for by encryption?
availability
7) __ refers to the ability to ensure that an e-commerce site continues to function as intended.
availability
14) Which dimension(s) of security is spoofing a threat to?
integrity and authenticity
16) Symmetric Key Encryption is also known as:
secret key encryption
15) All of the following are examples of malicious code except:
sniffers
18) A digital certificate contains all of the following except the:
subject's private key.
13) What is the most frequent cause of stolen credit cards and card information today?
the hacking and looting of corporate servers storing credit card information
8) An example of a privacy violation of e-commerce security is:
your online purchasing history being sold to other merchants without your consent.
31) Rustock is an example of which of the following?
Botnet
10) Most of the world's spam is delivered via which of the following?
Botnets
30) The research firm Cybersource estimated that online credit card fraud in the United States amounted to about ___ in 2011.
$3.4 billion
29) Online payments are believed to cost ___ to process compared to ___ for paper bills.
20 to 30 cents, $3 to $7
2) The Computer Security Institute reported in its 2011 survey that approximately __ percent of responding organizations experienced a computer security incident within the previous 12 months.
45
25) Which of the following countries has been found to have engaged in cyber espionage against Google?
China
9) __ refers to the ability to ensure that messages and data are only available to those authorized to view them.
Confidentiality
24) All of the following are limitations of the existing online credit card payment system except:
Cost to consumers
20) All of the following are methods of securing channels of communication except:
FTP
21) A __ is hardware or software that acts as a filter to prevent unwanted packets from entering a network.
Firewall
3) According to the Computer Security Institute's 2011 Computer Crime and Security Survey, which of the following was the most commonly reported type of attack?
Malware infection
4) __ refers to the ability to ensure that e-commerce participants do not deny their online actions.
Nonrepudiation
27) In the United States, the primary form of online payment is:
PayPal
11) Botnets are typically used for all of the following except:
Phishing attacks
17) Which of the following statements about public key encryption is not true?
Public key encryption ensures authentication of the sender.