MKGT 439 ch. 5
malware infection
According to the Computer Security Institute's 2011 Computer Crime and Security Survey, which of the following was the most commonly reported type of attack?
worm/Trojan horse
Netsky.P, which spreads by sending e-mails from an infected computer to all of the e-mail addresses found on that infected computer, is an example of a:
stored value payment system
P2P payment systems are a variation on what type of payment system
NFC
a set of short-rang wireless technologies used to share information among devices within about 2 inches of each other
debit cards enable consumers to make purchases even if they do not have sufficient funds at the time of purchase
all of the following statements about debit cards are true except
PKI guarantees that the verifying computer of the merchant is secure
all the following are true about PKI except
your online purchasing history being sold to other merchants without your concent
an example of privacy violation of e-commerce security is
phishing attacks
botnets are typically used
45
computer security institute reported in its 2011 survey that approximately ____ percent of responding organizations experienced a computer security incident within the previous 12 months
availability
dimensions of e-commerce security is not provided for by encryption
credit cards
examples of stored value payment systems except
perform a risk assessment
first step in developing an e-commerce security plan
ISPs
following are stakeholders in payment systems except
firewall
hardware/software that acts as a filter to prevent unwanted packets from entering a network
drive-by download
malware that comes with a downloaded file that user requests is called a
the hacking and looting of corporate servers storing credit card information
most frequent cause of stolen credit cards and card information today
Melissa worm spreads through microsoft word templates
not a computer crime committed in 2011-2012
it provides float
not a feature of cash
the credit card companies
not a key point of vulnerability when dealing with e-commerce
drive-by download
not an an example of a PUP
digital signatures
not an example of an access control
symmetic key encryption is computationally slower
not true about symmetric key encryption
less than 1
overall rate of online credit card fraud is ____ percent of all online card transactions
computer fraud and abuse act
primary federal statute used to combat computer crime
dual home systems
proxy servers are also known
availability
refers to the ability to ensure that an e-commerce site continues to function as intended
nonrepudiation
refers to the ability to ensure that e-commerce participants do not deny their online actions
confidentially
six key dimensions to e-commerce security are nonrepudiation, authenticity, availability, integrity, privacy and
spyware
software that used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as