Quiz 4 econ 139a
Spear phishing is
A more sophisticated version of phishing using a level of personal details.
Which of the following is an example of an integrity violation of e-commerce security?
An unauthorized person intercepts an online communication and changes its contents
________ typically attack governments, corporations, and sometimes specific high profile individuals for political purposes.
Hacktivists
According to Symantec, almost half of the e-mail addresses involved in business e-mail compromise (BEC) phishing that it analyzed had an IP address originating in:
Nigeria
________ is the ability to identify the person or entity with whom you are dealing on the Internet.
authenticity
Which of the following dimensions of E-Commerce security is NOT delivered via encryption?
availability
Accessing data without authorization on Dropbox is an example of a:
cloud security issue
A ________ is hardware or software that acts as a filter to prevent unwanted packets from entering a corporate network.
firewall
The overall rate of online credit card fraud is ________ of all online card transactions.
less than 1%
________ is the ability to ensure that e-commerce participants do not deny their online actions.
nonrepudiation
Asymmetric key cryptography is also known as:
public key cryptography
Which of the following is NOT one of the core values Jeff Bezos spoke about in his interview?
punctuality
In terms of E-Commerce security, what is meant by the acronym SSL?
secure socket layer
Which of the following is NOT an example of malicious code?
sniffer
Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as:
spyware
What is the most frequent cause of stolen credit cards and card information today?
the hacking and looting of corporate servers storing credit card information
TRUE or FALSE. The United States, being the home of Silicon Valley, leads the world in the consumer adoption of mobile payment technologies
FALSE
The three key points of security vulnerability in E-Commerce as outlined in our textbook and in lectures are:
Client; Server; Communications Pipeline
A DDoS is an acronym for what kind of cyber attack:
Distributed Denial of Service Attack
Typically, the more security measures added to an e-commerce site, the slower and more difficult it becomes to use.
TRUE