Chapter 5 Information Systems
The research firm Cybersource estimated that online credit card fraud in the United States amounted to about BLANK in 2012:
3.5 billion
Online bill payments now accounts for BLANK of all bill payments:
50%
The Data Encryption Standard uses a BLANK bit key
56
Which of the following is an example of an integrity violation of e-commerce security?
An unauthorized person intercepts an online communication and changes its contents
Which of the following is an example of an integrity violation of e-commerce security?
An unauthorized person intercepts an online communication and changes its contents.
Online bill payments are believed to cost BLANK to process compared to BLANK for paper bills:
20 to 30 cents, 3 to 7
The research firm Cybersource estimated that online credit card fraud in the United States amounted to about BLANK in 2012.
3.5 billion
BLANK refers to the ability to identify the person or entity with whom you are dealing on the Internet:
Authenticity
Which of the following dimensions of e-commerce security is not provided for by encryption?
Availability
Most of the world's spam is delivered via which of the following?
Botnets
A BLANK is a hardware or software that acts as a filter to prevent unwanted packets from entering a network:
Firewall
A BLANK is hardware or software that acts as a filter to prevent unwanted packets from entering a network:
Firewall
Which dimensions of security is spoofing a threat to?
Integrity and authenticity
The overall rate of online credit card fraud is BLANK% of all online card transactions
Less than 1
Which of the following is a set of short-range wireless technologies used to share information among devices within about 2 inches of each other?
NFC
BLANK refers to the ability to identify the person or entity with whom you are dealing on the Internet.
Nonrepudiation
All of the following statements about PKI are true except:
PKI guarantees that the verifying computer of the merchant is secure
All of the following are used for authentication except:
Packet filters
What is the first step in developing an e-commerce security plan?
Perform a risk assessment
BLANK refers to the ability to ensure that messages and data are only available to those authorized to view them:
Privacy
All of the following statements about public key encryption are true except:
Public key encryption ensures authentication of the sender
Software that is used to obtain private user information such as user's keystrokes or copies of e-mail is referred to as:
Spyware
none of the following payment systems offers immediate monetary value except:
Store value/debit card
P2P payment systems are a variation on what type of payment system?
Stored value payment system
A digital certificate contains all of the following except the:
Subject's private key
An example of a privacy violation of e-commerce security is:
Your online purchasing history being sold to other merchants without your consent.
An intrusion detection system can perform all of the following functions except:
blocking suspicious activity
Rustock is an example of which of the following?
botnet
Most of the world's spam is delivered via which of the following?
botnets
In the United States, the primary form of online payment is:
credit cards
Botnets are typically used for all of the following except:
phishing attacks
Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as:
spyware
All of the following statements about symmetric key encryption are true except:
symmetric key encryption is computationally slower
Which of the following did Dropbox implement after a series of security snafus in 2011 and 2012?
two-factor authenticiation
Linden Dollars, created for use in Second Life, are an example of:
virtual currency
Which of the following did Dropbox implement after a series of security snafus in 2011 and 2012?
Two-factor authentication
Which of the following is the current standard used to protect Wi-Fi networks?
WPA2
Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as:
Checking network traffic to see if it matches certain patterns or preconfigured rules
Which of the following countries has been found to have engaged in cyberespionage against Google?
China
The six dimensions to e-commerce security are nonrepudiation, authenticity, availability, integrity, privacy, and:
Confidentiality
All of the following are limitations of the existing online credit card payment systems except:
Cost to consumers
Which of the following left the WikiLeaks Web site effectively inoperable in August 2012?
DDoS attack
Bitcoins are an example of:
Digital cash
All of the following are examples of an access control?
Digital signatures
Malware that comes with a downloaded file that a user requests is called a:
Drive-by download
Which of the following is not an example of a PUP?
Drive-by download
All of the following are factors in contributing to the increase in cybercrime except:
The Internet's similarity to telephone networks
Which of the following is not a key point of vulnerability when dealing with e-commerce?
The credit card companies
What is the most frequent cause of stolen credit cards and card information today?
The hacking and looting of corporate servers storing credit card information
Which of the most frequent cause of stolen credit cards and card information today?
The hacking and looting of corporate servers storing credit card information