E-business Management- Ch.5 E-commerce Security and Payment Systems
What refers to the ability to ensure that an e-commerce site continues to function as intended?
Availability
The [....]? Standard uses a 56-bit key.
Data Encryption
[...]? typically attack governments, organizations, and sometimes individuals for political purposes.
Hacktivists
What is an example of online stored value payment system?
PayPal
What is the current standard used to protect Wi-Fi networks?
WPA2
A fingerprint scan is an example of [...]?
biometrics
Bitcoins are an example of [....]?
digital cash
Linden Dollars, created for use in Second Life, are an example of [....]?
virtual currency
What refers to the ability to identify the person or entity with whom you are dealing on the Internet?
Authenticity
What is sometimes confused with privacy? AND What refers to the ability to ensure that messages and data are only available to those authorized to view them?
Confidentiality
To allow lower-level employees access to the corporate network while preventing them from accessing private human resources documents, you would use an [....]? system.
authorization management
A [...]? contains all of the following the: subject's public key, digital signature of the digital certificate serial number, and certification authority.
certificate
Accessing data without authorization on Dropbox is an example of a [.....]?
cloud security issue
The overall rate of online [.....]? is less than 1% of all online card transactions.
credit card fraud
Hackers are the leading cause of [....]?
data breaches
Malware that comes with a downloaded file requested by a user is called a [...]? download.
drive-by
Proxy servers are also known as [....]? systems.
dual home
A [...]? is a hardware or software component that acts as a filter to prevent unwanted packets from entering a network.
firewall
CVS, Walgreens, and Experian all experienced [....]? breaches in 2015.
high-profile data
[....]? firewalls provide all of the following: an application-centric approach to firewall control, the ability to identify applications regardless of the port, protocol, or security evasion tools used, the ability to identify users regardless of the device or IP address.
next generation
Automatically redirecting a web link to a different address is an example of [...]?
pharming
Your online purchasing history being sold to other merchants without your consent is an example of an online [....]?
privacy violation
Symmetric key cryptography is also known as [...]? key cryptography.
secret
Venmo Square, Cash.All, and Google Wallet are examples of [....]? peer-to-peer payment systems
social/mobile
Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as [...]?
spyware