E-business Management- Ch.5 E-commerce Security and Payment Systems

Ace your homework & exams now with Quizwiz!

What refers to the ability to ensure that an e-commerce site continues to function as intended?

Availability

The [....]? Standard uses a 56-bit key.

Data Encryption

[...]? typically attack governments, organizations, and sometimes individuals for political purposes.

Hacktivists

What is an example of online stored value payment system?

PayPal

What is the current standard used to protect Wi-Fi networks?

WPA2

A fingerprint scan is an example of [...]?

biometrics

Bitcoins are an example of [....]?

digital cash

Linden Dollars, created for use in Second Life, are an example of [....]?

virtual currency

What refers to the ability to identify the person or entity with whom you are dealing on the Internet?

Authenticity

What is sometimes confused with privacy? AND What refers to the ability to ensure that messages and data are only available to those authorized to view them?

Confidentiality

To allow lower-level employees access to the corporate network while preventing them from accessing private human resources documents, you would use an [....]? system.

authorization management

A [...]? contains all of the following the: subject's public key, digital signature of the digital certificate serial number, and certification authority.

certificate

Accessing data without authorization on Dropbox is an example of a [.....]?

cloud security issue

The overall rate of online [.....]? is less than 1% of all online card transactions.

credit card fraud

Hackers are the leading cause of [....]?

data breaches

Malware that comes with a downloaded file requested by a user is called a [...]? download.

drive-by

Proxy servers are also known as [....]? systems.

dual home

A [...]? is a hardware or software component that acts as a filter to prevent unwanted packets from entering a network.

firewall

CVS, Walgreens, and Experian all experienced [....]? breaches in 2015.

high-profile data

[....]? firewalls provide all of the following: an application-centric approach to firewall control, the ability to identify applications regardless of the port, protocol, or security evasion tools used, the ability to identify users regardless of the device or IP address.

next generation

Automatically redirecting a web link to a different address is an example of [...]?

pharming

Your online purchasing history being sold to other merchants without your consent is an example of an online [....]?

privacy violation

Symmetric key cryptography is also known as [...]? key cryptography.

secret

Venmo Square, Cash.All, and Google Wallet are examples of [....]? peer-to-peer payment systems

social/mobile

Software that is used to obtain private user information such as a user's keystrokes or copies of e-mail is referred to as [...]?

spyware


Related study sets

Clinical Chapter 23: Oxygen Therapy

View Set

Week 03 - C++ Operators: Relational, Logical, and Ternary

View Set

AP English Language + Composition - MCQ

View Set

Chapter 21: Carbohydrate Metabolism Quiz

View Set