Share
Explore BrainMass

Threats and Vulnerabilities in E-Commerce

1-All e-commerce sites share common security threats and vulnerabilities. Discuss these threats and vulnerabilities and some of the security policies that can be implemented to mitigate them. Do you think that B2C Web sites face different threats and vulnerabilities than B2B sites? Explain.

2-Elaborate on the security design process. What steps are involved? How does each step contribute to effective security?

3-What implications does encryption have for managing e-commerce traffic?

Solution Preview

1. All EC sites share common security threats and vulnerabilities. Discuss these threats and vulnerabilities and some of the security policies that can be implemented to mitigate them. Do you think that B2C Web sites face different threats and vulnerabilities than B2B sites? Explain.

The security threats and vulnerabilities, including potential consequences are worms, viruses, recon attacks, denial of service, privilege escalation, machine compromise, and social engineering. Its potential consequences are disruption of business, loss of productivity, loss of privacy, theft of information, legal liability, and damage to reputation and consumer confidence.

Source:
Network security : Vulnerabilities, Threats, Attacks. Retrieved July 17, 2012 from http://ptgmedia.pearsoncmg.com/images/1587131625/samplechapter/1587131625content.pdf.

These problems can be ...

Solution Summary

The solution discusses security threats and vulnerabilities for e-commerce sites. It also describes the dilemma encountered by B2C and B2B sites.

$2.19