Wednesday, December 8, 2010

Ch 5

1: It's almost anonymous, intercepting e-mail, place fraudulent orders, shut down sites with viruses and swarm attacks.
2: Integrity - unauthorized person intercepts and changes the contents of an online communication
Nonrepudiation - a person can post comments or send a message and perhaps later deny doing so.
Authenticity - Someone can claim to be someone he's not.
Confidentiality - a hacker can into an e-commerce site and gain access to credit card or other information.
Availability - a hacker can disrupt service.
3: Verifiable subscriptions for service.
4: I threatens the integrity of the site, they can redirect customers to steal info.
5: Limit access to important information, spy on your employees.
6: Risk assessment, Security policy, Implementation plan, Security organization, Access controls.
7: A group of hackers that are sometimes used by corporate security departments to test their own security measures.
8: They compete for business with each other and therefore ease of use and speed is improved to make a better choice for customers.

Ch 4

1: Organizational Capabilities, Hardware Architecture, Software, Telecommunications, Site Design, Human Resources.
2: A methodology for understanding the business objectives of any system and designing an appropriate solution. System analysis/planning, Systems design, Building the system, Testing, Implementation.
3: System design specification, Logical design, Physical design.
4: Better speed and ease of use for the customer.
5: Vertical scaling is increasing the processing power of individual components and Horizontal scaling is using multiple computers to share the workload and increase the footprint of the installation.
6: Functionality, Informational, Ease of use, Redundant navigation, Ease of purchase, Multi-browser functionality, Simple graphics, Legible text.
7: Common Gateway Interface, Active Server Pages, Java.
8: Privacy policies and Accessibility rules.