Wednesday, December 8, 2010

Ch 5

1: It's almost anonymous, intercepting e-mail, place fraudulent orders, shut down sites with viruses and swarm attacks.
2: Integrity - unauthorized person intercepts and changes the contents of an online communication
Nonrepudiation - a person can post comments or send a message and perhaps later deny doing so.
Authenticity - Someone can claim to be someone he's not.
Confidentiality - a hacker can into an e-commerce site and gain access to credit card or other information.
Availability - a hacker can disrupt service.
3: Verifiable subscriptions for service.
4: I threatens the integrity of the site, they can redirect customers to steal info.
5: Limit access to important information, spy on your employees.
6: Risk assessment, Security policy, Implementation plan, Security organization, Access controls.
7: A group of hackers that are sometimes used by corporate security departments to test their own security measures.
8: They compete for business with each other and therefore ease of use and speed is improved to make a better choice for customers.

No comments:

Post a Comment