Premium Essay

Is3445 Project Part 4

In: Computers and Technology

Submitted By lnh1015
Words 499
Pages 2
UNFO, a brick-and-mortar retailer now has move into the e-commerce, e-business model has developed new risk that will affect the business. As UNFO information security analyst it is my job to prepare an executive summary report designed to assist the team in understanding IT security risks associated with e-commerce and e-business models.
Malicious program known as sniffer programs often disrupt the privacy transactions especially when one uses unauthorized networks. They are found at network connection end points. When transactions are carried out, confidentiality is necessary thus it requires removing of any data showing transaction paths. This has become a common problem in the e-commerce sites. Another particularly common problem facing e-commerce and social network applications is the Trojan horse. Back Orifice, Netbus and BO2K are the most common types. They are hacker tools that enable a remote hacker to control, examine and monitor the user’s information. These Trojans are dangerous since they can provide the hacker a platform for sending information and make it appear as if the real owner of the computer has done so.
The payoff of a successful attack is one of the motivations for hackers. If you were to take a penny from every account at any one of the major banks, it easily amounts to several million dollars. The local bank robber optimistically expects a windfall in the tens of thousands of dollars. Bank branches do not keep a lot of cash on hand. The majority is represented in bits and bytes sitting on a hard disk or zipping through a network.
Personnel Roles
System Administrator: Install patches, review system logs, report malicious or suspicious activity on systems to ISO immediately, report sensitive information stored on systems to ISO, maintain user access administration, disaster recovery planning, physical security, disable unnecessary

Similar Documents

Free Essay

Is3445-Project Part 4

...Project part 4 IS3445 Common weaknesses and attacks associated with e-commerce and social networking applications Security of transactions is critical in building the confidence of customers in a specified e-commerce site. This security depends heavily on an organization's ability to ensure authenticity, availability, privacy, integrity and disruption of unwanted intrusions. Malicious program known as sniffer programs often disrupt the privacy transactions especially when one uses unauthorized networks. They are found at network connection end points. When transactions are carried out, confidentiality is necessary thus it requires removing of any data showing transaction paths. This has become a common problem in the e-commerce sites. Another common problem for e-commerce site is a Trojan horse. A Trojan horse, or Trojan, in computing is a generally non-self-replicating type of malware program containing malicious code that, when executed, carries out actions determined by the nature of the Trojan, typically causing loss or theft of data, and possible system harm. Hackers and cyber-criminals are motivated by financial gain, notoriety, or simply by the thrill of the challenge. Cyber-crime can be extremely lucrative. The sale of cyber-resources including credit card information, stolen intellectual property, or networks of compromised, Internet-connected servers has created a burgeoning black market economy. The tools created for these purposes are openly shared on the Internet...

Words: 367 - Pages: 2