Question

In: Computer Science

List & give an example of ‘real world’ security breaches that actually happened and still happening...

List & give an example of ‘real world’ security breaches that actually happened and still happening as they relate to each of the six dimensions of e-commerce security- (one for each dimension) table 5.3

Integrity

Nonrepudiation

Authenticity

Confidentiality

Privacy

Availability

Solutions

Expert Solution

The most common security breach for the ecommerce website is concerned on six dimensions of e-commerce security


1.Integrity
2.Nonrepudiation
3.Authenticity
4.Confidentiality
5.Privacy
6.Availability


1.Integrity
prevention against unauthorized data modification

Example: The most common threat will be “would any unauthorized person will intercept and redirect payment into a different account” since ecommerce sites prefer online transfer mostly.

2.Nonrepudiation
prevention against any one party from reneging on an agreement after the fact

Example: When a merchant doesn’t have enough proof of customers who have ordered with them during a credit card payment transaction, it will not be processed further to the merchant.

3.Authenticity
authentication of data source.

Example: Some users can use a fake email address to access any of the ecommerce services.

4.Confidentiality
protection against unauthorized data disclosure.

Example: Ecommerce uses a user name and password to login to their account. Let’s consider this case for resetting the password, where an ecommerce site sends a one-time password to their customer in email or phone number if someone else reads it.

5. Privacy
provision of data control and disclosure.

Example: If a hacker breaks into the ecommerce site, they can gain access to the customer credit card details or any other customer information. This also violates information confidentiality and personal privacy.

6.Availability
prevention against data delays or removal.

Example: An ecommerce website can be flooded with useless traffic that causes to shut down your site, making impossible for the user to access the site.


Related Solutions

Define double-entry accounting and give a real world example
Define double-entry accounting and give a real world example
Is there any real world example that Emerging Market without ownership advantages still engage in FDI?
Is there any real world example that Emerging Market without ownership advantages still engage in FDI?
What is Information Technology Standards ? Please give a real world example
What is Information Technology Standards ? Please give a real world example
What is Information Technology Standards? Please give a real world example?
What is Information Technology Standards? Please give a real world example?
Give a real world example (or be creative and make one up) in which a unanimity...
Give a real world example (or be creative and make one up) in which a unanimity rule might be a good option for making a group decision. (Be sure to explain why you think so - this won't rely on economic logic per se, but you should still state your reason). Then, try to think of how your unanimity rule might violate one or more of the six desirable features. (You must explain how it violates at least one of...
1. (a) What are the different types of spreadsheet modeling? Give a real world example for...
1. (a) What are the different types of spreadsheet modeling? Give a real world example for each type where spreadsheet modeling and analysis is useful. (b) What is an infeasible linear optimization problem? How do we find if a given linear optimization problem is infeasible? Give a real world example of an infeasible linear optimization problem. (c) What is a blending problem? Briefly discuss the objective function and constraint requirements in a blending problem. Give a real world example of...
Give an example of a real world issue that can be explained using the prisoner's dilemma...
Give an example of a real world issue that can be explained using the prisoner's dilemma game. Specify the players in the game, the actions available to them and the payoff to the players in the game given outcome. Explain how the incentives for the players are similar to that of the prisoners in the prisoner's dilemma.
Give an example of a real-world monopoly or a firm close to being a monopoly. Discuss...
Give an example of a real-world monopoly or a firm close to being a monopoly. Discuss what you think is the source(s) of its market power. For instance, do you think this is an example of a cost-based monopoly or is there some other explanation, such as advertising or network effects, etc.
(a) What are the different types of spreadsheet modeling? Give a real world example for each...
(a) What are the different types of spreadsheet modeling? Give a real world example for each type where spreadsheet modeling and analysis is useful. (b) What is an infeasible linear optimization problem? How do we find if a given linear optimization problem is infeasible? Give a real world example of an infeasible linear optimization problem.
Please give an example of a "real-world" firm, which is particularly strong (or weak) in that...
Please give an example of a "real-world" firm, which is particularly strong (or weak) in that category Such as human, Innovation and creativity and Reputation Intangible Resources Human • Experience and capabilities of employees. • Trust. • Managerial skills. • Firm-specific practices and procedures. Innovation and creativity • Technical and scientific skills . • Innovation capacities. Reputation • Brand name. • Reputation with customers for quality and reliability. • Reputation with suppliers for fairness, non–zerosum relationships.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT