Saturday, May 16, 2020

E-Commerce and Cybercrime - 1515 Words

Chapter 11 ANSWERS TO DISCUSSION QUESTIONS 1. What can be done to improve e-commerce security on the Internet? Give several examples of security measures, and technologies you would use. Students’ answers will vary. However, some issues can be more policing, standard protocols, encryption, scrambling data, public and private key encryption methods, fire walls, secure network access, security monitors, virus defenses, security codes, backup files, biometrics controls, computer failure controls, fault tolerant systems, and disaster recovery planning. 2. What potential security problems do you see in the increasing use of intranets and extranets in business? What might be done to solve such problems? Give several examples.†¦show more content†¦6. Refer to the Real World Case on Exodus Communications in the chapter. How vulnerable to cybercrime by hackers, criminals or terrorists are the networked computer systems at your home, school, and place of business? Discuss the reasons for your conclusions. No network computer system anywhere is truly safe from the activities of this group of people. It is not safe to make any type of assumptions that your systems are safe from the efforts of those who want to create havoc in cyberspace. No matter how carefully planned a system is, the temptation exists for others to attempt an attack. Even the most secure networks in the world have been attacked in one form or another. Companies must keep on their toes to ensure that do not leave their systems unprotected. Holes in your programs can lead to backdoors that cyber criminals can come through. Cybercrime weapons are becoming increasingly more complex, have greater potential for harm, and are easier for even most inexperienced hackers to use. 7. Is there an ethical crisis in e-business today? What role does information technology play in unethical business practices? Information technology has made it easier to communicate, work cooperatively, share resources, and make decisions, all electronically. However, IT has also made it possible to engage in ethical as well asShow MoreRelatedCyber Law1506 Words   |  7 Pages2000. The act was amended in 2008.The act which is there to oste... (More) India cyber (internet) laws is largely governed by the Information Technology Act 2000. The act was amended in 2008.The act which is there to ostensibly promote electronic commerce also provides for penalties and criminal offenses. Get more information on cyber laws in India criminal offenses. Get more information on cyber laws in India. ROLE OF CYBER LAW IN DIFFERENT COUNTRIES: Cyber law is a generic term, which denotesRead MorePorters Five Forces:. Threat Of New Entrantspower Of Supplierspower1261 Words   |  6 Pagesexample, in 2015 there was news of a new eReader named Kobo Glo HD. It was stated that â€Å"a display every bit as pixel-packed as Amazon’s stunning Kindle Voyage—at a $70 discount† (Barrett, 2015) Power of Suppliers: This is Medium. Even though Amazon sells e-books for different operating systems, the Kindle products that will only access content inside Amazons content. This is the same for other suppliers such as Apple. Apple announced in July 2011, that it was removing all non-Apple platform apps from theirRead MoreDigital Evidence And Law Enforcement Essay1137 Words   |  5 Pagesmobile phones, among others, and are often referred to as e-crimes. However, to fight e-crime, law enforcement must collect relevant digital evidence for such crimes, law enforcement agencies are incorporating the collection and analysis of digital evidence, also referred to as computer forensics, into many of their infrastructures. Law enforcement agencies, such as the Federal Bureau of Investigation (FBI) place a high priority in cybercrime, and work diligently with Subcommittee’s and Congress toRead MoreCyber Predators And Its Effects On Children1593 Words   |  7 Pagesmost online predators are not pedophiles. Pedophiles target pre-pubescent children, while online predators typically target adolescents who engage in risky online behavior. (Wolak J, Finkelhor D, Mitchell K, Ybarra M. 2008). †¢ Describe the type of cybercrime you selected. Predators take advantage of children’s natural vulnerabilities, such as their desire to appear adult or their need for attention. â€Å"Grooming† is the process through which predators play on these vulnerabilities by offering childrenRead MoreDigital Evidence And Law Enforcement Essay1125 Words   |  5 Pagesmobile phones, among others, and are often referred to as e-crimes. However, to fight e-crime, law enforcement must collect relevant digital evidence for such crimes, law enforcement agencies are incorporating the collection and analysis of digital evidence, also referred to as computer forensics, into many of their infrastructures. Law enforcement agencies, such as the Federal Bureau of Investigation (FBI) place a high priority in cybercrime, and work diligently with Subcommittee’s and Congress toRead MoreE-Business: SWOT Analysis1271 Words   |  5 Pagescompany does not currently exist. This means that there are no systems in place to take or process orders; the website has no traffic; the brand is not strong outside of the immediate vicinity of the physical store and the company has no experience in e-business. Moving into the online sphere carries with it tremendous opportunity. Online retail is expected to be worth $279 billion in the US alone by 2015 (Wauters, 2011). Thus, a new entrant does not need to establish much market share in order toRead MoreEssay on LOVE BUG1356 Words   |  6 Pagescertain case there are several categories of Cybercrime that this type of crime represents. As written by Casey, the first one being that the computer was a target. This virus was supposed to gather information once it was opened and send back information to its owner. This included searching for login names and passwords. This would enable the owner to use any of the victim’s Internet accounts to surf the net for free. (Ruppe May5, 2000). The second cybercrime category is the computer as the instrumentalityRead MorePreventing Identity Theft Essays1198 Words   |  5 Pages In today’s world, we are all in some way connected to or involved with the internet. We all use different serv ices that we feel either enrich our lives or make them more enjoyable every day, from email to FaceBook, MySpace, and e-commerce. We all take a sort of false comfort in the basic anonymity of the internet; however, when we think about it, that could end up being the single biggest risk to our own safety today. When we typically think of crimes committed against us, we could probably nameRead MoreDescriptions and Definitions of the Internet and E-Commerce1117 Words   |  5 PagesIbikunle Grillo) Alao, Benjamin (2012). DQ1: Technology Update. The article is very thorough in its descriptions and definitions of the web, the internet and e-commerce.I fully support the stance the author takes on thesedefinitions and capabilities of the internet and e-commerce. As noted in the paper,In order to understand the concept of e-commerce, it is important to have a true understanding of the concept of internet. Internet is defined by Rayport and Jaworski (2002,p.40) as a collection of wiresRead MoreCyber Secuirty and Cyber Crime1643 Words   |  7 PagesCyber Crime and Security Cybercrime or electronic crime generally refers to criminal activity where a computer or network is the source, tool, target, or place of a crime. These categories are not exclusive and many activities can be characterized as falling in one or more category. Additionally, although the terms computer crime and cybercrime are more properly restricted to describing criminal activity in which the computer or network is a necessary part of the crime, these terms are also sometimes

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.