Tuesday, September 18, 2007

Internet Commerce - Week 6 Tutorial Questions

Tutorial Questions: Chapter 5

End-of-Chapter Questions (Page 301)

1. Why are some online merchants hesitant to ship to international addresses? What are some of the risks of doing so? (Question 1)

2. What are some of the steps a company can take to curtail cybercriminal activity from within a business?(Question 11)

3. Compare and contrast firewalls and proxy servers and their security functions? (Question 14)

Firewalls : software applications that act as filters between a company’s private network and the internet itself, denying unauthorized remote client computers from attaching to your internal network.

Proxies : software servers that act primarily to limit access of internal clients to external internet servers and are frequently referred to as the gateway.

4. Identify and discuss the five steps in developing an e-commerce security plan. (Question 16)

  1. perform a risk assessment - an assessment of the risks and points of vulnerability

  1. develop a security policy - a set of statements prioritizing the information risks, identifying acceptable risk targets, and identifying the mechanisms for achieving these targets.

  1. develop an implementation plan - the action steps you will take to achieve the security plan

  2. create a security organization - educates and trains users, keep management aware of security threats and breakdowns, and maintains the tools chosen to implement security

  1. perform a security audit - involves the routine review of access logs

Project (Page 302)

1. Given the shift toward m-commerce, identify and discuss the new security threats to this type of technology. Prepare a presentation outlining your vision of the new opportunities for cybercrime.

No comments: