E-commerce credentials system banes Two main types of nemesiss Threat from an assailant Exploits personalized info Malicious autograph affright proficient threat Anything related to Internet technology Transmission threat E-commerce security department Threats Malicious code threats Virus Attaches itself to executable code and is punish when the software program begins to run or an tainted is undefended Worm Replicates itself through the Internet , and can infect millions of computers in just a matter of hours trojan clam A piece of programming code that is layered stooge another(prenominal) program , and can perform covert , malicious functions reasonable system Bomb A version of a Trojan Horse , but it is event or time ad hoc Threat to customer Phishing The act of sending an e-mail to a exploiter falsely claimin g to be an established legitimate try in an attempt to scam the user into surrendering private information that allow be used for identity theft (source : hypertext enchant protocol / entanglement .webopedia .com /TERM /p /phishing .
html E-commerce Security Threats Transmission threats Denial of serving Attack a abundant amount of invalid entropy is sent to the server strike hard of Death Massive information piece of grounds , transmittable through TCP /IP , friction the server SYN swamp Phony messages sent to the server , causing it to crash data Packet Sniffing A sniffer intercepts data packet menstru ate IP Spoofing Changes the source address o! f a data packet in to appear as if it originated from another computer expression scan Listening to the network ports of a server Trapdoors /Backdoors Provides prompt admission charge to code during site development References Das , Ravi . Threats to E-Commerce Servers - mapping I . Retrieved March 4 , 2008 from the Technology Executives Club Website : http /www .technologyexecutivesclub .c om /Articles /security /artThreatstoEcom merceServers .php Digital Dots...If you want to get a full essay, ready it on our website: OrderCustomPaper.com
If you want to get a full essay, visit our page: write my paper
No comments:
Post a Comment