Free Essay

Is3445-Project Part 4

In:

Submitted By cheezer28
Words 367
Pages 2
Project part 4
IS3445
Common weaknesses and attacks associated with e-commerce and social networking applications Security of transactions is critical in building the confidence of customers in a specified e-commerce site. This security depends heavily on an organization's ability to ensure authenticity, availability, privacy, integrity and disruption of unwanted intrusions. Malicious program known as sniffer programs often disrupt the privacy transactions especially when one uses unauthorized networks. They are found at network connection end points. When transactions are carried out, confidentiality is necessary thus it requires removing of any data showing transaction paths. This has become a common problem in the e-commerce sites. Another common problem for e-commerce site is a Trojan horse. A Trojan horse, or Trojan, in computing is a generally non-self-replicating type of malware program containing malicious code that, when executed, carries out actions determined by the nature of the Trojan, typically causing loss or theft of data, and possible system harm.
Hackers and cyber-criminals are motivated by financial gain, notoriety, or simply by the thrill of the challenge. Cyber-crime can be extremely lucrative. The sale of cyber-resources including credit card information, stolen intellectual property, or networks of compromised, Internet-connected servers has created a burgeoning black market economy. The tools created for these purposes are openly shared on the Internet, creating a large population of professional and “recreational” hackers.
A system administrator, or sysadmin, is a person who is responsible for the upkeep, configuration, and reliable operation of computer systems; especially multi-user computers, such as servers. The system administrator seeks to ensure that the uptime, performance, resources, and security of the computers he or she manages meet the needs of the users, without exceeding the budget. To meet these needs, a system administrator may acquire, install, or upgrade computer components and software; provide routine automation; maintain security policies; troubleshoot; train and/or supervise staff; or technical support projects. The primary role of the Network Security Engineer is to plan, design, implement, audit, optimize and troubleshoot network security solutions and products for our rapidly-growing customer base. This includes providing subject matter expertise, consulting and knowledge transfer around specific technologies, solutions and products.

Similar Documents

Premium Essay

Is3445 Project Part 4

...UNFO, a brick-and-mortar retailer now has move into the e-commerce, e-business model has developed new risk that will affect the business. As UNFO information security analyst it is my job to prepare an executive summary report designed to assist the team in understanding IT security risks associated with e-commerce and e-business models. Malicious program known as sniffer programs often disrupt the privacy transactions especially when one uses unauthorized networks. They are found at network connection end points. When transactions are carried out, confidentiality is necessary thus it requires removing of any data showing transaction paths. This has become a common problem in the e-commerce sites. Another particularly common problem facing e-commerce and social network applications is the Trojan horse. Back Orifice, Netbus and BO2K are the most common types. They are hacker tools that enable a remote hacker to control, examine and monitor the user’s information. These Trojans are dangerous since they can provide the hacker a platform for sending information and make it appear as if the real owner of the computer has done so. The payoff of a successful attack is one of the motivations for hackers. If you were to take a penny from every account at any one of the major banks, it easily amounts to several million dollars. The local bank robber optimistically expects a windfall in the tens of thousands of dollars. Bank branches do not keep a lot of cash on hand. The majority is...

Words: 499 - Pages: 2