Across
- 3. The process of maintaining or revisiting the sequence of events during the transaction, when and by whom.
- 5. People who commit crime on the Internet.
- 10. Process of using a device or software program that tracks and records the activity of a user in real time (without the user’s knowledge or consent) by the keyboard keys they press.
- 13. One of the e-commerce security requirements that verifies the real identity of an e-commerce entity e.g. customer.
- 14. Able to replicate itself and spread faster than viruses.
- 15. _____ of attacks means the attackers are also improving themselves with new technologies over time.
- 17. _____-of-service attempts to make a server or network resource unavailable to users.
- 22. The e-commerce security battleground involves the attacks, target, and _____.
- 23. The target of attacks is always the _____ of a system as it creates opportunity of damage to the system.
- 25. The probability that a threat will impact an information system.
- 26. ______ measures help find security breaches in a system.
Down
- 1. One of the social engineering technique. A fraudulent process of acquiring confidential information, such as credit card or banking details, from unsuspecting computer users.
- 2. _____ method is a countermeasure where it makes criminals abandon their idea of attacking a specific system.
- 4. _____ horse is a program that seems to be harmless or even looks useful but actually contains a hidden malicious code.
- 6. Criminals encrypt and lock digital files by using malware and demand a payment to unlock the system.
- 7. The barrier between an internal trusted network (or a PC) and the untrustworthy Internet.
- 8. _____ threat in e-commerce security includes human error and environmental hazards.
- 9. _____ detection system monitors the activities of computer networks and computer systems in order to detect and define unauthorized and malicious attempts to access.
- 11. The assurance that online customers or trading partners will not be able to falsely deny their purchase, transaction, sale, or other obligation.
- 12. Information _____ refers to activities and that protect an information systems.
- 16. _____ authentication is a technology that measures and analyses the identity of people based on measurable biological or behavioural characteristics or physiological signals.
- 18. Information _____ is a measure taken to protect customer information online.
- 19. _____ communication is one of the technical nature that contributes to the weakness of a system.
- 20. _____ nature of e-commerce is one of the causes of security issues.
- 21. A tracking software that is installed by criminals, without the user’s consent, in order to gather information about the user and direct it to advertisers or other third parties.
- 24. Action by a nation, state, or international organization to penetrate another nation’s computer networks for the purpose of causing damage or disruption.
