Chapter 8 E-Commerce Security

1234567891011121314151617181920212223242526
Across
  1. 3. The process of maintaining or revisiting the sequence of events during the transaction, when and by whom.
  2. 5. People who commit crime on the Internet.
  3. 10. Process of using a device or software program that tracks and records the activity of a user in real time (without the user’s knowledge or consent) by the keyboard keys they press.
  4. 13. One of the e-commerce security requirements that verifies the real identity of an e-commerce entity e.g. customer.
  5. 14. Able to replicate itself and spread faster than viruses.
  6. 15. _____ of attacks means the attackers are also improving themselves with new technologies over time.
  7. 17. _____-of-service attempts to make a server or network resource unavailable to users.
  8. 22. The e-commerce security battleground involves the attacks, target, and _____.
  9. 23. The target of attacks is always the _____ of a system as it creates opportunity of damage to the system.
  10. 25. The probability that a threat will impact an information system.
  11. 26. ______ measures help find security breaches in a system.
Down
  1. 1. One of the social engineering technique. A fraudulent process of acquiring confidential information, such as credit card or banking details, from unsuspecting computer users.
  2. 2. _____ method is a countermeasure where it makes criminals abandon their idea of attacking a specific system.
  3. 4. _____ horse is a program that seems to be harmless or even looks useful but actually contains a hidden malicious code.
  4. 6. Criminals encrypt and lock digital files by using malware and demand a payment to unlock the system.
  5. 7. The barrier between an internal trusted network (or a PC) and the untrustworthy Internet.
  6. 8. _____ threat in e-commerce security includes human error and environmental hazards.
  7. 9. _____ detection system monitors the activities of computer networks and computer systems in order to detect and define unauthorized and malicious attempts to access.
  8. 11. The assurance that online customers or trading partners will not be able to falsely deny their purchase, transaction, sale, or other obligation.
  9. 12. Information _____ refers to activities and that protect an information systems.
  10. 16. _____ authentication is a technology that measures and analyses the identity of people based on measurable biological or behavioural characteristics or physiological signals.
  11. 18. Information _____ is a measure taken to protect customer information online.
  12. 19. _____ communication is one of the technical nature that contributes to the weakness of a system.
  13. 20. _____ nature of e-commerce is one of the causes of security issues.
  14. 21. A tracking software that is installed by criminals, without the user’s consent, in order to gather information about the user and direct it to advertisers or other third parties.
  15. 24. Action by a nation, state, or international organization to penetrate another nation’s computer networks for the purpose of causing damage or disruption.