Lecture E-commerce 2013: Business, technology, society (9/e): Chapter 5 - Kenneth C. Laudon, Carol Guercio Traver

pdf
Số trang Lecture E-commerce 2013: Business, technology, society (9/e): Chapter 5 - Kenneth C. Laudon, Carol Guercio Traver 51 Cỡ tệp Lecture E-commerce 2013: Business, technology, society (9/e): Chapter 5 - Kenneth C. Laudon, Carol Guercio Traver 2 MB Lượt tải Lecture E-commerce 2013: Business, technology, society (9/e): Chapter 5 - Kenneth C. Laudon, Carol Guercio Traver 0 Lượt đọc Lecture E-commerce 2013: Business, technology, society (9/e): Chapter 5 - Kenneth C. Laudon, Carol Guercio Traver 61
Đánh giá Lecture E-commerce 2013: Business, technology, society (9/e): Chapter 5 - Kenneth C. Laudon, Carol Guercio Traver
4.1 ( 14 lượt)
Nhấn vào bên dưới để tải tài liệu
Đang xem trước 10 trên tổng 51 trang, để tải xuống xem đầy đủ hãy nhấn vào bên trên
Chủ đề liên quan

Nội dung

E-commerce 2013 business. technology. society. ninth edition Kenneth C. Laudon Carol Guercio Traver Copyright © 2013 Pearson Education, Inc. Chapter 5 E-commerce Security and Payment Systems Copyright © 2013 Pearson Education, Inc. Class Discussion Cyberwar: MAD 2.0 What is the difference between hacking and cyberwar?  Why has cyberwar become more potentially devastating in the past decade?  Why has Google been the target of so many cyberattacks?  Is it possible to find a political solution to MAD 2.0?  Copyright © 2013 Pearson Education, Inc. Slide 5-3 The E-commerce Security Environment  Overall size and losses of cybercrime unclear  Reporting issues  2011 CSI survey: 46% of respondent firms detected breach in last year  Underground economy marketplace:  Stolen information stored on underground economy servers Copyright © 2013 Pearson Education, Inc. Slide 5-4 What Is Good E-commerce Security?  To achieve highest degree of security  New technologies  Organizational policies and procedures  Industry standards and government laws  Other factors  Time value of money  Cost of security vs. potential loss  Security often breaks at weakest link Copyright © 2013 Pearson Education, Inc. Slide 5-5 The E-commerce Security Environment Figure 5.1, Page 266 Copyright © 2013 Pearson Education, Inc. Slide 5-6 Table 5.3, Page 267 Copyright © 2013 Pearson Education, Inc. Slide 5-7 The Tension Between Security and Other Values  Ease of use  The more security measures added, the more difficult a site is to use, and the slower it becomes  Public safety and criminal uses of the Internet  Use of technology by criminals to plan crimes or threaten nation-state Copyright © 2013 Pearson Education, Inc. Slide 5-8 Security Threats in the E-commerce Environment  Three key points of vulnerability in e-commerce environment: 1. Client 2. Server 3. Communications pipeline (Internet communications channels) Copyright © 2013 Pearson Education, Inc. Slide 5-9 A Typical E-commerce Transaction Figure 5.2, Page 269 Copyright © 2013 Pearson Education, Inc. Slide 5-10
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.