Blake Janowicz

ITS 380

Shin-Ping Tucker

26 February 2015

CH5 E-commerce Security and Payment Systems

            Imagine you are the owner of an e-commerce Web site. What are some of the signs that your site has been hacked? Discuss the major types of attacks you could expect to experience and the resulting damage to your site. Prepare a brief summary presentation.

            Receiving concern from customers through email or other means of communication informing you of unusual site activity, such as warnings when trying to view the site; from this may branch a drop in site visitation from customers. Something an owner may notice themselves is that the sight runs awfully slow; or given certain circumstances you may be notified of a breach, if you have this sort of detection in place. Damage can range from simple dis-functionality of the site to complete access to confidential and crucial information.

            Given the shift toward mobile commerce, do a search on “mobile commerce crime”. Identify and discuss the security threats this type of technology creates. Prepare a presentation outlining your vision of the new opportunities for cybercrime that mobile commerce may provide.

            After performing a search online, there are many types of mobile commerce crime, including, but not limited to, rootkit installation (software that may be undetectable by the given device), social engineering (which are usually scammers acting as a known entity to you and asking for personal information), unsecured Wi-Fi (which allows criminals many vantage points to access information over the connection), viruses and malware, and encryption hacking (where criminals decipher the encrypted data). There are even more opportunities emerging today as there were before, the one that comes to mind is mobile payment, where customers use their phone and Near Field Communication (NFC) to tap a payment pad in store to purchase items; I can only imagine the kind of fraud this will bring up in the near future.