security

515 Words2 Pages

Security threats
Security threats defined by acts or objects that pose a danger to a system’s security
Security threats divided into 2 types Technical Attacks and Non-technical attacks
Technical Attacks
Technical Attacks considered one of the most challenging problems that E-commerce should face. The responsible for these attacks typically target sites such as banks, credit card payment gateway. (McDowell, 2009)
Denial of service attack DoS
Denial of Service attack occurs when a malicious user attempts to flood a networked computer or device with traffic in order to make the computer or device unavailable, the attack gets its name from its purpose it’s intended to deny the ability of an institution or company to provide service to its users or customers. (University, 2013)
According to the US Computer Emergency Readiness Team the symptoms of DoS are: (McDowell, 2009)
Slow network performance
Unavailability of a particular website
Inability to access any website
Distributed denied of service attack
DDoS attack is when the attacker gets access to as many computers as possible and uses these computers to send a flood of data packets to the target computer (Efraim Turban, 2006)

An Example of DDoS
DDoS considered the greatest security fear for IT professionals, the most famous DDoS attacks happened in February 2000 where websites including Yahoo, Buy.com, E-bay, Amazon and CNN were attacked and left inaccessible for several hours (O’Raghallaigh, 2010 )

Malwares
Techterms website define malwares as software programs designed to damage or do other unwanted actions on a computer system (Anon., s.d.)
There are many types of malware including:
Viruses: A piece of software code that insert itself into the target in order to propagate ...

... middle of paper ...

...
Available at: http://www.techterms.com/definition/malware
Anon., n.d. Trojan Horse. [Online]
Available at: http://www.techterms.com/definition/trojanhorse
Bill Wyman, W. S. H. L. S., 2013. Email Phishing Attacks, s.l.: The SANS Securing The Human program.
Efraim Turban, D. K. ,. J. K. L. ,. D. V., 2006. Electronic Commerce: A Managerial Perspective. Prentice Hall ed. s.l.:s.n.
Engineering, M. R. t. S., 2005. Measuring Resistance to Social Engineering.
McDowell, M., 2009. Understanding Denial-of-Service Attacks. [Online]
Available at: http://www.us-cert.gov/ncas/tips/ST04-015
[Accessed December 2013].
O’Raghallaigh, E., 2010 . Major Security Issues in E‐Commerce, s.l.: WebScience.
University, H., 2013. What is a Denial of Service (DoS) attack?. [Online]
Available at: http://huit.harvard.edu/faqs/what-denial-service-dos-attack
[Accessed December 2013].

More about security

Open Document