Page 15 - Electronic Commerce
P. 15
Table of Contents
Supply Chain Management Software 422
xii
Customer Relationship Management Software 423
Cloud Computing 424
Summary 425
Key Terms 425
Review Questions 426
Exercises 427
Cases 428
For Further Study and Research 431
Chapter 10 Electronic Commerce Security 433
Online Security Issues Overview 435
Origins of Security on Interconnected Computer Systems 435
Computer Security and Risk Management 435
Elements of Computer Security 437
Establishing a Security Policy 437
Security for Client Devices 439
Cookies and Web Bugs 439
Active Content 441
Graphics and Plug-Ins 442
Viruses, Worms, and Antivirus Software 442
Digital Certificates 445
Steganography 448
Physical Security for Client Devices 448
Client Security for Mobile Devices 448
Communication Channel Security 449
Secrecy Threats 450
Integrity Threats 452
Necessity Threats 453
Threats to the Physical Security of Internet Communications Channels 453
Threats to Wireless Networks 454
Encryption Solutions 454
Encryption in Web Browsers 458
Hash Functions, Message Digests, and Digital Signatures 461
Security for Server Computers 462
Password Attack Threats 462
Database Threats 464
Other Software-Based Threats 464
Threats to the Physical Security of Web Servers 465
Access Control and Authentication 465
Firewalls 466
Organizations that Promote Computer Security 468
CERT 468
Other Organizations 469
Computer Forensics and Ethical Hacking 469
Summary 471
Key Terms 471
Copyright 2015 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.