Page 15 - Electronic Commerce
P. 15

Table of Contents

                     Supply Chain Management Software                                     422
      xii
                     Customer Relationship Management Software                            423
                     Cloud Computing                                                      424
                  Summary                                                                 425
                  Key Terms                                                               425
                  Review Questions                                                        426
                  Exercises                                                               427
                  Cases                                                                   428
                  For Further Study and Research                                          431

                Chapter 10   Electronic Commerce Security                                433
                  Online Security Issues Overview                                         435
                     Origins of Security on Interconnected Computer Systems               435
                     Computer Security and Risk Management                                435
                     Elements of Computer Security                                        437
                     Establishing a Security Policy                                       437
                  Security for Client Devices                                             439
                     Cookies and Web Bugs                                                 439
                     Active Content                                                       441
                     Graphics and Plug-Ins                                                442
                     Viruses, Worms, and Antivirus Software                               442
                     Digital Certificates                                                 445
                     Steganography                                                        448
                     Physical Security for Client Devices                                 448
                     Client Security for Mobile Devices                                   448
                  Communication Channel Security                                          449
                     Secrecy Threats                                                      450
                     Integrity Threats                                                    452
                     Necessity Threats                                                    453
                     Threats to the Physical Security of Internet Communications Channels  453
                     Threats to Wireless Networks                                         454
                     Encryption Solutions                                                 454
                     Encryption in Web Browsers                                           458
                     Hash Functions, Message Digests, and Digital Signatures              461
                  Security for Server Computers                                           462
                     Password Attack Threats                                              462
                     Database Threats                                                     464
                     Other Software-Based Threats                                         464
                     Threats to the Physical Security of Web Servers                      465
                     Access Control and Authentication                                    465
                     Firewalls                                                            466
                  Organizations that Promote Computer Security                            468
                     CERT                                                                 468
                     Other Organizations                                                  469
                     Computer Forensics and Ethical Hacking                               469
                  Summary                                                                 471
                  Key Terms                                                               471



         Copyright 2015 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
       Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
   10   11   12   13   14   15   16   17   18   19   20