Page 340 - Introduction to Electronic Commerce and Social Commerce
P. 340
Team Assignments and Projects 327
3. How are botnets, identity theft, DoS attacks, and website 10. Discuss the recent security trends pointed out by Lemos
hijackings perpetrated? Why are they so dangerous to (2016).
e-commerce? 11. Examine the identity theft and identity crime topics
4. Discuss some of the difficulties of eliminating online from the FBI site fbi.gov/about-us/investigate/cyber/
financial fraud. identity_theft. Report the highlights.
5. Enter zvetcobiometrics.com. Discuss the benefits of
these products over other biometrics.
6. Find information about the Zeus Trojan virus. Discuss INTERNET EXERCISES
why it is so effective at stealing financial data. Why is it
so difficult to protect against this Trojan?
1. Your B2C site has been hacked with a new, innovative
7. Visit the National Vulnerability Database (nvd.nist.gov) method. List two organizations where you would report
and review 5 recent CVE vulnerabilities. For each vul-
this incident so that they can alert other sites. How do
nerability list its published date, CVSS severity, impact you do this and what type of information do you have to
type, and the operating system or software with the
provide?
vulnerability.
8. Report on the status of using biometrics in mobile com- 2. Determine the IP address of your computer by visiting at
least two websites that provide that feature. You can use
merce. (Start nxt-id.com.)
9. Find several definitions of “information warfare” and a search engine to locate websites or visit ip-adress.com
or whatismyipaddress.com. What other information
discuss the major attributes of the definitions.
10. What contribution does TRUSTe make to e-commerce? does the search reveal about your connections? Based on
this finding, how could a hacker use that information?
3. Conduct a Google search for “Institutional Identity
Theft.” Compare institutional identity theft with per-
TOPICS FOR CLASS DISCUSSION
AND DEBATES sonal identity theft. How can a company protect itself
against identity theft? Write a report.
4. The Symantec Annual Internet Security Threat Report
1. A business wants to share its customer data with a trad-
provides details about the trends in attacks and vulnera-
ing partner and provide its business customers with bilities in Internet security. Obtain a copy of the latest
access to marketing data. What types of security compo-
report and summarize the major findings of the report
nents (e.g., firewalls, VPNs) could be used to ensure that for both attacks and vulnerabilities.
the partners and customers have access to the account
5. Conduct a Google search for examples of underground
information while those who are unauthorized do not? Internet activities in 5 different countries. Prepare a
What types of network administrative procedures will
summary.
provide the appropriate security? 6. Enter verisign.com (a Symantec company) and find
2. Why is it so difficult to fight computer criminals? What
information about PKI and encryption. Write a report.
strategies can be implemented by financial institutions, 7. Enter hijackthis.com. What is offered in the site? Write
airlines, and other heavy users of EC?
a report.
3. All EC sites share common security threats and vulner- 8. Enter blackhat.com. Find out what the site is about.
abilities. Do you think that B2C websites face different
Describe some of the site’s activities.
threats and vulnerabilities than do B2B sites? Explain. 9. Enter ftc.gov and identify some of the typical types of
4. Why is phishing so difficult to control? What can be
fraud and scams on the Internet. List 10 of them.
done? Discuss. 10. Enter scambusters.org and identify and list its anti-
5. Debate this statement: “The best strategy is to invest very
fraud and anti-scam activities.
little and only in proven technologies such as encryption
and firewalls.”
6. Debate: Can the underground Internet marketplace be
controlled? Why or why not? TEAM ASSIGNMENTS AND PROJECTS
7. Debate: Is taking your fingerprints or other biometrics to
assure EC security a violation of your privacy? 1. Assignment for the Opening Case
8. Body scans at airports have created controversy. Debate Read the opening case and answer the following ques-
both points of this issue and relate it to EC security. tions:
9. Discuss the issue of providing credit card details on (a) Why did the college have security problems? What
Facebook. Would you do it? types of problems?