Page 340 - Introduction to Electronic Commerce and Social Commerce
P. 340

Team Assignments and Projects                                                                   327

             3.  How are botnets, identity theft, DoS attacks, and website   10.  Discuss the recent security trends pointed out by Lemos
               hijackings perpetrated? Why are they so dangerous to   (2016).
               e-commerce?                                      11.  Examine the identity theft and identity crime topics
             4.  Discuss some of the difficulties of eliminating online   from the FBI site  fbi.gov/about-us/investigate/cyber/
               financial fraud.                                  identity_theft. Report the highlights.
             5.  Enter  zvetcobiometrics.com. Discuss the benefits of
               these products over other biometrics.
             6.  Find information about the Zeus Trojan virus. Discuss     INTERNET EXERCISES
               why it is so effective at stealing financial data. Why is it
               so difficult to protect against this Trojan?
                                                                1.  Your B2C site has been hacked with a new, innovative
             7.  Visit the National Vulnerability Database (nvd.nist.gov)   method. List two organizations where you would report
               and review 5 recent CVE vulnerabilities. For each vul-
                                                                 this incident so that they can alert other sites. How do
               nerability list its published date, CVSS severity, impact   you do this and what type of information do you have to
               type, and the operating system or software with the
                                                                 provide?
               vulnerability.
             8.  Report on the status of using biometrics in mobile com-    2.  Determine the IP address of your computer by visiting at
                                                                 least two websites that provide that feature. You can use
               merce. (Start nxt-id.com.)
             9.  Find several definitions of “information warfare” and   a search engine to locate websites or visit ip-adress.com
                                                                 or  whatismyipaddress.com.  What other information
               discuss the major attributes of the definitions.
             10.  What contribution does TRUSTe make to e-commerce?  does the search reveal about your connections? Based on
                                                                 this finding, how could a hacker use that information?
                                                                3.  Conduct a Google search for “Institutional Identity
                                                                 Theft.”  Compare  institutional  identity  theft  with  per-
             TOPICS FOR CLASS DISCUSSION
           AND DEBATES                                           sonal identity theft. How can a company protect itself
                                                                 against identity theft? Write a report.
                                                                4.  The Symantec Annual Internet Security Threat Report
             1.  A business wants to share its customer data with a trad-
                                                                 provides details about the trends in attacks and vulnera-
               ing partner and provide its business customers with   bilities in Internet security. Obtain a copy of the latest
               access to marketing data. What types of security compo-
                                                                 report and summarize the major findings of the report
               nents (e.g., firewalls, VPNs) could be used to ensure that   for both attacks and vulnerabilities.
               the partners and customers have access to the account
                                                                5.  Conduct a Google search for examples of underground
               information while those who are unauthorized do not?   Internet activities in 5 different countries. Prepare a
               What types of network administrative procedures will
                                                                 summary.
               provide the appropriate security?                6.  Enter  verisign.com (a Symantec company) and find
             2.  Why is it so difficult to fight computer criminals? What
                                                                 information about PKI and encryption. Write a report.
               strategies can be implemented by financial institutions,     7.  Enter hijackthis.com. What is offered in the site? Write
               airlines, and other heavy users of EC?
                                                                 a report.
             3.  All EC sites share common security threats and vulner-    8.  Enter  blackhat.com.  Find out what the  site is about.
               abilities. Do you think that B2C websites face different
                                                                 Describe some of the site’s activities.
               threats and vulnerabilities than do B2B sites? Explain.    9.  Enter ftc.gov and identify some of the typical types of
             4.  Why is phishing so difficult to control? What can be
                                                                 fraud and scams on the Internet. List 10 of them.
               done? Discuss.                                   10.  Enter  scambusters.org  and identify  and  list  its  anti-
             5.  Debate this statement: “The best strategy is to invest very
                                                                 fraud and anti-scam activities.
               little and only in proven technologies such as encryption
               and firewalls.”
             6.  Debate: Can the underground Internet marketplace be
               controlled? Why or why not?                      TEAM ASSIGNMENTS AND PROJECTS
             7.  Debate: Is taking your fingerprints or other biometrics to
               assure EC security a violation of your privacy?    1.  Assignment for the Opening Case
             8.  Body scans at airports have created controversy. Debate   Read the opening case and answer the following ques-
               both points of this issue and relate it to EC security.  tions:
             9.  Discuss the issue of providing credit card details on    (a)  Why did the college have security problems? What
               Facebook. Would you do it?                          types of problems?
   335   336   337   338   339   340   341   342   343   344   345