Topic > security - 515

Security ThreatsSecurity threats defined by acts or objects that endanger the security of a systemSecurity threats divided into 2 types Technical attacks and Non-technical attacksTechnical attacksTechnical attacks considered one of the most challenging problems that the e-commerce should face face. Those responsible for these attacks typically target sites such as banks, credit card payment gateways. (McDowell, 2009) Denial of Service Attack The DoSDenial of Service attack occurs when an attacker attempts to flood a networked computer or device with traffic to make the computer or device unavailable, the attack gets its name from the purpose that is intended to deny the ability of an institution or company to provide services to its users or customers. (University, 2013) According to the United States Computer Emergency Readiness Team, the symptoms of DoS are: (McDowell, 2009) Slow network performance Unavailability of a particular website Inability to access any website Distributed denial of service attack L DDoS attack occurs when the attacker gains access to as many computers as possible and uses these computers to send a flood of data packets to the target computer (Efraim Turban, 2006) An example of DDoSDDoS considered the biggest security fear for IT professionals, the most famous DDoS attacks occurred in February 2000 where websites including Yahoo, Buy.com, E-bay, Amazon and CNN were attacked and left inaccessible for several hours (O'Raghallaigh, 2010) The MalwaresTechterms website defines malware as software programs designed to damage or perform other unwanted actions on a computer system (Anon., sd) There are many types of malware, including:Virus: A piece of software code that inserts itself into the target to spread...... middle of paper......Available at: http://www. techterms.com/definition/malwareAnon., and Trojan horse. [Online]Available at: http://www.techterms.com/definition/trojanhorseBill Wyman, WSHLS, 2013. Email Phishing Attacks, sl: The SANS Program Securing The Human.Efraim Turban, DK,. JKL,. DV, 2006. Electronic Commerce: A Managerial Perspective. Prentice Hall ed. sl:snEngineering, MR t. S., 2005. Measuring Resistance to Social Engineering.McDowell, M., 2009. Understanding Denial-of-Service Attacks. [Online]Available at: http://www.us-cert.gov/ncas/tips/ST04-015[Accessed December 2013].O'Raghallaigh, E., 2010. Major Security Issues in E‐Commerce, sl: WebScience.University, H., 2013. What is a Denial of Service (DoS) attack?. [Online]Available at: http://huit.harvard.edu/faqs/what-denial-service-dos-attack[Accessed December 2013].