Chapter 4
Chapter 4
Chapter 4
, 16e (Laudon/Traver)
Chapter 4 E-commerce Security and Payment Systems
7) ________ is the ability to ensure that messages and data are only
available to those authorized to view them.
A) Confidentiality
B) Integrity
C) Privacy
D) Availability
Answer: A
14) Which of the following did the Internet Advertising Bureau urge
advertisers to abandon?
A) HTML
B) HTML5
C) Adobe Flash
D) Adobe Acrobat
Answer: C
20) What is the most frequent cause of stolen credit cards and card
information today?
A) lost cards
B) the hacking and looting of corporate servers storing credit card
information
C) sniffing programs
D) phishing attacks
Answer: B
21) Which dimensions of security is spoofing a threat to?
A) integrity and confidentiality
B) availability and authenticity
C) integrity and authenticity
D) availability and integrity
Answer: C
38) What is the Internet of Things (IoT) and what security issues and
challenges does it raise?
Answer: The Internet of Things (IoT) involves the use of the Internet to
connect a wide variety
of sensors, devices, and machines, and is powering the development of a
multitude of smart
connected things, such as home electronics (smart TVs, thermostats,
home security systems, and
more). IoT also includes connected cars, medical devices and industrial
equipment that supports
manufacturing, energy, transportation, and other industrial sectors.
Unfortunately, IoT raises a host of security issues similar to existing
security challenges, but
even more challenging, given the need to deal with a wider range of
devices, operating in a less
controlled, and global environment. In a world of connected things, the
devices, the data
produced and used by the devices, and the systems and applications
supported by those devices,
can all potentially be attacked. For instance, many IoT devices, such as
sensors, are intended to be deployed on a much greater scale than
traditional Internet-connected devices, creating a vast
quantity of interconnected links that can be exploited. Existing tools,
methods, and strategies
need to be developed to deal with this unprecedented scale. Many
instances of IoT consist of
collections of identical devices that all have the same characteristics,
which magnifies the
potential impact of security vulnerabilities.
Many IoT devices are anticipated to have a much longer service life than
typical equipment,
which raises the possibility that devices may "outlive" the manufacturer,
leaving them without
long-term support that creates persistent vulnerabilities. Many IoT
devices are intentionally
designed without the ability to be upgraded, or the upgrade process is
difficult, which raises the
possibility that vulnerable devices cannot or will not be fixed, leaving
them perpetually
vulnerable. Many IoT devices do not provide the user with visibility into
the workings of the
device or the data being produced, nor alert the user when a security
problem arises, so users
may believe an IoT device is functioning as intended when in fact, it may
be performing in a
malicious manner. Finally, some IoT devices, such as sensors, are
unobtrusively embedded in the
environment such that a user may not even be aware of the device, so a
security breach might
persist for a long time before being noticed.
Difficulty: Moderate
AACSB: Analytical thinking; Information technology; Written and oral
communication
Learning Objective: 5.2: Identify the key security threats in the e-
commerce environment.
39) What is a sniffing attack and how does it differ from a MitM attack?
Answer: A sniffer is a type of eavesdropping program that monitors
information traveling over a
network. When used legitimately in a sniffing attack, hackers use sniffers
to steal proprietary
information from a network, including passwords, e-mail messages,
company files, and
confidential reports. A man-in-the-middle (MitM) attack also involves
eavesdropping but is more
active than a sniffing attack, which typically involves passive monitoring.
In a MitM attack, the
attacker can intercept communications between two parties who believe
they are directly
communicating with one another, when in fact the attacker is controlling
the communications.
Difficulty: Moderate
AACSB: Analytical thinking; Information technology; Written and oral
communication
Learning Objective: 5.2: Identify the key security threats in the e-
commerce environment.
40) List and briefly describe the various types of malicious code and how
they work. Include the
different types of viruses.
Answer: Malicious code includes a variety of threats such as viruses,
worms, ransomware,
Trojan horses, and bot programs. A virus is a computer program that can
replicate or make copies
of itself and spread to other files. Viruses can range in severity from
simple programs that display
a message or graphic as a "joke" to more malevolent code that will
destroy files or reformat the
hard drive of a computer, causing programs to run incorrectly. Worms
are designed to spread not
only from file to file but from computer to computer and do not
necessarily need to be activated
in order to replicate. Ransomware is a type of malware (often a worm)
that locks your computer
or files to stop you from accessing them. A Trojan horse is not itself a
virus because it does not
replicate but it is a method by which viruses or other malicious code can
be introduced into a
computer system. It appears benign and then suddenly does something
harmful. For example, it
may appear to be only a game and then it will steal passwords and mail
them to another person.
A backdoor is a feature of worms, viruses, and Trojans that allow
attackers to remotely access compromised computers. Bot programs are
a type of malicious code that can be covertly
installed on a computer when it is attached to the Internet. Once
installed, the bot responds to
external commands sent by the attacker, and many bots can be
coordinated by a hacker into a
botnet.
Difficulty: Moderate
AACSB: Analytical thinking; Information technology; Written and oral
communication
Learning Objective: 5.2: Identify the key security threats in the e-
commerce environment.
45) All of the following statements about public key cryptography are
true except:
A) public key cryptography uses two mathematically related digital keys.
B) public key cryptography ensures authentication of the sender.
C) public key cryptography does not ensure message integrity.
D) public key cryptography is based on the idea of irreversible
mathematical functions.
Answer: B
47) All of the following statements about PKI are true except:
A) the term PKI refers to the certification authorities and digital
certificate procedures that are accepted by all parties.
B) PKI is not effective against insiders who have a legitimate access to
corporate systems including customer information.
C) PKI guarantees that the verifying computer of the merchant is secure.
D) the acronym PKI stands for public key infrastructure.
Answer: C
48) A digital certificate contains all of the following except the:
A) subject's private key.
B) subject's public key.
C) digital signature of the certification authority.
D) digital certificate serial number.
Answer: A
52) Proxy servers are also known as __________ because they have
two network interfaces.
A) firewalls
B) application gateways
C) dual home systems
D) packet filters
Answer: C
53) All of the following are used for authentication except:
A) digital signatures.
B) certificates of authority.
C) biometric devices.
D) packet filters.
Answer: D
59) Which of the following is the most common protocol for securing
a digital channel of communication?
A) DES
B) TLS
C) VPN
D) HTTP
Answer: B
61) The easiest and least expensive way to prevent threats to system
integrity is to install anti-virus software.
Answer: TRUE
Difficulty: Moderate
AACSB: Information technology
Learning Objective: 5.3: Describe how technology helps secure Internet
communications
channels and protect networks, servers, and clients.
71) All of the following statements about Apple Pay are true except
which of the following?
A) Apple Pay is the most popular alternative payment method in the
United States.
B) Apple Pay is an example of a universal proximity mobile wallet.
C) Apple Pay can be used for mobile payments at the point of sale at a
physical store.
D) Apple Pay has more users than either Google Pay or Samsung Pay.
Answer: A
75) All of the following are limitations of the existing online credit
card payment system except:
A) poor security.
B) cost to consumers.
C) cost to merchant.
D) social equity.
Answer: B
85) Define and explain how electronic billing presentment and payment
systems (EBPP) systems
work. Describe each of the main EBPP business models.
Answer: EBPP refers to electronic billing presentment and payment
systems, which are systems
that enable the online delivery and payment of monthly bills. EBPP
services allow consumers to
view bills electronically using either their desktop PC or mobile device
and pay them through
electronic funds transfers from bank or credit card accounts. More and
more companies are
choosing to issue statements and bills electronically, rather than mailing
out paper versions,
especially for recurring bills such as utilities, insurance, and
subscriptions.
There are four main types of EBPP business models: online banking,
biller-direct, mobile, and
consolidator. The online banking model is the most widely used today.
Consumers establish an
online payment service with their banks and use it to pay bills as they
come due or automatically
make payments for, say, rent. The payments are made directly to the
seller's bank account. This
model has the advantage of convenience for the consumer because the
payments are deducted
automatically, usually with a notice from the bank or the merchant that
their account has been
debited. In the biller-direct model, consumers are sent bills by e-mail
notification, and go to the
merchant's website to make payments using their banking credentials.
This model has the
advantage of allowing the merchant to engage with the consumer by
sending coupons or
rewards.
The biller-direct model is a two-step process, and less convenient for
consumers. The mobile
model allows consumers to make payments using mobile apps, once
again relying on their bank
credentials as the source of funds. Consumers are notified of a bill by text
message and authorize
the payment. An extension of this is the social-mobile model, where social
networks like
Facebook integrate payment into their messaging services. The mobile
model has several
advantages, not least of which is the convenience for consumers of
paying bills while using their
phones, but also the speed with which bills can be paid in a single step.
This is the fastest
growing form of EBPP. For instance, Facebook Messenger enables users
to send and receive P2P
payments to and from friends and family with either a debit card or
PayPal account. Facebook does not charge for these transfers.
In the consolidator model, a third party, such as a financial institution or
a focused portal such as
Intuit's Paytrust, Fiserv's MyCheckFree, Mint Bills, and others,
aggregates all bills for consumers
and permits one-stop bill payment. This model has the advantage of
allowing consumers to see
all their bills at one website or app. However, because bills come due at
different times,
consumers need to check their portals often. The consolidator model
faces several challenges.
For billers, using the consolidator model means an increased time lag
between billing and
payment, and inserts an intermediary between the company and its
customer.
Supporting these primary business models are infrastructure providers
such as Fiserv, Yodlee,
FIS Global, ACI Worldwide, MasterCard RPPS (Remote Payment and
Presentment Service), and
others that provide the software to create the EBPP system or handle
billing and payment
collection for the biller.
Difficulty: Moderate
AACSB: Analytical thinking; Information technology; Written and oral
communication
Learning Objective: 5.6: Describe the features and functionality of
electronic billing
presentment and payment systems.