During the discovery stage in the legal process, why would opposing sides be cooperative in providing information about evidence they intend to introduce during the trial?Here is a tip:Anything that can be presented to support a particular assertion is known as evidence.
20 Aug 2021Why is it good for a witness to be "defensive" in depositions and "offensive" in court?Here is a tip:A person who has seen the event of interest in a particular case is known as the witness.
20 Aug 2021Two years ago, your best friend Scott Adams started a home business selling custom-made chairs and tables. His original designs quickly became popular, and he began selling in large quantities. To take advantage of the upcoming holiday season, Scott decided to begin selling over ...
20 Aug 2021Two years ago, your best friend Scott Adams started a home business selling custom-made chairs and tables. His original designs quickly became popular, and he began selling in large quantities. To take advantage of the upcoming holiday season, Scott decided to begin selling over ...
20 Aug 2021E-Commerce Fraud PreventionTogether with other students from your class, identify a small, local company that does e-business and whose owner or manager is willing to talk with you about its operations. With your professors approval, meet with the company manager and explain to h...
20 Aug 2021E-Commerce SurveyConduct a random survey of at least 30 people. From the survey responses, draw several conclusions about attitudes of consumers toward e-commerce. Write a brief essay summarizing your conclusions.Attach to it any spreadsheets or charts used in your analysis. The ...
20 Aug 2021E-Commerce SecurityIdentify a local company that conducts e-commerce, preferably one with whom you have previously done business or are otherwise familiar. Research the company and become knowledgeable in its basic operations and services. Contact the company and inform it of you...
20 Aug 2021One of the riskiest parts of an e-commerce transaction is the payment process. Several different companies, such as Authorize.net, Google, and Yahoo! checkouts, and others provide robust solutions for this risky process. Pick a provider that services the payment process (or some ...
20 Aug 2021eBay has become one of the most popular auction sites in the world. Each day, millions of products and services are bought and sold on the site. Because of its popularity, eBay is also a home for many different types of scams.Your business wants to start buying and selling on eBa...
20 Aug 20211.Where have you seen security through obscurity employed (other than a key under the doormat at home)?Here is a tip:Security through obscurity can be understood as relying on the security design completely. Security through obscurity creates a false sense of safeguard.2.Did it w...
20 Aug 2021(If allowed by your school’s policy) Download and install a network sniffer application like Wireshark, tcpdump. Sniff the traffic on your local network for 10 minutes and report on your experience.1. What did you find?2.Why do these applications exist?
20 Aug 2021A number of security/intrusion detection firms exist in the market. Research one of these firms and report on its services, costs, and benefits.1. Would you hire a firm like this for a start-up company?2.Would you hire one for an established, small company?Here is a tip:The firm ...
20 Aug 2021As the new intern for the summer, you have been asked to investigate two methods of e-mail encryption: S/MIME and Pretty Good Privacy (PGP). Compare and contrast the two systems.1. Why do two standards exist?Optional activity: Set up S/MIME or PGP-based plug-ins in student e-mail...
20 Aug 2021Your company, ABC Reading, writes unique OpenGLbased reading software for children in grade school. ABC employs about 30 sales representatives who interact with school districts around the nation to sell and support your software. ABC has given each sales representative a powerfu...
20 Aug 20211.What is a VPN?Here is a tip:Virtual Private Network (VPN) helps to secure the browsing activities from the evil eyes of hackers.2.How do VPNs provide security within organizations?Here is a tip:Virtual private network helps in a secured exchange of data throughout the network.
20 Aug 2021Dan Jones is the new CIO of Ricochet Systems, an Internet securities broker. After assessing the e-commerce risks in his company, he determines that passwords are a weak link that needs additional protection. However, he is unsure as to what the requirements for a robust password...
20 Aug 2021Search the Internet for a recent story on information being stolen from a company. Examples of this are stolen credit card numbers, personal information, and proprietary secrets. Summarize the article in two or three paragraphs. Detail several measures that could have prevented a...
20 Aug 2021Your company, ImSecure Inc., is a security investigation firm. You have been contacted by Darling Company, a producer of cardstock for greeting card companies like Hallmike and Birthday Wishes Company. Darling currently requires orders to be placed several weeks in advance of the...
20 Aug 2021Secure web connections are based on:a. DNS.b. FTP.c. HTTPS.d. FTPS.
20 Aug 2021What is the most important factor in control effectiveness?a. Clear policies regarding controls.b. An understanding of e-business networks.c. The use of random monitoring.d. The "tone at the top."
20 Aug 2021Which of the following types of controls is leastoften used to protect IT processing equipment?a. Physical controls.b. Authorization controls.c. Independent checks or reference.d. Documents and records.
20 Aug 2021Which of the following human features is generally not used in biometrics?a. Fingerprints.b. Voice tones.c. Retina patterns.d. Weight.
20 Aug 2021Passwords and biometrics are both:a. Authorization controls.b. Independent check controls.c. Physical controls.d. Document controls.
20 Aug 2021Using a subtly different Internet host name to mimic another business is known as:a. Spoofing.b. Sniffing.c. Web-visit hijacking.d. Falsified identity.
20 Aug 2021Which of the following fraud risks involves viewing information as it passes along network channels?a. Sniffing.b. Spoofing.c. False Web sites.d. Web hijacking.
20 Aug 2021Which of the following fraud risks involves changing IP addresses?a. Spoofing.b. Sniffing.c. False Web sites.d. Customer impersonation.
20 Aug 2021Which of the following is not an internal control activity or procedure?a. Physical safeguards.b. Segregation of duties.c. Internal auditors.d. Documents and records.
20 Aug 2021E-business transactions make it easier to commit which of the following types of frauds?a. Kickbacks.b. Customer impersonation.c. Setting up dummy companies.d. Stealing petty cash.
20 Aug 2021Which of the following is not a fraud risk unique to e-business transactions?a. Innovative technologies where security lags process development.b. Selling new products.c. Complex information systems.d. Removal of personal contact.
20 Aug 2021Using secret measures as the basis for a security system is generally seen as less effective than using public, time-tested procedures.
20 Aug 2021Intrusion detection is the activity of trying to break into competitors computer networks.
20 Aug 2021It is often easier to analyze e-business transaction data than data from other types of transactions because information is captured in databases that can be manipulated.
20 Aug 2021Biometrics is a form of authorization control.
20 Aug 2021Digital signatures use human features to create secure access controls.
20 Aug 2021Segregation of duties is an important control in preventing e-business fraud.
20 Aug 2021Customer impersonation is similar to a bust-out fraud.
20 Aug 2021In many e-business sales, password protection is the only barrier to unauthorized access.
20 Aug 2021Falsified identity and customer impersonation are the same thing.
20 Aug 2021Sniffing changes e-mail headers or IP addresses.
20 Aug 2021Data theft is a bigger problem in e-business transactions than money theft.
20 Aug 2021Fraud risks are higher when the entity with which you are transacting business cant be seen.
20 Aug 2021What advantages do third-party providers like application service providers offer?Here is a tip:Agents, financial and non-financial advisors, consultants on various matters, and contractors who provide services are included in third party service providers.
20 Aug 2021What methods of security through obscurity does your school employ? How do these methods increase security? How do they decrease security?
20 Aug 2021Can e-business fraud risks ever be completely eliminated?Here is a tip:The term fraud states the diluted intensions of one party toward another to have unethical advantage.
20 Aug 2021Why can it be dangerous to provide credit card information over the Internet? Does it stop the risk if you only use credit cards at local businesses?Here is a tip:Identity theft is the theft of someones confidential and personal information.
20 Aug 2021How is the data-driven, six-step detection approach relevant to e-business fraud detection?Here is a tip:If a fraud takes place while doing an online transaction by using bugs in the website or hacking, it is called as an e-business fraud.
20 Aug 2021Why does biometrics offer significant promises as a way to authenticate e-business transactions?Here is a tip:Security mechanisms are set to prevent from the frauds in e-businesses by identifying something different.
20 Aug 2021What principles are important in password use and training?Here is a tip:Password is a measure of security and authorization of any document.
20 Aug 2021Why is spoofing a significant risk in e-business?Here is a tip:E-business frauds mostly occur due to usage of online sites or different internet platforms.
20 Aug 2021What is sniffing?Here is a tip:Sniffing is common in networks that run freely available applications.
20 Aug 2021