chapter 17

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/18

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

19 Terms

1
New cards

What are the learning objectives of Chapter 17?

Understand e-commerce fraud risk, take measures to prevent fraud in e-commerce, and detect e-business fraud.

2
New cards

What creates unique risks in e-business environments?

Aspects of the Internet-driven economy that create pressures and opportunities specific to e-commerce fraud.

3
New cards

What are examples of internal fraud risks in e-commerce?

Data theft, password theft, social engineering, sniffing, wartrapping, and portable devices with large-capacity memory.

4
New cards

What are examples of external fraud risks in e-commerce?

Viruses, worms, trojans, spyware, phishing, spoofing, SQL injections, bust-out schemes, false websites, and hijacking.

5
New cards

What is 'security through obscurity'?

A tactic of keeping security strategies and encryption secret to confuse attackers, though true security comes from transparent, well-tested systems.

6
New cards

What is the best way to prevent e-business fraud?

Reducing opportunities through appropriate internal controls.

7
New cards

What are the five elements of internal controls?

Control environment, risk assessment, control activities, information and communication, and monitoring.

8
New cards

Which three control elements are most important in e-business?

Control environment, risk assessment, and control activities.

9
New cards

What is the purpose of risk assessment in e-business?

To identify the risks of doing business with e-business partners and risks in electronic exchanges.

10
New cards

What are examples of control procedures to counter e-commerce risks?

Encryption, firewalls, digital signatures, biometrics, and intrusion detection.

11
New cards

What are examples of control activities?

Separation of duties, proper authorization, adequate records, physical controls, and independent checks.

12
New cards

How does adequate separation of duties prevent fraud?

By ensuring that no single employee controls all parts of a transaction, reducing the risk of bribery.

13
New cards

What are the most common authorization controls in e-commerce?

Passwords, firewalls, digital signatures, and biometrics.

14
New cards

Why is encryption important in e-commerce?

It protects sensitive electronic documents from being intercepted or altered.

15
New cards

What physical assets and records must be protected in e-business?

Facilities, computers, servers, software, applications, and data—both onsite and offsite.

16
New cards

Why are independent checks important in e-commerce?

They help detect fraud by verifying the performance of e-business partners and systems.

17
New cards

What are the key components to examine in independent checks?

Backgrounds, motivations, and decision-making influence of partners.

18
New cards

What are the steps in data-driven fraud detection?

Understand the business, identify possible frauds, determine symptoms, search using data systems, analyze results, investigate symptoms.

19
New cards

What technical knowledge is useful in e-commerce fraud investigation?

Understanding web servers, email systems, intrusion programs (e.g., Nmap, Wireshark), Unix/Linux, Windows vulnerabilities, scripting languages, and IDS tools.