Use app×
Join Bloom Tuition
One on One Online Tuition
JEE MAIN 2025 Foundation Course
NEET 2025 Foundation Course
CLASS 12 FOUNDATION COURSE
CLASS 10 FOUNDATION COURSE
CLASS 9 FOUNDATION COURSE
CLASS 8 FOUNDATION COURSE
0 votes
1.1k views
in E-Commerce Security Systems by (49.1k points)
closed by

Explain various types of E-commerce threats?

1 Answer

+1 vote
by (54.8k points)
selected by
 
Best answer

(i) Information leakage:

The leakage of trade secrets in E-Commerce mainly includes two aspects:

(a) the content of the transaction between the vendor and customer is stolen by the third party; 

(b) the documents provided by the merchant to the customer or vice versa are illegally used by the another. This intercepting and stealing of online documents is called information leakage.

(ii) Tampering:

E-Commerce has the problem of the authenticity and integrity of business information. When hackers grasp the data transmitted on the network, it can be falsified in the middle through various technical means, and then sent to the destination, thereby destroying the authenticity and integrity of the data.

(iii) Payment frauds:

Payment frauds have subsets like Friendly fraud (when customer demands false reclaim or refund), Clean fraud (when a stolen credit card is used to make a purchase Triangulation fraud (fake online shops offering cheapest price and collect credit card data) etc.

(iv) Malicious code threats:

Within an E-Commerce site, there are multiple vulnerable areas that can serve as an intrusion point for a hacker to gain payment and user information. Using malware, Cross Site Scripting or SQL Injection, an attacker will extract the credit card information and sell the acquired data on black markets. Fraud is then committed to extract the greatest value possible through E-Commerce transactions or ATM withdrawals, etc.

(v) Distributed Denial of Service (DDoS) Attacks:

It is a process of taking down an E-Commerce site by sending continious overwhelming request to its server. This attack will be conducted from numerous unidentified computers using botnet. This attack will slow down and make the server inoperative. DDoS attacks is also called as network flooding.

(vi) Cyber Squatting:

Cybers quatting is the illegal practice of registering an Internet domain name that might be wanted by another person in an intention to sell it later for a profit.

Welcome to Sarthaks eConnect: A unique platform where students can interact with teachers/experts/students to get solutions to their queries. Students (upto class 10+2) preparing for All Government Exams, CBSE Board Exam, ICSE Board Exam, State Board Exam, JEE (Mains+Advance) and NEET can ask questions from any subject and get quick answers by subject teachers/ experts/mentors/students.

Categories

...