Question Description
Learning Objectives and Outcomes
Identify common security vulnerabilities that affect e-commerce applications and their countermeasures.
Internet access
Assignment Requirements
E-commerce Web applications include shopping carts, online auctions, and similar interactive Web sites, all of which are prone to vulnerabilities. The possible results of an attacker exploiting a vulnerability in a Web application are data theft and financial loss to businesses and consumers. Organizations that run e-commerce Web sites must protect the confidentiality of customer data and implement layers of controls that stop attacks and prevent breaches. However, not every e-commerce application is highly secure.
Tasks
Research security vulnerabilities in common e-commerce applications.
Determine countermeasures that organizations implement against the vulnerabilities to protect data.
Write a summary report that describes a typical e-commerce application, three common vulnerabilities, and the countermeasures that are typically implemented to minimize risk.
Required Resources
Submission Requirements
Format: Microsoft Word (or compatible)
Font: Arial, 12-Point, Double-Space
Citation Style: Follow your school’s preferred style guide
Length: 1–2 pages
I researched security vulnerabilities in common e-commerce applications.
I determined countermeasures that organizations implement against the vulnerabilities to protect data.
I wrote a summary report that describes a typical e-commerce application, three common vulnerabilities, and the countermeasures that are typically implemented to minimize risk.
I followed the submission guidelines.