common security vulnerabilities in e commerce applications
Learning Objectives and Outcomes
- Identify common security vulnerabilities that affect e-commerce applications and their countermeasures.
- Internet access
Assignment Requirements
E-commerce Web applications include shopping carts, online auctions, and similar interactive Web sites, all of which are prone to vulnerabilities. The possible results of an attacker exploiting a vulnerability in a Web application are data theft and financial loss to businesses and consumers. Organizations that run e-commerce Web sites must protect the confidentiality of customer data and implement layers of controls that stop attacks and prevent breaches. However, not every e-commerce application is highly secure.
Tasks
- Research security vulnerabilities in common e-commerce applications.
- Determine countermeasures that organizations implement against the vulnerabilities to protect data.
- Write a summary report that describes a typical e-commerce application, three common vulnerabilities, and the countermeasures that are typically implemented to minimize risk.
Required Resources
Submission Requirements
- Format: Microsoft Word (or compatible)
- Font: Arial, 12-Point, Double-Space
- Citation Style: Follow your school’s preferred style guide
- Length: 1–2 pages
- I researched security vulnerabilities in common e-commerce applications.
- I determined countermeasures that organizations implement against the vulnerabilities to protect data.
- I wrote a summary report that describes a typical e-commerce application, three common vulnerabilities, and the countermeasures that are typically implemented to minimize risk.
- I followed the submission guidelines.
Self-Assessment Checklist
Leave a Reply
Want to join the discussion?Feel free to contribute!