TEXT BOOK: Schneider, GP 2015, Electronic commerce, 11th edition
MODULE 6 CHAPTER 10
REVIEW QUESTIONS
1. Explain why early computer security efforts focused on controlling the physical environment in which computers operated.
2. Describe and provide one example of an integrity violation.
3. Explain the difference between session cookies and persistent cookies. In your answer, include how each type of cookie is used.
CASE STUDY C1 CRITICAL THINKING QUESTIONS
1. Explain how Bibliofind might have used firewalls to prevent the intruders from gaining access to its transaction servers. Be specific about where the firewalls should have been placed in the network and what kinds of rules they should have used to filter network traffic at each point.
2. Explain how encryption might have helped prevent or minimize the effects of Bibliofind's security breach.
3. California has a law that requires companies to inform customers whose private information might have been exposed during a security breach like the one that Bibliofind experienced.
Before California enacted this law, businesses argued that the law would encourage nuisance lawsuits. Present arguments for and against this type of legislation.