Question
What additional information and meaningful responses do you have on the paragraphs below regarding new opportunities e-commerce solutions like EDI present for internal and external
What additional information and meaningful responses do you have on the paragraphs below regarding new opportunities e-commerce solutions like EDI present for internal and external perpetrators trying to defraud companies in a bad way? See paragraphs below. Please do not provide answers from any homework service providers or textbook answers at all. This will require some research and an in-depth or detailed explanation.
E-commerce solutions like EDI present many new opportunities for internal and external perpetrators trying to defraud a company.
Opportunities for internal perpetrators: Data theft is the main opportunity e-commerce solutions present for internal perpetrators.According to section 17-1a, paragraph 2 of our text, "the theft of money is usually the primary goal in traditional fraud. In the electronic environment, data theft is normally the first concern because data have many useful attributes."It is possible to sell data for money or used to blackmail someone.Data is harder to track than physical property, as one can steal data without leaving a void.For example, if you steal money, the money is gone from where it was; if you replicate and steal data, the original data is still in its place.Moreover, lots of data can be stolen quickly, within minutes, without anyone being the wiser.Employees can use a number of methods to steal data from a company, such as abusing their user credentials, stealing passwords, and vandalism.Hackers can access the internal system of employees by stealing passwords, "sniffing" and "wartrapping."As an example of the damage internal data theft can do to all involved, read the below article, which was published yesterday.This particular example deals with the vandalism of a disgruntled Google employee.
Opportunities for external perpetrators: External perpetrators, such as hackers, will have new opportunities for fraud once Darling Company uses e-commerce solutions for order transmissions and payments.Hackers can steal credit card numbers, social security numbers, and other valuable information from companies by using spyware, phishing and spoofing.Now that Darling will presumably be taking credit card payments over the internet, they leave themselves vulnerable to SQL injections unless they erect adequate defenses.Now that their customers' names and personal information will be transmitted online, these too are vulnerable to a hack.To reduce these opportunities to outside attacks, Darling will need to spend the money to train its employees and to set up cyber security.At my place of employment, we are required to complete hour long training each year.This helps us detect threats such as phishing.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started