Pages

Showing posts with label MGT 417. Show all posts
Showing posts with label MGT 417. Show all posts

software attacks

salam.1.malaysia.salam.uitm.

In Introduction Information System I have learn about Software attacks. well, for now software attacks have been occurring in which malware(malicious software) tried to infect as many computers worldwide as possible. Cybercriminals are heavily involved with malware attacks to make money and they use complicated attacks typically via the Internet. There are variety of software attacks.

(1) Virus - Segment of computer code that performs malicious actions by attaching to another computer program.


(2) Worm - Segment of computer code that performs malicious actions and will replicate, or spread, by itself (without requiring another program).


(3) Trojan Horse - Software programs thar hide in other programs and reveal their designed behavior only when they are activated.




(4) Back Door(Trap Door) - Typically a password, known only to the attacker, that allows him or her to access a computer system at will, without having to go through any security procedures.

(5) Logic Bomb - Segment of computer code that is embedded with an organization's existing computer programs and is designed to activate and perform a destructive action at a certain time or date.


(6) Password Attack Dictionary Attack - Attacks that try combinations of letters and numbers that are most likely to succeed, such as all words from a dictionary.


(7) Brute Force Attack - Attacks that massive computing resources to try every possible combination of password options to uncover a password.


The following picture is DES(Data Encryption Standard) cracker circuit board fitted with several deep crack chips which could brute force a DES key in a matter of days:




(8) Denial-of-Service Attack - Attacker sends so many information requests to a target computer system that the target cannot handle them successfully and typically crashes.

(9) Distributed Denial-of-Service Attack - An attacker first takes over many computers, typically by using malicious software. These computers are called zombies or bots. The attacker uses these bots (which form a botnet) to deliver a coordinated stream of information requests to a target computer, causing it to crash.


(10) Phishing Attack - Phishing attacks use deception to acquire sensitive personal information by masquerading as official-looking e-mails or instant messages.



(11) Zero-day Attack - A zero day attack takes advantage of a newly discovered, previously unknown vulnerability in a software product. Perpetrators attack the vulnerability before the software vendor can prepare a patch for the vulnerability.

resource: En. Harun note slide, Introduction Information Systems International Student Version.

E - Commerce

salam.1.malaysia.salam.uitm.

The Internet has created a new economic ecosystem, the e-commerce marketplace, and it has become the virtual main street of the world. Providing a quick and convenient way of exchanging goods and services both regionally and globally, e-commerce has boomed. Today, e-commerce has grown into a huge industry with US online retail generating $175B in revenues in 2007, with consumer-driven (B2C) online transactions impacting industries from travel services to consumer electronics, from books and media distribution to sports & fitness. With more than 70% of Americans using the Internet on a daily basis for private and/or business use and the rest of the world also beginning to catch on, e-commerce's global growth curve is not likely to taper off anytime soon. However, the US recession has taken its toll on online sales. Although early 2008 estimates by Forrester Research were very strong with 2008 revenues upwards of $204B (a 17% growth rate), 2008 holiday sales showed the first decrease in the last 7 years. Research by Com Score shows sales declining by 1% for the first 49 days of the holiday season.

resource : http://www.wikinvest.com/concept/E-Commerce

what is E-commerce
EC describes the process of buying, selling and transferring product, services, or information via computer networks, including internet. In addition to the buying and selling of goods and services.

why E-commerce? 
now, we on the new era of business that market are not the problem to sell or expose our product. with E-commerce we can just sell our product or service just at front of our fingertips. The biggest E-commerce held in the world is e-bay.
We also can said that we used internet as a business powerful gadget. 
E-commerce are easy to use and very friendly to customer. Customer can get all information that they want just from the site. no need to go outside and they can just buy it at that time also.
In other word, people can buy product that they need just by clicking on the web and it's done!

types in E-commerce are:

 - Business to Business (B2B)
 - Business to Customer (B2C)

what is B2B?
Business to business are transaction or relation in business between business entity and business entity.
such as transaction or relation between supplier and retailer. It's start from raw material producer until retailer or before the goods reach customer.

what is B2C?
Business to Customer are transaction or relation between business and customer. such as retailer and customer, wholesaler and customer. Goods that is produce by business entity reach customer.