Page 147 - DCAP306_DCAP511_E-COMMERCE_AND_E-BUSINESS
P. 147

E-Commerce and E-Business



                                  (ii)  National Information Security Assurance Program (NISAP)
                                 (iii)  National Informatics Centre (NIC)
                                 (iv)   CERT-In

                          11.7   Review Questions
                          1.  “Growth in Information Technology (IT) sector has exposed the user to a huge bank of
                              information.” Comment.
                          2.  “Terror attacks in major cities and towns across the  world show the inadequacy of the
                              mechanisms to address the challenge of cyber threat.” Comment.
                          3.  “Executable based attack happens when a program is executed on the target computer system.”
                              Analyze.

                          4.  “Cyber attacks are commonly directed towards economic and financial institutions.” Discuss.
                          5.  “Crime in a society will remain at a tolerable level if it is detected early.” Discuss.
                          6.  “Governments should engage  academic institutions to  educate the common man  about the
                              dangers of cyber terrorism.” Comment.
                          7.  “The day is not far when terrorists themselves will be excellent hackers.” Comment.

                          8.  “Cyber terrorism is the convergence of terrorism and cyber space.” Analyze.
                          9.  “Cyber criminals attack computer  networks  and advocate violence, promote hatred and
                              vandalism using the Internet.” Discuss.
                          10.  “A common vision is required to ensure cyber security and prevent cyber-crimes.” Comment.
                          11.  “The most popular weapon in cyber terrorism is the use of  computer viruses and worms.”
                              Discuss.
                          12.  “Cybercrime is the latest and perhaps the most complicated problem in the cyber world.”
                              Comment.
                          Answers: Self Assessment
                          1.  (a) F    (b) T    (c) F         (d) T    (e) T   (f) T
                          2.  (a) Indo-US Cyber Security Forum (IUSCSF)  (b) Distributed Denial of Service (DDoS)
                              (c) Data diddling        (d) Logic bomb       (e) Indian Department of Information

                              Technology
                          3.  (a) Computer vandalism   (b) Salami attack       (c) Intellectual property crime
                              (d) E-mail bombing       (e) CERT-In
                          11.8   Further Readings


                                      Bajaj, K. K., and Nag, D. E-Commerce: The Cutting Edge of Business, 2nd ed. New Delhi:
                                      Tata McGraw-Hill
                                      Chan, H., Lee, R., Dillon, T., and Chang, E. (2008). E-Commerce: Fundamentals And
                                      Applications, Student ed. New Delhi: Willey India (P.) Ltd.


                                      http://cybercrime.planetindia.net/intro.htm
                                      http://www.naavi.org/pati/pati_cybercrimes_dec03.htm







                          140                  LOVELY PROFESSIONAL UNIVERSITY
   142   143   144   145   146   147   148   149   150   151   152