Learning Goal: I’m working on a cyber security discussion question and need an e

Learning Goal: I’m working on a cyber security discussion question and need an explanation and answer to help me learn.Please Answer all seven questions without plagiarism percent because the doctor will upload it to Turnitin!Assignment 1ReadingElectronic CommerceAssignment/DiscussionE-commerce Security, After reading E-commerce Security, read these articles:What Cybersecurity Threats Should Most Worry You?5 Data Breach Threats Your Small Business Should Prepare ForThe most popular way to pay for goods or services online is with credit cards. That means as an E-commerce business owner you will need to collect personal information from your customers, especially credit card information. As you can tell from the articles above, this information is a major target of unscrupulous thieves. Your customers are putting their trust in you to protect that information. If you lose that trust you will lose their business.The attached file describes a number of security threats you could face. Among them are: Secrecy Threats, Web Server Threats, and Database Threats. In addition to a number of measures mentioned in your textbook, there is an organization established by some of the major credit card providers that are gaining popularity, the PCI Security Standards Council. They agreed upon 12 PCI Security Standards.After reading the attached file, do the following:Copy and paste the questions below into the PCI Standards section your E-commerce plan. Then write your answers.1- Describe your reaction to one or both of the security threat articles. Include one or more direct quotes from the article(s) in your response (Three sentences).2- Briefly describe the relation between security and cost in computer security (One or two sentences each).3- Name three measures mentioned in your textbook you would take to prevent these threats. Why?4- Would you adopt the digital certificate? Why or why not?5- How would you adopt the encryption algorithms and Hash Coding(be specific)? why?6- What are the differences between Public-key encryption, Private-key encryption, Data Encryption Standard (DES), and Advanced Encryption Standard (AES)? 7- What are the primary purposes of Ethical Hacking, Firewalls, Access Control and Authentication, and SSL Protocol?
Requirements: 250   |   .doc file

Posted in Uncategorized

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount