E-Business Risks
IT infrastructure vulnerabilities
- Denial-of-service attacks
- Degradation of service
- Distributed denial-of-service
- Other forms of service interruptions
- Physical (hardware)
- Design (hardware or software)
- Operations (people)
- Environmental (disasters)
- Data theft
- Sniffing
- Unauthorized access to passwords
Falsified identity
- E-mail spoofing
- IP spoofing
- Customer impersonation
- False web sites
- E-mail or web visit hijacking
Compromised privacy
- Lax internal control
- Business policies violating privacy
- Cookies
- Spyware
Destructive codes and programs
- Virus
- Trojan horse
- Logic bomb
- Trap door
Human factors
- Social engineering
- Password sharing*
- Violations of policies*
System interdependencies
- Internal systems*
- External partnerships
Source: Glover, S. M., Liddle, S. W. &
Prawitt, D. F. (2002). E-Business: Principles and strategies for accountants.
Upper Saddle River, NJ: Prentice-Hall. * Items added by R. Kulzick.
– R. S. Kulzick –
2/16/2004 –
© Copyright 2004 Raymond S. Kulzick. All rights reserved.
00223.
This publication provides business, financial planning,
and/or tax information to our clients. All material is for general information only and
should not be acted upon without seeking appropriate professional assistance. Read Disclaimer.
Contact rkulzick@kulzick.com with questions or
comments about this web site.
Copyright © 2004 Kulzick Associates, PA - Last modified:
September 13, 2008