Loading...
Please wait, while we are loading the content...
Similar Documents
Entrepreneurial learning in a secure E-Commerce course through creating competitive real-world sites
| Content Provider | Scilit |
|---|---|
| Author | Garlick, R. |
| Copyright Year | 2014 |
| Description | Students were encouraged to actively probe the defenses of the opposing team's site during the development process, with a few caveats: First, if a security breach was possible, nothing destructive should be done until the final presentation, and then only as a demonstration that could be reversed. Secondly, although other possibilities were discussed, only application-layer attacks were permitted. Exploiting weaknesses in the shopping cart software and database were promoted over DDOS or other network level attacks. Cross-site scripting, SQL injection, and several other attack vectors were presented. Lastly, social engineering was encouraged to promote an awareness of creating a secure development environment and team. Book Name: E-Commerce, E-Business and E-Service |
| Related Links | https://content.taylorfrancis.com/books/download?dac=C2014-0-30763-8&isbn=9780429227233&doi=10.1201/b17084-9&format=pdf |
| Ending Page | 44 |
| Page Count | 4 |
| Starting Page | 41 |
| DOI | 10.1201/b17084-9 |
| Language | English |
| Publisher | Informa UK Limited |
| Publisher Date | 2014-07-28 |
| Access Restriction | Open |
| Subject Keyword | Book Name: E-commerce, E-business and E-service Commerce Weaknesses Scripting Entrepreneurial Destructive Encouraged Opposing Lastly |
| Content Type | Text |
| Resource Type | Chapter |