Logo
Pattern

Discover published sets by community

Explore tens of thousands of sets crafted by our community.

E-Commerce Cybersecurity

14

Flashcards

0/14

Still learning
StarStarStarStar

Encryption

StarStarStarStar

Encryption is critical for protecting sensitive data in transit and at rest. Best practices include using strong encryption standards like AES and TLS for data and communications.

StarStarStarStar

Two-Factor Authentication (2FA)

StarStarStarStar

2FA adds an extra layer of security beyond just a password. Best practices include enabling 2FA on all user and admin accounts to mitigate risk of unauthorized access.

StarStarStarStar

Phishing

StarStarStarStar

Phishing is a tactic used to trick individuals into divulging sensitive information. Training employees to recognize and report phishing attempts is a best practice to prevent breaches.

StarStarStarStar

PCI DSS Compliance

StarStarStarStar

The Payment Card Industry Data Security Standard is mandatory for e-commerce sites handling card payments. Best practices include regular audits and maintaining compliance to protect cardholder data.

StarStarStarStar

Firewalls

StarStarStarStar

Firewalls are essential for protecting network perimeters and filtering out malicious traffic. Best practices include configuring firewalls to default-deny and maintaining updated rulesets.

StarStarStarStar

Intrusion Detection Systems (IDS)

StarStarStarStar

IDS monitor network traffic for suspicious activity and potential threats. Best practices include regular updates to the IDS signatures and immediate investigation of alerts.

StarStarStarStar

Secure Socket Layer (SSL) Certificates

StarStarStarStar

SSL certificates establish a secure connection between a web server and a browser. Best practices include using Extended Validation certificates and ensuring proper configuration and renewal.

StarStarStarStar

Data Backups

StarStarStarStar

Regular data backups can help an e-commerce business recover from data loss or a breach. Best practices include performing backups frequently and storing them securely off-site.

StarStarStarStar

Cross-site Scripting (XSS)

StarStarStarStar

XSS is a vulnerability that allows attackers to inject malicious scripts into webpages viewed by other users. Best practices to prevent XSS include validating and sanitizing all user input.

StarStarStarStar

SQL Injection

StarStarStarStar

SQL injection exploits vulnerabilities by inserting malicious SQL queries via input fields. Preventing this requires parameterized queries, input validation, and using ORM frameworks.

StarStarStarStar

Distributed Denial of Service (DDoS) Protection

StarStarStarStar

DDoS attacks overwhelm websites with traffic, rendering them inaccessible. Protection strategies include employing DDoS mitigation services and having scalable infrastructure.

StarStarStarStar

Password Policies

StarStarStarStar

Strong password policies ensure that users have robust credentials. Best practices include enforcing complex passwords, regular changes, and not using default or repetitive passwords.

StarStarStarStar

Security Patches

StarStarStarStar

Keeping software up-to-date with the latest security patches is crucial. Best practices include automating updates when possible and having a schedule for routinely checking for updates.

StarStarStarStar

Multi-layered Security

StarStarStarStar

A multi-layered security approach employs multiple defensive mechanisms to protect from breaches. Best practices include combining firewalls, antivirus software, and physical security measures.

Know
0
Still learning
Click to flip
Know
0
Logo

© Hypatia.Tech. 2024 All rights reserved.