This module helps students identify threats to the Crazy Commerce environment, identify the necessary security policies and tools. From there, students can assess how secure an eCommerce system is. Specifically, the module is divided into 10 chapters:
- Chapter 1: Overview of information security in e-commerce
- Chapter 2: Risk Management and Security Issues
- Chapter 3: Information Encryption and Authentication Techniques
- Chapter 4: E-signatures and e-authentication
- Chapter 5: User authentication in e-commerce
- Chapter 6: Access control of e-commerce system
- Chapter 7: Database Security and Cloud Storage
- Chapter 8: Firewalls and Intrusion Protection Systems
- Chapter 9: Protocols for Implementing Information Security
- Chapter 10: Some other security issues in e-commerce