Question 4 You are preparing to host a website that you have built. The website
ID: 3694781 • Letter: Q
Question
Question 4
You are preparing to host a website that you have built. The website contains several types of web forms for receiving input from the end-user and uses a back-end database to store the user’s information. The web-site contains sensitive financial information that may be of value to an attacker so there could be motivation to attack your website. Describe the layers of security controls necessary for protecting your website and complying with Gramm-Leach-Bliley Privacy requirements to safeguard customer information and maintain a comprehensive information security program. Remember that layers of security controls involve people, processes and technology.
Explanation / Answer
They are different ways to protect your web site from Hacking and fraud:
Hackers are stealing card information and sensitive information from your web sites. To protect (and reassure) your customers, it's imperative to know how to protect your ebusiness and your sensitive customer data.
We are providing different techniques to protect your website from hackers and fraud
1) Choose a secure platform for your website
Put your ecommerce site on a platform that uses a sophisticated object-orientated programming language.
2) Use a secure connection for online checkout--and make sure you are PCI compliant.
It can be a leap of faith for customers to trust that your ecommerce site is safe, particularly when Web-based attacks increased 30 percent last year. So it's important to use SSL certificates "to authenticate the identity of your business and encrypt the data in transit,"
3) Don't store sensitive data
There is no reason to store thousands of records on your customers, especially credit card numbers, expiration dates and CVV2 [card verification value] codes," says Chris Pogue, director of Digital Forensics and Incident Response at Trustwave.
4) Employ an address and secure verification system
Enable an address verification system (AVS) and require
5) Require strong passwords.
While it is the responsibility of the retailer to keep customer information safe on the back-end, you can help customers help themselves by requiring a minimum number of characters and the use of symbols or numbers,
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.