Sunday, August 02, 2009

e-Commerce security: Attacks and preventive strategies - VI

Points the attacker can target

As mentioned, the vulnerability of a system exists at the entry and exit points within the system. Figure 3 shows an e-Commerce system with several points that the attacker can target:

  • Shopper
  • Shopper' computer
  • Network connection between shopper and Web site's server
  • Web site's server
  • Software vendor


Figure 3. Points the attacker can target 
Points the attacker can target 

These target points and their exploits are explored later in this article.

No comments: