7. Server Bugs
Server bugs are often found and patched in a timely fashion that does not allow an attacker to
utilize the threat against an E-Commerce web site. However, system administrators are often
slow to implement the newest updates, thus allowing an attacker sufficient time to generate a
threat. With the millions of web servers in use around the world, thousands often go without
timely patches, leaving them vulnerable to an onslaught of server bugs and threats (Khusial,
McKegney, 2005).
8. Super User Exploits
Super user exploits allow attackers to gain control of a system as if they were an administrator.
They often use scripts to manipulate a database or a buffer overflow attack that cripples a
system, much like a Denial of Service attack for the purpose of gaining control of the system.
Users can create scripts that manipulate a browser into funneling information from sources, such
as databases.
Despite the various attacks on e-commerce, there are various defenses as (Khusial, McKegney,
2005) noted below.
a) Education
Your system is only as secure as the people who use it. If a consumer chooses a weak password,
or does not keep their password confidential, then an attacker can pose as that user. This is
significant if the compromised password belongs to an administrator of the system. In this case,
there is likely physical security involved because the administrator client may not be exposed
outside the firewall. Users need to use good judgment when giving out information, and be
educated about possible phishing schemes and other social engineering attacks.