CIVIL RIGHTS ACTS of 19646
Desmond Graham
Grantham University
HRM620 - Strategic HR
Dr Sara Willox
November 7, 2021
Abstract
The Civil Rights Act of 1964 was passed into law by President Lyndon B. Johnson to end segregation practices against blacks that were prevalent since the implementation of Jim Crows laws. The Act provides that no individual should face discrimination based on sex, race, or gender when accessing public services. Title VII of the Civil Rights Act of 1964 prohibits employers from engaging in discriminatory practices against employees because of the employee's gender, race, or sexuality. Noncompliance to the employee rights outlined in Title VII makes the employer liable for punitive and compensatory damages based on the number of employees. Title vii also applies to labor unions, employment agencies, and training programs, requiring them to refrain from engaging in discriminatory and segregation practices that could affect the individual’s employment status or bar them from specific employment opportunities. The implementation of Title VII has resulted in equal employment opportunities for persons of every race, gender, and religion. Even though there are still cases of age, gender, religion, and race discrimination at the workplace, employers and organizations have made progress in reducing discriminatory practices and embracing diversity in the workplace, which has resulted in increased diversity and productivity.
Keywords; The Civil Rights Act of 1964, Title VII, workplace discrimination, Equal Employment Opportunity Commission
Civil Rights Acts of 1964
Introduction
The Civil Rights Act of 1964 was signed into law by President Lyndon B. Johnson in 1964 to end segregation based on race, ethnicity, and religion in all public places such as churches, restaurants, hotels, theatres, and parks (Jennifer, 2015). It came when the black’s faced oppression since the inception of Jim Crow laws that promoted segregation. Title VII of the Civil Rights Act ended discrimination based on employers and labour unions based on race, gender, and religion. Title VII also implemented the Equal Employment Opportunity Commission to advocate for employees who have faced discrimination at the workplace. It prohibits employers from; failing to hire an individual or depriving him of some employment privileges and fair compensation due to his gender, race, or religion. (Timothy et al., 2019). Also, it prohibits employers from segregating their employees in a way that would inhibit them from getting a given position or affect their employment status due to the individual's race, gender, or religion. Title VII prohibits labour unions from denying an individual membership because of their race, religion, or gender or segregating its membership and causing an employer to engage in discriminatory practices against such individuals.
Consequences of violating Civil Rights Act of 1964 (Title VII)
Following are the consequences of ...
1. CIVIL RIGHTS ACTS of 19646
Desmond Graham
Grantham University
HRM620 - Strategic HR
Dr Sara Willox
November 7, 2021
Abstract
The Civil Rights Act of 1964 was passed into law by President
Lyndon B. Johnson to end segregation practices against blacks
that were prevalent since the implementation of Jim Crows
laws. The Act provides that no individual should face
discrimination based on sex, race, or gender when accessing
public services. Title VII of the Civil Rights Act of 1964
prohibits employers from engaging in discriminatory practices
against employees because of the employee's gender, race, or
sexuality. Noncompliance to the employee rights outlined in
Title VII makes the employer liable for punitive and
compensatory damages based on the number of employees. Title
vii also applies to labor unions, employment agencies, and
training programs, requiring them to refrain from engaging in
2. discriminatory and segregation practices that could affect the
individual’s employment status or bar them from specific
employment opportunities. The implementation of Title VII has
resulted in equal employment opportunities for persons of every
race, gender, and religion. Even though there are still cases of
age, gender, religion, and race discrimination at the workplace,
employers and organizations have made progress in reducing
discriminatory practices and embracing diversity in the
workplace, which has resulted in increased diversity and
productivity.
Keywords; The Civil Rights Act of 1964, Title VII, workplace
discrimination, Equal Employment Opportunity Commission
Civil Rights Acts of 1964
Introduction
The Civil Rights Act of 1964 was signed into law by President
Lyndon B. Johnson in 1964 to end segregation based on race,
ethnicity, and religion in all public places such as churches,
restaurants, hotels, theatres, and parks (Jennifer, 2015). It came
when the black’s faced oppression since the inception of Jim
Crow laws that promoted segregation. Title VII of the Civil
Rights Act ended discrimination based on employers and labour
unions based on race, gender, and religion. Title VII also
implemented the Equal Employment Opportunity Commission to
advocate for employees who have faced discrimination at the
workplace. It prohibits employers from; failing to hire an
individual or depriving him of some employment privileges and
fair compensation due to his gender, race, or religion. (Timothy
et al., 2019). Also, it prohibits employers from segregating their
employees in a way that would inhibit them from getting a
3. given position or affect their employment status due to the
individual's race, gender, or religion. Title VII prohibits labour
unions from denying an individual membership because of their
race, religion, or gender or segregating its membership and
causing an employer to engage in discriminatory practices
against such individuals.
Consequences of violating Civil Rights Act of 1964 (Title VII)
Following are the consequences of failing to adhere to the Title
VII of the Civil Rights Act of 1964.
· An employer who intentionally violates Title VII will be
subjected to a jury trial and be liable for compensatory and
punitive damages depending on the number of employees; an
employer with 15-100 workers pays a maximum of $50,000,101-
200 employees is subjected to a maximum of $100,000, while an
employer with over 500 workers will pay an amount not
exceeding $300,000(U.S.E.O.C, n.d).
· An employer found guilty of engaging in sex discrimination
will pay the aggrieved employee back pay to cater for the losses
that accrued to the employee due to the discriminatory act.
· An employment agency that violated the Title VII of the Civil
Rights Act of 1964 gets locked out of federal funding.
· Employers who violate title vii will be liable for the attorney's
fees, court expenses, and other expenses and damages as
prescribed in the Act (U.S.E.O.C,n,d).
The impact of Title VII of the Civil Rights Act on employees
and organizations
Employees
Title VII has changed the face of the workplace and how
employees are treated in their workplaces today. Employees can
now pursue their interests and receive fair compensation
without facing any discrimination based on gender, race, or
religion. Also, employees are hired and promoted based on their
academic qualifications and work experiences, increasing their
motivation, and becoming experts in their relevant fields.
Employers seized ton view employees through the lenses of sex,
4. religion, or gender and, instead, for what they are and their
capabilities at the workplace. This different perception has
enabled more Americans to be absorbed by organizations,
especially women, reducing the unemployment level, especially
among Hispanics and Black Americans.
Organizations
The implementation of Title VII of the Civil Rights Act of 1964
has seen employers embrace the role of diversity in the
workplace. Employing people from different races and ethnic
backgrounds increases creativity, productivity, and employee
engagement, increasing profits and employee retention (Robert
& Christopher, 2016).
References
Bringle, J. (2015). The Civil Rights Act of 1964
Glynn, T. P., Sullivan, C. A., & Arnow-Richman, R. (2019).
Employment law: Private ordering and its limitations
5. Lussier, R. N., & Achua, C. F. (2016). Leadership: Theory,
application & skill development.U.S. Equal Employment
Opportunity Commission. (n.d.). Title VII of the Civil Rights
Act of 1964 .
U.S. Equal Employment Opportunity Commission. Retrieved
November 4, 2021, from https://www.eeoc.gov/statutes/title-vii-
civil-rights-act-1964.
Electronic Commerce
Tenth Edition
Chapter 10
Electronic Commerce Security
1
1
1
1
Electronic Commerce, Tenth Edition
2
2
Learning Objectives
In this chapter, you will learn:
What security risks arise in online business and how to manage
them
How to create a security policy
How to implement security on Web client computers
How to implement security in the communication channels
between computers
6. 2
2
2
Learning Objectives (cont’d.)
How to implement security on Web server computers
What organizations promote computer, network, and Internet
security
Electronic Commerce, Tenth Edition
3
3
Electronic Commerce, Tenth Edition
4
Online Security Issues Overview
Early Internet days
Most popular use: electronic mail
Today’s higher stakes
Electronic mail, shopping, all types of financial transactions
Common worry of Web shoppers
Stolen credit card as it transmits over the Internet
More likely to be stolen from computer where stored
Chapter topic: security in the context of electronic commerce
4
5
Origins of Security on Interconnected Computer Systems
7. Data security measures taken by Roman Empire
Coded information to prevent enemies from reading secret war
and defense plans
Modern electronic security techniques
Defense Department wartime use
“Orange Book”: rules for mandatory access control
Business computers
Initially adopted military’s security methods
Today’s computing
Requires comprehensive computer security plans
Electronic Commerce, Tenth Edition
5
5
Electronic Commerce, Tenth Edition
6
Computer Security and Risk Management
Computer security
Asset protection from unauthorized access, use, alteration, and
destruction
Physical security
Includes tangible protection devices
Alarms, guards, fireproof doors, security fences, safes or vaults,
and bombproof buildings
Logical security
Asset protection using nonphysical means
6
7
8. Computer Security and Risk Management (cont’d.)
Threat
Any act or object posing danger to computer assets
Countermeasure
Procedure (physical or logical)
Recognizes, reduces, and eliminates threat
Extent and expense of countermeasures
Vary depending on asset importance
Electronic Commerce, Tenth Edition
7
7
8
Computer Security and Risk Management (cont’d.)
Risk management model
Four general organizational actions
Impact (cost) and probability of physical threat
Also applicable for protecting Internet and electronic commerce
assets from physical and electronic threats
Electronic threat examples:
Impostors, eavesdroppers, thieves
Eavesdropper (person or device)
Listen in on and copy Internet transmissions
Electronic Commerce, Tenth Edition
8
8
Electronic Commerce, Tenth Edition
9
10. Integrity
Preventing unauthorized data modification
Man-in-the-middle exploit
E-mail message intercepted; contents changed before forwarded
to original destination
Necessity
Preventing data delays or denials (removal)
Delaying message or completely destroying it
11
Establishing a Security Policy
Security policy
Assets to protect and why, protection responsibility, acceptable
and unacceptable behaviors
Physical security, network security, access authorizations, virus
protection, disaster recovery
Military policy: stresses separation of multiple levels of
security
Corporate information classifications
Public
Company confidential
Electronic Commerce, Tenth Edition
12
12
Electronic Commerce, Tenth Edition
13
Establishing a Security Policy (cont’d.)
Steps to create security policy
Determine assets to protect from threats
12. Integrated security
Having all security measures work together
Prevents unauthorized disclosure, destruction, modification of
assets
15
Electronic Commerce, Tenth Edition
16
Establishing a Security Policy (cont’d.)
Security policy points
Authentication: Who is trying to access site?
Access control: Who is allowed to log on to and access site?
Secrecy: Who is permitted to view selected information?
Data integrity: Who is allowed to change data?
Audit: Who or what causes specific events to occur, and when?
16
Electronic Commerce, Tenth Edition
17
Security for Client Computers
Client computers
Must be protected from threats
Threats
Originate in software and downloaded data
Malevolent server site masquerades as legitimate Web site
Chapter topics organized to follow the
transaction-processing flow
Beginning with consumer
Ending with Web server at electronic commerce site
13. 17
Electronic Commerce, Tenth Edition
18
Cookies and Web Bugs
Internet connection between Web clients and servers
Stateless connection
Each information transmission is independent
No continuous connection (open session) maintained between
any client and server
Cookies
Small text files Web servers place on Web client
Identify returning visitors
Allow continuing open session
18
Electronic Commerce, Tenth Edition
19
Cookies and Web Bugs (cont’d.)
Time duration cookie categories
Session cookies: exist until client connection ends
Persistent cookies: remain indefinitely
Electronic commerce sites use both
Cookie sources
First-party cookies
Web server site places them on client computer
Third-party cookies
Different Web site places them on client computer
14. 19
Electronic Commerce, Tenth Edition
20
Cookies and Web Bugs (cont’d.)
Disable cookies entirely
Complete cookie protection
Problem
Useful cookies blocked (along with others)
Full site resources not available
Web browser cookie management functions
Refuse only third-party cookies
Review each cookie before accepted
Provided by most Web browsers
20
Electronic Commerce, Tenth Edition
21
FIGURE 10-3 Mozilla Firefox dialog box for managing stored
cookies
Click to edit Master text styles
Second level
Third level
Fourth level
Fifth level
21
Electronic Commerce, Tenth Edition
22
15. Cookies and Web Bugs (cont’d.)
Web bug
Tiny graphic that third-party Web site places on another site’s
Web page
Purpose
Provide a way for a third-party site to place cookie on visitor’s
computer
Internet advertising community:
Calls Web bugs “clear GIFs” or “1-by-1 GIFs”
Graphics created in GIF format
Color value of “transparent,” small as 1 pixel by 1 pixel
22
Electronic Commerce, Tenth Edition
23
Active Content
Active content
Programs embedded transparently in Web pages
Cause action to occur
E-commerce example
Place items into shopping cart; compute tax and costs
Advantages
Extends HTML functionality
Moves data processing chores to client computer
Disadvantages
Can damage client computer
23
Electronic Commerce, Tenth Edition
24
16. Active Content (cont’d.)
Cookies, Java applets, JavaScript, VBScript, ActiveX controls,
graphics, Web browser plug-ins,
e-mail attachments
Scripting languages: provide executable script
Examples: JavaScript and VBScript
Applet: small application program
Typically runs within Web browser
Some browsers include tools limiting applets’ actions
Active content modules
Embedded in Web pages (invisible)
24
Electronic Commerce, Tenth Edition
25
FIGURE 10-4 Advanced JavaScript settings in Mozilla Firefox
Click to edit Master text styles
Second level
Third level
Fourth level
Fifth level
25
Electronic Commerce, Tenth Edition
26
Active Content (cont’d.)
Crackers: embed malicious active content
Trojan horse
Program hidden inside another program or Web page
17. Masking true purpose
May result in secrecy and integrity violations
Zombie (Trojan horse)
Secretly takes over another computer
Launches attacks on other computers
Botnet (robotic network, zombie farm)
All controlled computers act as an attacking unit
26
Electronic Commerce, Tenth Edition
27
Java Applets
Java programming language
Developed by Sun Microsystems
Widespread use in Web pages: active content
Java: platform-independent programming language
Provides Web page active content
Server sends applets with client-requested pages
Most cases: operation visible to visitor
Possibility: functions not noticed by visitor
27
Electronic Commerce, Tenth Edition
28
Java Applets (cont’d.)
Advantages
Adds functionality to business application’s functionality;
relieves server-side programs
Disadvantage
Possible security violations (Trojan horse, zombie)
18. 28
Java Applets (cont’d.)
Java sandbox
Confines Java applet actions to set of rules defined by security
model
Rules apply to all untrusted Java applets
Not established as secure
Java applets running within sandbox constraint
Does not allow full client system access
Prevents secrecy (disclosure) and integrity (deletion or
modification) violations
Electronic Commerce, Tenth Edition
29
29
Electronic Commerce, Tenth Edition
30
JavaScript
JavaScript
Scripting language developed by Netscape
Enables Web page designers to build active content
Based loosely on Sun’s Java programming language
Can be used for attacks
Cannot commence execution on its own
User must start ill-intentioned JavaScript program
30
19. Electronic Commerce, Tenth Edition
31
ActiveX Controls
ActiveX control
Objects containing programs and properties Web designers
place on Web pages
Component construction
Many different programming languages
Common: C++ and Visual Basic
Run on Windows operating systems computers
Executed on client computer like any other program
31
Electronic Commerce, Tenth Edition
32
ActiveX Controls (cont’d.)
Comprehensive ActiveX controls list
ActiveX page at Download.com
Security danger
Execute like other client computer programs
Have access to full system resources
Cause secrecy, integrity, and necessity violations
Actions cannot be halted once started
Web browsers
Provide notice of Active-X download or install
32
Electronic Commerce, Tenth Edition
33
20. FIGURE 10-5 ActiveX control download warning dialog box in
Internet Explorer
33
Electronic Commerce, Tenth Edition
34
Graphics and Plug-Ins
Graphics, browser plug-ins, and e-mail attachments can harbor
executable content
Graphic: embedded code can harm client computer
Browser plug-ins (programs)
Enhance browser capabilities
Popular plug-ins: Adobe Flash Player, Apple’s QuickTime
Player, Microsoft Silverlight, RealNetworks’ RealPlayer
Can pose security threats
1999 RealPlayer plug-in
Plug-ins executing commands buried within media
34
Electronic Commerce, Tenth Edition
35
Viruses, Worms, and Antivirus Software
Programs display e-mail attachments by automatically executing
associated programs
Macro viruses within attached files can cause damage
Virus: software
Attaches itself to another program
Causes damage when host program activated
Worm: virus
21. Replicates itself on computers it infects
Spreads quickly through the Internet
Macro virus
Small program (macro) embedded in file
35
Electronic Commerce, Tenth Edition
36
Viruses, Worms, and Antivirus Software (cont’d.)
ILOVEYOU virus (“love bug”)
Spread with amazing speed
Infected computers and clogged e-mail systems
Replicated itself explosively through Outlook e-mail
Caused other harm
2001 Code Red and Nimda: virus-worm combinations
Multivector virus: entered computer system in several different
ways (vectors)
2002 and 2003: new virus-worm combinations
Example: Bugbear
36
Electronic Commerce, Tenth Edition
37
Viruses, Worms, and Antivirus Software (cont’d.)
Antivirus software
Detects viruses and worms
Either deletes or isolates them on client computer
2005 and 2006 Zotob
New breed of Trojan horse-worm combination
2007: Storm virus
22. 2008 and continuing into 2009: Conflicker
2009 and 2010: URLzone and Clampi
New viruses designed specifically to hijack users’ online
banking sessions
37
Viruses, Worms, and Antivirus Software (cont’d.)
2010: new Trojan horse-worm combination attack
Spread through a computer operating system
Designed to target industrial equipment
German industrial giant Siemens’ control systems
2011: Zeus and SpyEye combined
Targeted bank account information
Not visible in Microsoft Windows Task Manager
Intercept credit card or online banking data entered in Web
browser
Electronic Commerce, Tenth Edition
38
38
Electronic Commerce, Tenth Edition
39
FIGURE 10-6 Major viruses, worms, and Trojan horses
Click to edit Master text styles
Second level
Third level
Fourth level
Fifth level
23. 39
40
Electronic Commerce, Tenth Edition
40
FIGURE 10-6 Major viruses, worms, and Trojan horses
(continued)
40
Electronic Commerce, Tenth Edition
41
FIGURE 10-6 Major viruses, worms, and Trojan horses
(continued)
Click to edit Master text styles
Second level
Third level
Fourth level
Fifth level
41
Electronic Commerce, Tenth Edition
42
24. FIGURE 10-6 Major viruses, worms, and Trojan horses
(continued)
42
Electronic Commerce, Tenth Edition
43
FIGURE 10-6 Major viruses, worms, and Trojan horses
(continued)
43
Electronic Commerce, Tenth Edition
44
FIGURE 10-6 Major viruses, worms, and Trojan horses
(continued)
44
Viruses, Worms, and Antivirus Software (cont’d.)
Companies that track viruses, sell antivirus software, provide
virus descriptions on Web sites
Symantec (Symantec Security Response)
McAfee (McAfee Virus Information)
Data files must be updated regularly
Recognize and eliminate newest viruses
Some Web e-mail systems:
26. Second level
Third level
Fourth level
Fifth level
47
Electronic Commerce, Tenth Edition
48
Digital Certificates (cont’d.)
Digital certificate for software:
Assurance software was created by specific company
Does not attest to quality of software
Certification authority (CA)
Issues digital certificates to organizations, individuals
Digital certificates cannot be forged easily
Six main elements: owner’s identifying information, owner’s
public key, dates certificate is valid, serial number, issuer
name, issuer digital signature
48
Electronic Commerce, Tenth Edition
49
Digital Certificates (cont’d.)
Key
Number: usually long binary number
Used with encryption algorithm
“Lock” message characters being protected
Longer keys provide better protection
Identification requirements vary
Driver’s license, notarized form, fingerprints
Companies offering CA services
27. Thawte, VeriSign, Comodo, DigiCert, Entrust, GeoTrust,
RapidSSL.com
49
Electronic Commerce, Tenth Edition
50
Digital Certificates (cont’d.)
Secure Sockets Layer-Extended Validation
(SSL-EV) digital certificate
Issued after more extensive verification confirmed
Annual fees
$200 to more than $1500
Digital certificates expire after period of time
Provides protection (users and businesses)
Must submit credentials for reevaluation periodically
50
51
FIGURE 10-8 Internet Explorer address window display for an
SSL-EV Web site
Electronic Commerce, Tenth Edition
51
51
Electronic Commerce, Tenth Edition
52
28. Steganography
Steganography
Hiding information within another piece of information
Can be used for malicious purposes
Hiding encrypted file within another file
Casual observer cannot detect anything of importance in
container file
Two-step process
Encrypting file protects it from being read
Steganography makes it invisible
Al Qaeda used steganography to hide attack orders
52
Electronic Commerce, Tenth Edition
53
Physical Security for Clients
Client computers
Control important business functions
Same physical security as early systems
New physical security technologies
Fingerprint readers (less than $100)
Stronger protection than password approaches
Biometric security device
Identification using element of person’s biological makeup
Writing pads, eye scanners, palm reading scanners, reading back
of hand vein pattern
53
Client Security for Mobile Devices
Security measures
29. Access password
Remote wipe: clears all personal data
Can be added as an app
Capability through corporate e-mail synchronization
Antivirus software
Rogue apps: contain malware or collect information and forward
to perpetrators
Apple App Store tests apps before authorizing sales
Android Market does less extensive testing
Users should not rush to install latest app
Electronic Commerce, Tenth Edition
54
54
Electronic Commerce, Tenth Edition
55
Communication Channel Security
Internet
Not designed to be secure
Designed to provide redundancy
Remains unchanged from original insecure state
Message traveling on the Internet
Subject to secrecy, integrity, and necessity threats
55
Electronic Commerce, Tenth Edition
56
30. Secrecy Threats
Secrecy
Prevention of unauthorized information disclosure
Technical issue
Requiring sophisticated physical and logical mechanisms
Privacy
Protection of individual rights to nondisclosure
Legal matter
56
Secrecy Threats (cont’d.)
E-mail message
Secrecy violations protected using encryption
Protects outgoing messages
Privacy issues address whether supervisors are permitted to read
employees’ messages randomly
Electronic commerce threat
Sensitive or personal information theft
Sniffer programs
Record information passing through computer or router
Electronic Commerce, Tenth Edition
57
57
Electronic Commerce, Tenth Edition
58
Secrecy Threats (cont’d.)
Electronic commerce threat (cont’d.)
Backdoor: electronic holes
Left open accidentally or intentionally
31. Content exposed to secrecy threats
Example: Cart32 shopping cart program backdoor
Stolen corporate information
Eavesdropper example
Web users continually reveal information
Secrecy breach
Possible solution: anonymous Web surfing
58
Electronic Commerce, Tenth Edition
59
Integrity Threats
Also known as active wiretapping
Unauthorized party alters message information stream
Integrity violation example
Cybervandalism
Electronic defacing of Web site
Masquerading (spoofing)
Pretending to be someone else
Fake Web site representing itself as original
59
Electronic Commerce, Tenth Edition
60
Integrity Threats (cont’d.)
Domain name servers (DNSs)
Internet computers maintaining directories
Linking domain names to IP addresses
Perpetrators use software security hole
Substitute their Web site address in place of real one
32. Spoofs Web site visitors
Phishing expeditions
Capture confidential customer information
Common victims
Online banking, payment system users
60
Electronic Commerce, Tenth Edition
61
Necessity Threats
Also known as delay, denial, denial-of-service (DoS) attack
Disrupt or deny normal computer processing
Intolerably slow-speed computer processing
Renders service unusable or unattractive
Distributed denial-of-service (DDoS) attack
Launch simultaneous attack on a Web site via botnets
DoS attacks
Remove information altogether
Delete transmission or file information
61
Electronic Commerce, Tenth Edition
62
Necessity Threats (cont’d.)
Denial attack examples:
Quicken accounting program diverted money to perpetrator’s
bank account
High-profile electronic commerce company received flood of
data packets
Overwhelmed sites’ servers
33. Choked off legitimate customers’ access
62
Electronic Commerce, Tenth Edition
63
Threats to the Physical Security of Internet Communications
Channels
Internet’s packet-based network design:
Precludes it from being shut down
By attack on single communications link
Individual user’s Internet service can be interrupted
Destruction of user’s Internet link
Larger companies, organizations
Use more than one link to main Internet backbone
63
Electronic Commerce, Tenth Edition
64
Threats to Wireless Networks
Wireless Encryption Protocol (WEP)
Rule set for encrypting transmissions from the wireless devices
to the wireless access points (WAPs)
Wardrivers
Attackers drive around in cars
Search for accessible networks
Warchalking
Place chalk mark on building
Identifies easily entered wireless network nearby
Web sites include wireless access locations maps
34. 64
Electronic Commerce, Tenth Edition
65
Threats to Wireless Networks (cont’d.)
Preventing attacks by wardrivers
Turn on WEP
Change default login and password settings
Example
Best Buy wireless point-of-sale (POS)
Failed to enable WEP
Customer launched sniffer program
Intercepted data from POS terminals
65
Electronic Commerce, Tenth Edition
66
Encryption
Solution
s
Encryption: coding information using mathematically based
program, secret key
Cryptography: science studying encryption
Science of creating messages only sender and receiver can read