** Internet fraudSomething that Topshop have to protect against isfraud. Internet fraud/theft can occur if you respondto an unsolicited email. If the offer looks too good tobe true, it probably is! Identity theft can occur whena cybercrook illegally gets hold of and uses yourpersonal data.
** To protect against fraud, Topshop do not share your personal information with any other companies for marketing or commercial reasons. They also recommend that you memorise your password and also make it very hard to guess, meaning it’s harder for hackers to guess.
** PhishingPhishing is where somebody tricks you into givingthem your details, such as passwords and creditcard details. Phishing is an example of socialengineering techniques used to deceive users.Phishers are targeting the customers of banksand online payment services, which is whyphishing is such a big threat to online stores suchas Topshop.com.
** PharmingThis is where a hacker directs Internet users to abogus website that has an appearance almostidentical to the original. Pharming has become amajor concern to businesses hosting ecommerceand online banking websites. Pharming could bea huge threat to Topshop.com as a hacker couldmimic the site to Internet users and take moneyout of peoples account if they were to ordersomething.
** SpoofingA spoofing attack can occur at any time.Spoofing is where hackers track other peoplesinformation and pretend to be somebody else,e.g. a computer.
** Virus’sA virus is designed to make your pc breakdownand to spread further. They are mainly sent byemail, almost like SPAM, but they are much moredangerous. They are a threat to Topshop becausepeople can sign up to receive free weekly emailsfrom Topshop.com. If the site got hacked,thousands of customers would receive an emailthat could possible contain a virus from thehacker.
** What is legislation? Legislation can refer to laws or the process by which they are enacted in certain countries. Many countries have some form of legislature, which is a body dedicated primarily to passing and amending laws. It is there to illegalise unauthorised access to computer systems and to also stop the wrong people getting hold of other peoples information.