This document discusses information security as it relates to e-commerce applications. It covers several technical security attack methods that e-commerce applications can be vulnerable to, including financial frauds, spam, phishing, bots, DDoS attacks, brute force attacks, SQL injections, XSS, and Trojan horses. It also discusses vulnerability assessments, penetration testing stages and methods, and ISO/IEC 27001:2013 as an international standard for managing information security risks.