Length: Minimum of 400 words Students will be required to create 1 new thread, and provide substantive comments on at least 3 threads created by other students. Make sure to explain and backup your r

Ravinder Reddy Peddakapu 

Top of Form

These days various types of security threats are reporting the entire world. In this process, public internet traffic the customers and also the clients in all the business organizations transferring any services and also products completely include in financial transactions. In processing these transactions the threat agents will scam the entire transactions in various important ways. In financial industries, the important information or data of the customer or client will be stolen by using any website or any of the mobile applications. This method is called as Daniel of service attacks. It is shortly referred to as DOS. This process will be done completely by using a website and also an application only with low security. In dealing with this process the employees will face more vulnerabilities. Giving security for the customer data or information and also to their transactions is very important (Kadhem¸ 2018).

 A higher amount of the threats occurred then it results in major harms. If the harms will be less than the inspiration is also low. In this entire world, various important nations will be acknowledged. In this process, threat agents consist of more number of important reasons to attack any type of computer system. In this process of AppMaker, the important software that consists in every computer system is used to store more amount of sensitive information and also data which includes the important information related to financial industries. The very professional hacker must consist of their own perspectives and they require their own sills for hacking. Some of the important incentives will include in this process which contains the stolen of important information.

Disruption of services and also some of the political motivations are very necessary for this method. Professional hackers will receive a high amount of money to hack the major important business information in the business industries. By these hacking methods, the employees and also the business leaders will face major issues because of these threats and also vulnerabilities. In some situations, these threat agents will completely compromise only for money. The important situation that they will compromise in payment issue is only in the financial industries. Such that the hackers will make this AppMaker one of the most important targets. In financial transactions, the customers and also clients will face major issues such as security threats and vulnerabilities. There are some of the system-level targets in which they will differ from one another, which exist only in storage and also in raw machines to the important personal information (Tobing, Pardede, Panjaitan & Sianturi¸ 2016).

 

References

Kadhem, B. H. A. (2018). The Effect of Smartphone Application (App) On Business Transactions Flow of Retail Business: A Scene from Bahrain (Doctoral dissertation, Swiss Business School).

Tobing, R. D. H., Pardede, L. V. D., Panjaitan, I. S., & Sianturi, E. Y. (2016, August). Customizable commerce mobile application. In 2016 3rd International Conference on Computer and Information Sciences (ICCOINS) (pp. 174-178). IEEE.

Chandan Kumar 


Top of Form

The AppMaker is connected to the internet, meaning that it is open to public traffic. This open-ended traffic attracts many attackers; thus, web applications created through AppMaker are subject to continuous attacks. Most of the attacker's primary goal is to gain monetary benefits by attacking the security system of the organization. Hence, they are always trying to find out the weaknesses in the system through which they can achieve their goal. (Schoenfield, 2015). The threat agents which are financially motivated will be easily influenced by the customer-facing store that deals with financial transactions. The denial of service (DoS) attacks is one such type of attack where interruptions of the services are caused to the system's intended users. They are designed to halt the system and deny access to its legitimate users (Mohd Ramly et al., 2017).

When coupled with extortion, they can generate substantial financial loss to the organization and monetary benefits for the attackers. When not paid enough attention dealing with the financial transaction, the products can be purchased with little to no price, and such products can be sold again to thieves with warranty replacement by making 100% profit (Schoenfield, 2015). Even the personal details of the customers can be sold to identity thieves using Cross-site scripting (XSS). Such frauds always result in the financial advantage of the attackers at the cost of a person's disadvantage or loss. SQL injections are the most common types of attacks used by cybercriminals to get unauthorized access to sensitive information such as credit card. The web applications doing financial transactions are regularly targeted in such SQL injections attacks because the chances to find financial information such as credit card details are always higher when compared to non-financial applications (Mohd Ramly et al., 2017).

     The evergrowing technologies use in such customer-facing online store bring competitive advantage, but they also carry additional risks. When not given sufficient consideration in running scans for the vulnerabilities related to technologies, such web application becomes an attraction for cybercriminals because of their financial nature, and it's easy to earn monetary rewards in case of successful attacks. Cybercriminals will be fulfilled upon obtaining the financial award from the organization, its customers, or its systems. (Schoenfield, 2015). The occurrence of the event of an attack is less if the firm has its own AppMaker web application. This threat will severely affect the reputation or goodwill of the company as it tries to steal customer data. As a result, customers will lose confidence in the company. Determining the attacks in advance will help the firm decide on the future course of action to mitigate the effects of the threats on the company's structure. Identification and a clear understanding of the risks are essential to overcome the challenges. Hence, they are easy to get influenced by web applications that deal with financial transactions because such applications can prove the fastest payoff. When it comes to securing the web, applications involved in financial transactions, it becomes inevitable to pay at most attention to every minute detail while designing the security architecture (Mohd Ramly et al., 2017).

References

Mohd Ramly, Suhaily & Omar, Nor Asiah. (2017). Exploring the influence of store attributes on customer experience and customer engagement. International Journal of Retail & Distribution Management. 10.1108/IJRDM-04-2016-0049.

Schoenfield, B. S. (2015). Securing systems: Applied security architecture and threat models. CRC Press.

Bottom of Form




Sai Kumar Rapul 


Top of Form

AppMaker manages the list of vulnerabilities against which it processes customer transactions to ensure that customers are protected. The threat-agent-registration-spy mechanism only allows agents with user-traffic-initiated attributes like an email address or username to register as a threat agent. So, if the initial lookup operation looks at the user's inbox in the Google Play Store, it cannot determine that the user is a paying customer of the Service Provider because that does not make sense (MacDowell et al., 2017). The primary goal for any random attacker is to compromise the user session, and not the database. The attacker may also look for vulnerable web servers, which, however, are almost always likely to be and running. To help us understand the similarities between them, they have created a modified version of our AppMaker implementation that acts as a honeypot, vulnerable to both SQL Injection and SQL Splitting: the poor fox has fallen (MacDowell et al., 2017).

This attack scenario where the selected customers have money in the AppMaker, but they do not want to discourage anyone from conducting more sophisticated attacks. What they will do instead is try to maintain as low a detection threshold as possible. It means that the AppMaker will ignore all applications of this type unless they are doing something nefarious. However, in a real-world attack scenario, the AppMaker would likely respond to a host application for a particular set of stolen coins. In that case, they would need to implement all the logic for this attack outside (MacDowell et al., 2017).

However, most modern customers employ a large number of separate application environments that, we suspect, will not be reachable by AppMaker. A critical vulnerability that only users with individual permissions can access stole. In this case, it could use to take over the application. AppMaker is a business service that use to host a customer-facing web application and process financial transactions. It is vulnerable because of the business logic in the web application: it is using a payment gateway API for payment processing. The payment gateway API allows for processing transactions in a centralized environment, as opposed to having the user pay the fee in a local environment where they are only interested in checking the amount (Schoenfield, 2015).

This particular instance of the Appmaker implements a customer-facing store that processes financial transactions. It is an issue that does not involve anything a consumer would do. Instead, there are three steps in the AppMaker transaction that are considered critical for successful operation. The Accepted payment package sends to a destination store. Once the package has successfully received, the Payment Context invokes to process the payment. Once the application has validated and accepted the payment, the destination store acts on the accepted payment as though it was an actual payment to that destination store, so the balance of that payment will appear on the address book of a customer (Schoenfield, 2015).

References

MacDowell, P., Ralph, R., & Ng, D. (2017, October). App Making for Pro-Social and Environmental Change at an Equity-Oriented Makeathon. In Proceedings of the 7th Annual Conference on Creativity and Fabrication in Education (pp. 1-8).

Schoenfield, B. S. (2015). Securing systems: Applied security architecture and threat models. CRC Press.

Bottom of Form


Bottom of Form