- Activity diagram
- Sequence diagram
What are the different Vulnerable Points in an E-commerce Environment?
An e-commerce environment has many vulnerable points that attackers can get to the system. One of the points of attack is the channel of connection between the client and the ISP provider. The attacker can tap this point and make an attack on the connection. The attacker can intercept the communication between the user and the Internet Service Provider (ISP) and use security threats like spoofing to get data from the client. The client will lose money in the process. Another point of vulnerability is the ISP networks. There could be sniffer programs Continue reading...