BOC reduces the risk of payment of authenticators and identity authenticators by One-Time-Pad system as a vital two-factor authentication. Multiple attempt to input the log in password will cause the bank account locked. BOC requires the used download and install the security software to against the outside hacker or worms stealing. In 2013, the computer system of the Bank of China Shanghai Branch was attacked by unknown hackers as a result the confidential information and password leakage which give the hacker ten thousand copies of customer data (Niu, 2013). This indicates that although BOC has a protect system for defend the vulnerabilities, it is still lack of technical to avoid the hacking, malware vectors and malware payloads. BOC is making a security notice to help the user account became safety. The maintain system of the customer service keeps user away from the fake website (BOC, n.d.). BOC exists safeguards and sets up an anti-virus software by strong encryption. In the bank database it stored a huge number of user’s personal information such as the address and phone number. This system keeps the data security and makes a three-dimension model firewall to shield the personal …show more content…
All the payment in the online shop are transacted through the internet which means it is more sensitive and easy become the hacker attacking target. Once there was a cyber attack on eBay database. This made the hackers can access to get the user’s personal information and password. The eBay has indicated that the database was safe because the Paypal information were in the another individual database (eBay, n.d.). Although it did not cause the Paypal information disclosure, the experts have warned about the eBay account holders which the hacker still can access their data in order to commit an identity fraud. The online bank resources might be misused as accessing unauthorized data from the database like the credit card information or password. To install malicious software into user’s computer and theft personal data files or make data alteration on purpose. The hack may also use the information to spread SCAM, SPAM, malicious code (Hau, 2003; Clarke, 2016). To protect such a huge number of user’s information, eBay has its own control processes which prevent third parties from tampering feedback. The safe harbor rule is required to avoid the fraud. It uses ID verify to authenticate the Paypal services. To reduce the fake risk, the seller will get the paid only after the user accepted the items. When user changing the devices, it requires a confirmed mobile text, secret question