SlideShare ist ein Scribd-Unternehmen logo
1 von 22
E-Commerce Security
The E-Commerce Security
Environment
 For most law-abiding citizens, the Internet holds
    the promise of a huge and convenient global
    marketplace
   For criminals, the Internet has created entirely
    new – and profitable – ways to steal from the
    more than one billion Internet consumers
    worldwide
   From products to services to cash to information,
    it’s all there for the taking on the Internet
   It’s also less risky to steal online
   For example, rather than rob a bank in person,
    the Internet makes it possible to rob people
The Scope of the Problem
 Cybercrime is becoming a more significant
  problem for both organizations and consumers
 Bot networks, DDoS attacks, Trojans, phishing,
  data theft, identify theft, credit card fraud, and
  spyware are just some of the threats that are
  making daily headlines
 Even social networking sites have had security
  breaches
 For example, an individual hacked into Britney
  Spears’ Twitter account and began sending
  messages saying the singer had died
The Scope of the Problem (cont.)
 One source of cybercrime information is the
  Internet Crime Complaint Center (IC3)
 In 2010, the IC3 processed more than 303,000
  Internet crime complaints and it was estimated
  that in 2009 the total dollar loss for all referred
  crimes was $559 million
 In the past, auction fraud constituted over 70% of
  complaints, but in 2010 it was only 10%,
  displaced by non payment/delivery (21%) and
  identity theft (16%)
 The Computer Security Institute’s annual
  Computer Crime and Security Survey is another
  source of information
Types of
Attacks
Against
Compute
r
Systems
(Figure)
The Underground Economy Marketplace:
The Value of Stolen Information
 Criminals who steal information on the Internet do
  not always use this information themselves, but
  instead derive value by selling the information to
  others
 Some recently observed prices for stolen
  information, which typically vary depending on the
  quantity being purchased
 Not every cybercriminal is necessary after money
 In some cases, such criminals aim to deface,
  vandalize, and/or disrupt a Web site, rather than
  actually steal goods or services
What is Good E-Commerce
Security?
 What is a secure commercial transaction?
 Anytime you go into a marketplace you take risks,
  including the loss of privacy
 E-commerce merchants and consumers face
  many of the same risks as participants in
  traditional commerce, although in a new digital
  environment
 Reducing risks in e-commerce is a complex
  process that involves new technologies,
  organizational policies and procedures, and new
  laws and industry standards that empower law
  enforcement officials to investigate and prosecute
  offenders
The E-Commerce Security
Environment
The Tension Between Security
and Other Values
 Can there be too much security? The answer is
  yes.
 Computer security adds overhead and expense
  to business operations
 Expanding computer security also has other
  downsides:
   Makes systems more difficult to use
   Slows down processors
   Increases data storage demands
   May reduce individual’s abilities to remain
   anonymous
Security Threats in the E-
Commerce Environment
 From a technological perspective, there are three
  key points of vulnerability when dealing with e-
  commerce: the client, the server, and the
  communications pipeline
 Figure 5.4 illustrates some of the things that can
  go wrong at each major vulnerability point in the
  transaction
A Typical E-Commerce
Transaction
Vulnerable Points in an E-
Commerce Transaction
Common E-Commerce Security
Threats
 Some of the most common and most damaging forms
 of security threats to e-commerce consumers and site
 operators include:
   Malicious code (malware) – virus, worm, Trojan horse,
      bots, etc.
     Unwanted programs (spyware)
     Phishing and identify theft – social engineering
     Hacking and cybervandalism
     Credit card fraud/theft
     Spoofing (pharming) and spam (junk) websites
     Denial of service (DoS) attacks
     Insider attacks
     Poorly designed server and client software
 Social networks and mobile devices greatly expand
 the security threats to organizations and individuals
Technology Solutions
 It might seem like there is not much that can be
  done about the onslaught of security breaches on
  the Internet
 But in fact a great deal of progress has been
  made by private security firms, corporate and
  home users, network administrators, technology
  firms, and government agencies
 Two lines of defense include:
   Technology solutions
   Policy solutions
Encryption
 Encryption is the process of transforming plain
  text or data into cipher text that cannot be read by
  anyone other than the sender and the receiver
 The purpose of encryption is to secure stored
  information and to secure information
  transmission
 One early encryption method was symmetric key
  encryption where both the sender and the
  receiver use the same key to encrypt and decrypt
  the message
 They had to send the key to each other over
  some communications media or in person
Public Key Cryptography
Limitations to Encryption
Solutions
 All forms of encryption have limitations
 It is not effective against insiders
 Protecting private keys may also be difficult
  because they are stored on insecure desktop and
  laptop computers
 Additional technology solutions exist for securing
  channels of communications, networks, and
  servers/clients
Communication Channel, Network,
 and Server/Client Security
 Technologies
 Communication channel security technologies:
   Secure Sockets Layer (SSL)
   Virtual Private Networks (VPNs)
 Network protection technologies:
   Firewalls
   Proxy servers
 Server/client protection technologies
   Operating system security enhancements
   Anti-virus software
Management Policies, Business
Procedures, and Public Laws
 US businesses and government agencies spend
  about 14% of their information technology
  budgets on security hardware, software, and
  services (about $35 billion in 2010)
 However, most CEOs and CIOs of existing e-
  commerce operations believe that technology is
  not the sole answer to managing the risk of e-
  commerce
 An e-commerce security plan would include a risk
  assessment, development of a security policy,
  implementation plan, creation of a security
  organization, and a security audit
 Implementation may involve expanded forms of
The Roles of Laws and Public
Policy
 The public policy environment today is very
  different fro the early days of e-commerce
 The net result is that the Internet is no longer an
  ungoverned, unsupervised, self-controlled
  technology juggernaut
 It is also apparent that legal and public policy
  solutions also need to be enacted globally
Government Policies and Controls on
Encryption Software
 An interesting example of the difficulties involved
  in enhancing security is the case of encryption
  software distribution
 Governments have required to restrict availability
  and export of encryption systems as a means of
  detecting and preventing crime and terrorism
 On one hand, restricting global distribution of
  advanced encryption systems may reduce the
  likelihood that they may be cracked
 But it also reduces global Internet security if
  different countries have different levels of
  protection

Weitere ähnliche Inhalte

Was ist angesagt?

Privacy and Security Issues in E-Commerce
Privacy and Security Issues in E-Commerce  Privacy and Security Issues in E-Commerce
Privacy and Security Issues in E-Commerce Titas Ahmed
 
E commerce security
E commerce securityE commerce security
E commerce securityShakti Singh
 
C8-Ethical, Social, & Political Issues in Ecommerce.PPT
C8-Ethical, Social, & Political Issues in Ecommerce.PPTC8-Ethical, Social, & Political Issues in Ecommerce.PPT
C8-Ethical, Social, & Political Issues in Ecommerce.PPTSyazwaniYa
 
Ch03 laudon traver_ppt (e-commerce)
Ch03 laudon traver_ppt (e-commerce)Ch03 laudon traver_ppt (e-commerce)
Ch03 laudon traver_ppt (e-commerce)Beacon House
 
Lecture 6 e-cmmerce , e commerce infrastructure,the internet -chapter 3
Lecture 6  e-cmmerce ,  e commerce infrastructure,the internet -chapter 3Lecture 6  e-cmmerce ,  e commerce infrastructure,the internet -chapter 3
Lecture 6 e-cmmerce , e commerce infrastructure,the internet -chapter 3Habib Ullah Qamar
 
Cybersecurity Issues and Challenges
Cybersecurity Issues and ChallengesCybersecurity Issues and Challenges
Cybersecurity Issues and ChallengesTam Nguyen
 
E-commerce Security and Payment Systems.pptx
E-commerce Security and Payment Systems.pptxE-commerce Security and Payment Systems.pptx
E-commerce Security and Payment Systems.pptxMuhammadKashif584561
 
Security issues in e commerce
Security issues in e commerceSecurity issues in e commerce
Security issues in e commercesadaf tst
 
information security technology
information security technologyinformation security technology
information security technologygarimasagar
 
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONSE-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONSrausdeen anfas
 
Client server network threat
Client server network threatClient server network threat
Client server network threatRaj vardhan
 
Presentation on online shopping site using java
Presentation on online shopping site using javaPresentation on online shopping site using java
Presentation on online shopping site using javaHarmeet Walia
 
04-2 E-commerce Payment Systems slides
04-2 E-commerce Payment Systems slides04-2 E-commerce Payment Systems slides
04-2 E-commerce Payment Systems slidesmonchai sopitka
 

Was ist angesagt? (20)

Privacy and Security Issues in E-Commerce
Privacy and Security Issues in E-Commerce  Privacy and Security Issues in E-Commerce
Privacy and Security Issues in E-Commerce
 
E commerce security
E commerce securityE commerce security
E commerce security
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
Ethics in-information-security
Ethics in-information-securityEthics in-information-security
Ethics in-information-security
 
Privacy and E-Commerce
Privacy and E-CommercePrivacy and E-Commerce
Privacy and E-Commerce
 
Online security and payment system
Online security and payment systemOnline security and payment system
Online security and payment system
 
C8-Ethical, Social, & Political Issues in Ecommerce.PPT
C8-Ethical, Social, & Political Issues in Ecommerce.PPTC8-Ethical, Social, & Political Issues in Ecommerce.PPT
C8-Ethical, Social, & Political Issues in Ecommerce.PPT
 
Ch03 laudon traver_ppt (e-commerce)
Ch03 laudon traver_ppt (e-commerce)Ch03 laudon traver_ppt (e-commerce)
Ch03 laudon traver_ppt (e-commerce)
 
E-Commerce Infrastructures
E-Commerce InfrastructuresE-Commerce Infrastructures
E-Commerce Infrastructures
 
Lecture 6 e-cmmerce , e commerce infrastructure,the internet -chapter 3
Lecture 6  e-cmmerce ,  e commerce infrastructure,the internet -chapter 3Lecture 6  e-cmmerce ,  e commerce infrastructure,the internet -chapter 3
Lecture 6 e-cmmerce , e commerce infrastructure,the internet -chapter 3
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 
Cybersecurity Issues and Challenges
Cybersecurity Issues and ChallengesCybersecurity Issues and Challenges
Cybersecurity Issues and Challenges
 
Cyber security & Data Protection
Cyber security & Data ProtectionCyber security & Data Protection
Cyber security & Data Protection
 
E-commerce Security and Payment Systems.pptx
E-commerce Security and Payment Systems.pptxE-commerce Security and Payment Systems.pptx
E-commerce Security and Payment Systems.pptx
 
Security issues in e commerce
Security issues in e commerceSecurity issues in e commerce
Security issues in e commerce
 
information security technology
information security technologyinformation security technology
information security technology
 
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONSE-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
 
Client server network threat
Client server network threatClient server network threat
Client server network threat
 
Presentation on online shopping site using java
Presentation on online shopping site using javaPresentation on online shopping site using java
Presentation on online shopping site using java
 
04-2 E-commerce Payment Systems slides
04-2 E-commerce Payment Systems slides04-2 E-commerce Payment Systems slides
04-2 E-commerce Payment Systems slides
 

Andere mochten auch

Generic social media presentation
Generic social media presentationGeneric social media presentation
Generic social media presentationDarren Copeland
 
Zastita i sigurnost elektronskog poslovanja 2
Zastita i sigurnost elektronskog poslovanja 2Zastita i sigurnost elektronskog poslovanja 2
Zastita i sigurnost elektronskog poslovanja 2Ivan Rabrenovic
 
Zaštita i sigurnost u elektronskom poslovanju
Zaštita i sigurnost u elektronskom poslovanjuZaštita i sigurnost u elektronskom poslovanju
Zaštita i sigurnost u elektronskom poslovanjuMaja Todorovic
 
User-Centered Information Architecture for e-commerce
User-Centered Information Architecture for e-commerceUser-Centered Information Architecture for e-commerce
User-Centered Information Architecture for e-commerceSøren Engelbrecht
 
AWS_Architecture_e-commerce
AWS_Architecture_e-commerceAWS_Architecture_e-commerce
AWS_Architecture_e-commerceSEONGTAEK OH
 
E commerce infrastructure
E commerce infrastructureE commerce infrastructure
E commerce infrastructureRaj vardhan
 
Design and Instantiation of Reference Architecture for Pluggable Service Plat...
Design and Instantiation of Reference Architecture for Pluggable Service Plat...Design and Instantiation of Reference Architecture for Pluggable Service Plat...
Design and Instantiation of Reference Architecture for Pluggable Service Plat...Mohammad Anggasta Paramartha
 
6 THREE WAYS OF MEASURING CRIME
6 THREE WAYS OF MEASURING CRIME6 THREE WAYS OF MEASURING CRIME
6 THREE WAYS OF MEASURING CRIMEmattyp99
 
I way - Network Infrastructure for e-Commerce
I way - Network Infrastructure for e-CommerceI way - Network Infrastructure for e-Commerce
I way - Network Infrastructure for e-Commercemc aa
 
B2B and e-commerce Architecture
B2B and e-commerce ArchitectureB2B and e-commerce Architecture
B2B and e-commerce ArchitectureSonia Grover
 
Taxonomies and Metadata in Information Architecture
Taxonomies and Metadata in Information ArchitectureTaxonomies and Metadata in Information Architecture
Taxonomies and Metadata in Information ArchitectureAccess Innovations, Inc.
 
E commerce ( system analysis ) chapter 4
E commerce ( system analysis ) chapter 4E commerce ( system analysis ) chapter 4
E commerce ( system analysis ) chapter 4Qamar Farooq
 
04-1 E-commerce Security slides
04-1 E-commerce Security slides04-1 E-commerce Security slides
04-1 E-commerce Security slidesmonchai sopitka
 
Architecture for B2B models in Ecommerce
Architecture for B2B models in EcommerceArchitecture for B2B models in Ecommerce
Architecture for B2B models in EcommerceNirbhik Jangid
 
Introduction to Enterprise Architecture and TOGAF 9.1
Introduction to Enterprise Architecture and TOGAF 9.1Introduction to Enterprise Architecture and TOGAF 9.1
Introduction to Enterprise Architecture and TOGAF 9.1iasaglobal
 

Andere mochten auch (20)

Generic social media presentation
Generic social media presentationGeneric social media presentation
Generic social media presentation
 
E comm jatin
E comm jatinE comm jatin
E comm jatin
 
Zastita i sigurnost elektronskog poslovanja 2
Zastita i sigurnost elektronskog poslovanja 2Zastita i sigurnost elektronskog poslovanja 2
Zastita i sigurnost elektronskog poslovanja 2
 
Zaštita i sigurnost u elektronskom poslovanju
Zaštita i sigurnost u elektronskom poslovanjuZaštita i sigurnost u elektronskom poslovanju
Zaštita i sigurnost u elektronskom poslovanju
 
User-Centered Information Architecture for e-commerce
User-Centered Information Architecture for e-commerceUser-Centered Information Architecture for e-commerce
User-Centered Information Architecture for e-commerce
 
AWS_Architecture_e-commerce
AWS_Architecture_e-commerceAWS_Architecture_e-commerce
AWS_Architecture_e-commerce
 
Crime statistics
Crime statisticsCrime statistics
Crime statistics
 
SAP Architecture E commerce
SAP Architecture E commerceSAP Architecture E commerce
SAP Architecture E commerce
 
E commerce infrastructure
E commerce infrastructureE commerce infrastructure
E commerce infrastructure
 
Cloud Customer Architecture for e-Commerce
Cloud Customer Architecture for e-CommerceCloud Customer Architecture for e-Commerce
Cloud Customer Architecture for e-Commerce
 
Design and Instantiation of Reference Architecture for Pluggable Service Plat...
Design and Instantiation of Reference Architecture for Pluggable Service Plat...Design and Instantiation of Reference Architecture for Pluggable Service Plat...
Design and Instantiation of Reference Architecture for Pluggable Service Plat...
 
Ecommerce Security
Ecommerce SecurityEcommerce Security
Ecommerce Security
 
6 THREE WAYS OF MEASURING CRIME
6 THREE WAYS OF MEASURING CRIME6 THREE WAYS OF MEASURING CRIME
6 THREE WAYS OF MEASURING CRIME
 
I way - Network Infrastructure for e-Commerce
I way - Network Infrastructure for e-CommerceI way - Network Infrastructure for e-Commerce
I way - Network Infrastructure for e-Commerce
 
B2B and e-commerce Architecture
B2B and e-commerce ArchitectureB2B and e-commerce Architecture
B2B and e-commerce Architecture
 
Taxonomies and Metadata in Information Architecture
Taxonomies and Metadata in Information ArchitectureTaxonomies and Metadata in Information Architecture
Taxonomies and Metadata in Information Architecture
 
E commerce ( system analysis ) chapter 4
E commerce ( system analysis ) chapter 4E commerce ( system analysis ) chapter 4
E commerce ( system analysis ) chapter 4
 
04-1 E-commerce Security slides
04-1 E-commerce Security slides04-1 E-commerce Security slides
04-1 E-commerce Security slides
 
Architecture for B2B models in Ecommerce
Architecture for B2B models in EcommerceArchitecture for B2B models in Ecommerce
Architecture for B2B models in Ecommerce
 
Introduction to Enterprise Architecture and TOGAF 9.1
Introduction to Enterprise Architecture and TOGAF 9.1Introduction to Enterprise Architecture and TOGAF 9.1
Introduction to Enterprise Architecture and TOGAF 9.1
 

Ähnlich wie Ecommerce security

5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threatsReadWrite
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Erik Ginalick
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCybAnastaciaShadelb
 
Final cyber risk report 24 feb
Final cyber risk report 24 febFinal cyber risk report 24 feb
Final cyber risk report 24 febmharbpavia
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptxnivi55
 
E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSES
E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSESE-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSES
E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSESIJNSA Journal
 
Cyber_Security.-project-4th year-cse pdf
Cyber_Security.-project-4th year-cse pdfCyber_Security.-project-4th year-cse pdf
Cyber_Security.-project-4th year-cse pdfmessengerhelper4
 
Cyber_Security+Education_Project_Report.pdf
Cyber_Security+Education_Project_Report.pdfCyber_Security+Education_Project_Report.pdf
Cyber_Security+Education_Project_Report.pdfmessengerhelper4
 
Eamonn O Raghallaigh Major Security Issues In E Commerce
Eamonn O Raghallaigh   Major Security Issues In E CommerceEamonn O Raghallaigh   Major Security Issues In E Commerce
Eamonn O Raghallaigh Major Security Issues In E CommerceEamonnORagh
 
Combating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced AnalyticsCombating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced AnalyticsCognizant
 
Team 3_Final Project.docx
Team 3_Final Project.docxTeam 3_Final Project.docx
Team 3_Final Project.docxMarcusBrown87
 
Cybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & ImportanceCybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & Importancemanoharparakh
 

Ähnlich wie Ecommerce security (20)

5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threats
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112
 
C018131821
C018131821C018131821
C018131821
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
Final cyber risk report 24 feb
Final cyber risk report 24 febFinal cyber risk report 24 feb
Final cyber risk report 24 feb
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSES
E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSESE-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSES
E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSES
 
Cyber_Security.-project-4th year-cse pdf
Cyber_Security.-project-4th year-cse pdfCyber_Security.-project-4th year-cse pdf
Cyber_Security.-project-4th year-cse pdf
 
Cyber_Security+Education_Project_Report.pdf
Cyber_Security+Education_Project_Report.pdfCyber_Security+Education_Project_Report.pdf
Cyber_Security+Education_Project_Report.pdf
 
Eamonn O Raghallaigh Major Security Issues In E Commerce
Eamonn O Raghallaigh   Major Security Issues In E CommerceEamonn O Raghallaigh   Major Security Issues In E Commerce
Eamonn O Raghallaigh Major Security Issues In E Commerce
 
Emerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business ReadyEmerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business Ready
 
IBM Security Services
IBM Security ServicesIBM Security Services
IBM Security Services
 
Combating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced AnalyticsCombating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced Analytics
 
UNIT 5.docx
UNIT 5.docxUNIT 5.docx
UNIT 5.docx
 
1402.1842.pdf
1402.1842.pdf1402.1842.pdf
1402.1842.pdf
 
Team 3_Final Project.docx
Team 3_Final Project.docxTeam 3_Final Project.docx
Team 3_Final Project.docx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
RESEARCH PAPER
RESEARCH PAPERRESEARCH PAPER
RESEARCH PAPER
 
Cybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & ImportanceCybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & Importance
 

Kürzlich hochgeladen

Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfSanaAli374401
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfChris Hunter
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Shubhangi Sonawane
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 

Kürzlich hochgeladen (20)

Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 

Ecommerce security

  • 2. The E-Commerce Security Environment  For most law-abiding citizens, the Internet holds the promise of a huge and convenient global marketplace  For criminals, the Internet has created entirely new – and profitable – ways to steal from the more than one billion Internet consumers worldwide  From products to services to cash to information, it’s all there for the taking on the Internet  It’s also less risky to steal online  For example, rather than rob a bank in person, the Internet makes it possible to rob people
  • 3. The Scope of the Problem  Cybercrime is becoming a more significant problem for both organizations and consumers  Bot networks, DDoS attacks, Trojans, phishing, data theft, identify theft, credit card fraud, and spyware are just some of the threats that are making daily headlines  Even social networking sites have had security breaches  For example, an individual hacked into Britney Spears’ Twitter account and began sending messages saying the singer had died
  • 4. The Scope of the Problem (cont.)  One source of cybercrime information is the Internet Crime Complaint Center (IC3)  In 2010, the IC3 processed more than 303,000 Internet crime complaints and it was estimated that in 2009 the total dollar loss for all referred crimes was $559 million  In the past, auction fraud constituted over 70% of complaints, but in 2010 it was only 10%, displaced by non payment/delivery (21%) and identity theft (16%)  The Computer Security Institute’s annual Computer Crime and Security Survey is another source of information
  • 6. The Underground Economy Marketplace: The Value of Stolen Information  Criminals who steal information on the Internet do not always use this information themselves, but instead derive value by selling the information to others  Some recently observed prices for stolen information, which typically vary depending on the quantity being purchased  Not every cybercriminal is necessary after money  In some cases, such criminals aim to deface, vandalize, and/or disrupt a Web site, rather than actually steal goods or services
  • 7. What is Good E-Commerce Security?  What is a secure commercial transaction?  Anytime you go into a marketplace you take risks, including the loss of privacy  E-commerce merchants and consumers face many of the same risks as participants in traditional commerce, although in a new digital environment  Reducing risks in e-commerce is a complex process that involves new technologies, organizational policies and procedures, and new laws and industry standards that empower law enforcement officials to investigate and prosecute offenders
  • 9.
  • 10. The Tension Between Security and Other Values  Can there be too much security? The answer is yes.  Computer security adds overhead and expense to business operations  Expanding computer security also has other downsides:  Makes systems more difficult to use  Slows down processors  Increases data storage demands  May reduce individual’s abilities to remain anonymous
  • 11. Security Threats in the E- Commerce Environment  From a technological perspective, there are three key points of vulnerability when dealing with e- commerce: the client, the server, and the communications pipeline  Figure 5.4 illustrates some of the things that can go wrong at each major vulnerability point in the transaction
  • 13. Vulnerable Points in an E- Commerce Transaction
  • 14. Common E-Commerce Security Threats  Some of the most common and most damaging forms of security threats to e-commerce consumers and site operators include:  Malicious code (malware) – virus, worm, Trojan horse, bots, etc.  Unwanted programs (spyware)  Phishing and identify theft – social engineering  Hacking and cybervandalism  Credit card fraud/theft  Spoofing (pharming) and spam (junk) websites  Denial of service (DoS) attacks  Insider attacks  Poorly designed server and client software  Social networks and mobile devices greatly expand the security threats to organizations and individuals
  • 15. Technology Solutions  It might seem like there is not much that can be done about the onslaught of security breaches on the Internet  But in fact a great deal of progress has been made by private security firms, corporate and home users, network administrators, technology firms, and government agencies  Two lines of defense include:  Technology solutions  Policy solutions
  • 16. Encryption  Encryption is the process of transforming plain text or data into cipher text that cannot be read by anyone other than the sender and the receiver  The purpose of encryption is to secure stored information and to secure information transmission  One early encryption method was symmetric key encryption where both the sender and the receiver use the same key to encrypt and decrypt the message  They had to send the key to each other over some communications media or in person
  • 18. Limitations to Encryption Solutions  All forms of encryption have limitations  It is not effective against insiders  Protecting private keys may also be difficult because they are stored on insecure desktop and laptop computers  Additional technology solutions exist for securing channels of communications, networks, and servers/clients
  • 19. Communication Channel, Network, and Server/Client Security Technologies  Communication channel security technologies:  Secure Sockets Layer (SSL)  Virtual Private Networks (VPNs)  Network protection technologies:  Firewalls  Proxy servers  Server/client protection technologies  Operating system security enhancements  Anti-virus software
  • 20. Management Policies, Business Procedures, and Public Laws  US businesses and government agencies spend about 14% of their information technology budgets on security hardware, software, and services (about $35 billion in 2010)  However, most CEOs and CIOs of existing e- commerce operations believe that technology is not the sole answer to managing the risk of e- commerce  An e-commerce security plan would include a risk assessment, development of a security policy, implementation plan, creation of a security organization, and a security audit  Implementation may involve expanded forms of
  • 21. The Roles of Laws and Public Policy  The public policy environment today is very different fro the early days of e-commerce  The net result is that the Internet is no longer an ungoverned, unsupervised, self-controlled technology juggernaut  It is also apparent that legal and public policy solutions also need to be enacted globally
  • 22. Government Policies and Controls on Encryption Software  An interesting example of the difficulties involved in enhancing security is the case of encryption software distribution  Governments have required to restrict availability and export of encryption systems as a means of detecting and preventing crime and terrorism  On one hand, restricting global distribution of advanced encryption systems may reduce the likelihood that they may be cracked  But it also reduces global Internet security if different countries have different levels of protection