SlideShare ist ein Scribd-Unternehmen logo
1 von 27
Downloaden Sie, um offline zu lesen
1
Chapter 12
E-Commerce Security
12.1 Opening Case
12.2 The need for security
12.3 Why Now ?
12.4 Basic Security Issues
12.5 Types of Threats and
Attacks
12.6 Security Risk Management
12.7 Security Technology
12.8 Managerial Issues
2
Brute Force Credit Card Attack Story
n The Problem
n Spitfire Novelties usually
generates between 5 and 30
transactions per day
n On September 12, 2002 in a
“brute force” credit card attack,
Spitfire’s credit card transaction
processor processed 140,000
fake credit card charges worth
$5.07 each (62,000 were
approved)
n The total value of the approved
charges was around $300,000
n Spitfire found out about the
transactions only when they
were called by one of the credit
card owners who had been
checking his statement online
and had noticed the $5.07
charge
n Brute force credit card attacks require
minimal skill
n Hackers run thousands of small charges
through merchant accounts, picking
numbers at random
n When the perpetrator finds a valid credit
card number it can then be sold on the
black market
n Some modern-day black markets are
actually member-only Web sites like
carderplanet.com, shadowcrew.com,
and counterfeitlibrary.com
3
n Relies on a perpetrator’s ability to pose as
a merchant requesting authorization for a
credit card purchase requiring
n A merchant ID
n A password
n Both
n Online Data’s credit card processing
services, all a perpetrator needed was a
merchant’s password in order to request
authorization
n Online Data is a reseller of VeriSign Inc.
credit card gateway services
n VeriSign blamed Online Data for the
incident
n Online Data blamed Spitfire for not
changing their initial starter password
n In April 2002 hackers got into the
Authorize.Net card processing system
(largest gateway payment system on the
Internet)
n Executed 13,000 credit card
transactions, of which 7,000 succeeded
n Entry into the Authorize.Net system
required only a log-on name, not a
password
4
Brute Force Solution
n Online Data should
assign strong
passwords at the start
n Customers should
modify those
passwords frequently
n Authorization services
such as VeriSign and
Authorize.Net should
have built-in
safeguards that
recognize brute force
attacks
n Signals that
something is
amiss:
n A merchant issues an
extraordinary number
of requests
n Repeated requests for
small amounts
emanating from the
same merchants
5
n The Results
n VeriSign halted the transactions
before they were settled, saving
Spitfire $316,000 in charges
n Authorize.Net merchants were
charged $0.35 for each transaction
n The criminals acquired thousands of
valid credit card numbers to sell on
the black market
6
n What we can learn…
n Any type of EC involves a number of
players who use a variety of network and
application services that provide access to
a variety of data sources
n A perpetrator needs only a single
weakness in order to attack a system
n Some attacks require sophisticated
techniques and technologies
n Most attacks are not sophisticated;
standard security risk management
procedures can be used to minimize their
probability and impact
Home
7
12.2 The Need for Security
§ Data from Computer
Security Institute and
FBI indicate:
§ Cyber attacks are on the
increase
§ Internet connections are
increasingly a point of
attack
§ The variety of attacks is
on the rise
§ The reporting of serious
crimes to law enforcement
has declined
n According to the
statistics reported to
CERT/CC over the past
year (CERT/CC 2002)
n The number of cyber
attacks skyrocketed from
approximately 22,000 in
2000 to over 82,000 in
2002
n First quarter of 2003 the
number was already over
43,000
Home
8
12.3 Why Now ?
§ Security systems are only as strong as
their weakest points
§ Security and ease of use (or
implementation) are antithetical to one
another
§ Security takes a back seat to market
pressures
§ Security of an EC site depends on the
security of the Internet as a whole
§ Security vulnerabilities are increasing
faster than they can be combated
§ Security compromised by common
applications
Home
9
12.4 Basic Security Issues
Issues at a simple marketing site:
§ User’s perspective
§ Is Web server owned and
operated by legitimate
company?
§ Web page and form contain
some malicious code content?
§ Will Web server distribute
the user’s information to
another party?
§ Company’s perspective
§ Will the user attempt to break
into the Web server or alter the
site?
§ Will the user try to disrupt the
server so it isn’t available to
others?
§ User and company perspective
§ Is network connection free from
eavesdropping?
§ Has information sent back and forth
between server and browser been
altered?
10
13.4 Basic Security Issues
(cont.)
Major security issues in
EC
§ Confidentiality
Menimpan informasi pribadi
dan sensitif dari pihak-pihak
yang tidak berwenang
§ Integrity
Mencegah dan melindungi
data dari usaha merubah dan
menghancurkan baik sengaja
maupun tidak
§ Non-repudiation
Kemampuan untuk
membatasi penyangkalan
terhadap transaksi, biasanya
dengan menggunakan
signature
§ Authentication
Proses dimana pihak yang
satu mengkui keberadaan
pihak yang lainnya
§ Authorization
Proses yang memastikan
bahwa seseorang mempunyai
hak akses
§ Auditing
Proses pencatatan informasi
tentang aktivitas akses,
penggunaan fasiltas, atau
ancaman terhadap security
11
Home
12
12.5 Type of Threats and Attacks
Nontechnical attack:
Serangan dengan cara
menipu seseorang
untuk memberikan
informasi yang
berhubungan dengan
akses kedalam jaringan
Multiprong approach used to
combat social engineering:
1. Education and training
2. Policies and procedures
3. Penetration testing
13
Technical attack:
An attack perpetrated
using software and
systems knowledge or
expertise
The players
§ Hackers
§ Crackers
§ Script kiddies
§ Systems and software
bugs and
misconfigurations
§ Distributed Denial-of-
service (DDoS) attacks
§ Malicious code
§ Viruses
§ Worms
§ Macro viruses and macro
worms
§ Trojan horses
12.5 Type of Threats and Attacks
(Cont.)
14
Figure 12-1
Using
Zombies in a
Distributed
Denial of
Service Attack
Home
15
13.6 Security Risk Management
n Common mistakes in
managing their security
risks (McConnell 2002):
n Undervalued
information
n Narrowly defined
security boundaries
n Reactive security
management
n Dated security
management processes
n Lack of communication
about security
responsibilities
n Security risk
management:
A systematic process
for determining the
likelihood of various
security attacks and for
identifying the actions
needed to prevent or
mitigate those attacks
16
§ Definitions involved in
risk management
§ Assets—anything of value
worth securing
§ Threat—eventuality
representing danger to an
asset
§ Vulnerability—weakness
in a safeguard
§ Required to determine
security needs
§ 4 phases of risk
management
§ Assessment
§ Planning
§ Implementation
§ Monitoring
17
§ Assessment phase
evaluation of assets, threats,
vulnerabilities
§ Determine
organizational
objectives
§ Inventory assets
§ Delineate threats
§ Identify vulnerabilities
§ Quantify the value of
each risk
§ Planning phase of risk
management
arrive at a set of security
policies
§ Define specific policies
§ Establish processes for
audit and review
§ Establish an incident
response team and
contingency plan
13.6 Security Risk Management
(cont.)
18
13.6 Security Risk Management
(cont.)
§ Implementation phase of risk
management
choose particular technologies
to deal with high priority
threats
§ Monitoring phase of
risk management
ongoing processes used to
determine which measures
are successful,
unsuccessful and need
modification
Home
19
13.7 Security Technology
Securing EC Communication
n Authentication system:
System that identifies the
legitimate parties to a
transaction, determines the
actions they are allowed to
perform, and limits their actions
to only those that are
necessary to initiate and
complete the transaction
20
Biometric systems:
Authentication systems that identify
a person by measurement of a
biological characteristic such as a
fingerprint, iris (eye) pattern, facial
features, or voice
Physiological biometric (fingerprint,
iris, voice)
Behavioral biometric (keystroke
monitoring)
Encryption:
The process of scrambling
(encrypting) a message in such a
way that it is difficult, expensive, or
time-consuming for an unauthorized
person to unscramble (decrypt) it
Security Protocol
n Secure Socket Layer (SSL):
Protocol that utilizes standard
certificates for authentication and
data encryption to ensure privacy
or confidentiality
n Transport Layer Security (TLS):
As of 1996, another name for the
SSL protocol
n Secure Electronic Transaction
(SET):
A protocol designed to provide
secure online credit card
transactions for both consumers
and merchants; developed jointly
by Netscape, Visa, MasterCard, and
others
21
Securing EC Networks
n Firewall: A network node consisting
of both hardware and software that
isolates a private network from a
public network
n Virtual private network (VPN): A
network that uses the public Internet
to carry information but remains
private by using encryption to
scramble the communications,
authentication to ensure that
information has not been tampered
with, and access control to verify the
identity of anyone using the network
n Intrusion detection systems
(IDSs): A special category of
software that can monitor activity
across a network or on a host
computer, watch for suspicious
activity, and take automated action
based on what it sees
22
Figure 13-6
Application-Level Proxy (Bastion
Gateway Host)
23
Figure 13-7
Screen Host Firewall
24
Figure 13-8
Screen Subnet Firewall (with
DMZ)
Home
25
13.8 Managerial Issues
1. Have we budgeted enough for security?
2. What are the business consequences of poor security?
3. Which e-commerce sites are vulnerable to attack?
4. What is the key to establishing strong e-commerce
security?
5. What steps should businesses follow inestablishing a
security plan?
6. Should organizations be concerned with internal security
threats?
Home
26
27

Weitere ähnliche Inhalte

Was ist angesagt?

E Commerce -Security Threats and Challenges
E Commerce -Security Threats and ChallengesE Commerce -Security Threats and Challenges
E Commerce -Security Threats and ChallengesInderjeet Singh
 
Security in E-commerce
Security in E-commerceSecurity in E-commerce
Security in E-commercem8817
 
Security issues in e commerce
Security issues in e commerceSecurity issues in e commerce
Security issues in e commercesadaf tst
 
Network security for E-Commerce
Network security for E-CommerceNetwork security for E-Commerce
Network security for E-CommerceHem Pokhrel
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber securityAvani Patel
 
Chapter three e-security
Chapter three e-securityChapter three e-security
Chapter three e-securityMarya Sholevar
 
Operating system security
Operating system securityOperating system security
Operating system securityRamesh Ogania
 
Ecommerce security
Ecommerce securityEcommerce security
Ecommerce securitypolitegcuf
 
Client server network threat
Client server network threatClient server network threat
Client server network threatRaj vardhan
 
E-Commerce security
E-Commerce security E-Commerce security
E-Commerce security Tawhid Rahman
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewallsMurali Mohan
 
04-1 E-commerce Security slides
04-1 E-commerce Security slides04-1 E-commerce Security slides
04-1 E-commerce Security slidesmonchai sopitka
 
Types of Cyber Attacks
Types of Cyber AttacksTypes of Cyber Attacks
Types of Cyber AttacksRubal Sagwal
 
Some E-commerce Applications
Some E-commerce ApplicationsSome E-commerce Applications
Some E-commerce ApplicationsAnuj Gupta
 

Was ist angesagt? (20)

E-commerce Security and Payment
E-commerce Security and PaymentE-commerce Security and Payment
E-commerce Security and Payment
 
E Commerce -Security Threats and Challenges
E Commerce -Security Threats and ChallengesE Commerce -Security Threats and Challenges
E Commerce -Security Threats and Challenges
 
Security in E-commerce
Security in E-commerceSecurity in E-commerce
Security in E-commerce
 
Security issues in e commerce
Security issues in e commerceSecurity issues in e commerce
Security issues in e commerce
 
Network security for E-Commerce
Network security for E-CommerceNetwork security for E-Commerce
Network security for E-Commerce
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Payment Gateway
Payment GatewayPayment Gateway
Payment Gateway
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 
Chapter three e-security
Chapter three e-securityChapter three e-security
Chapter three e-security
 
Operating system security
Operating system securityOperating system security
Operating system security
 
Ecommerce security
Ecommerce securityEcommerce security
Ecommerce security
 
Client server network threat
Client server network threatClient server network threat
Client server network threat
 
E-Commerce security
E-Commerce security E-Commerce security
E-Commerce security
 
Security Threats in E-Commerce
Security Threats in E-CommerceSecurity Threats in E-Commerce
Security Threats in E-Commerce
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
 
04-1 E-commerce Security slides
04-1 E-commerce Security slides04-1 E-commerce Security slides
04-1 E-commerce Security slides
 
System security
System securitySystem security
System security
 
Types of Cyber Attacks
Types of Cyber AttacksTypes of Cyber Attacks
Types of Cyber Attacks
 
system Security
system Security system Security
system Security
 
Some E-commerce Applications
Some E-commerce ApplicationsSome E-commerce Applications
Some E-commerce Applications
 

Andere mochten auch

Limitations E - Commerce Security measures
Limitations E - Commerce Security measuresLimitations E - Commerce Security measures
Limitations E - Commerce Security measuresJeril Peter
 
6. Security Threats with E-Commerce
6. Security Threats with E-Commerce6. Security Threats with E-Commerce
6. Security Threats with E-CommerceJitendra Tomar
 
Grappe d'innovation des TIC
Grappe d'innovation des TICGrappe d'innovation des TIC
Grappe d'innovation des TICBoris Adam
 
Comment sécuriser les cgv de votre site e-commerce
Comment sécuriser les cgv de votre site e-commerceComment sécuriser les cgv de votre site e-commerce
Comment sécuriser les cgv de votre site e-commerceYoussef Rahoui
 
Presentation confoo2012 survivrea-agile
Presentation confoo2012 survivrea-agilePresentation confoo2012 survivrea-agile
Presentation confoo2012 survivrea-agilefblondeau
 
Think like a great Entrepreneur
Think like a great EntrepreneurThink like a great Entrepreneur
Think like a great EntrepreneurWisnu Dewobroto
 
Business model generation
Business model generationBusiness model generation
Business model generationWisnu Dewobroto
 
Value proposition Design
Value proposition DesignValue proposition Design
Value proposition DesignWisnu Dewobroto
 
Web semantique et e-commerce : la vague va déferler !
Web semantique et e-commerce : la vague va déferler !Web semantique et e-commerce : la vague va déferler !
Web semantique et e-commerce : la vague va déferler !Antidot
 
Vademecom presentation full_save
Vademecom presentation full_saveVademecom presentation full_save
Vademecom presentation full_saveWoomeet
 
Sécurisation applicatives pour le e-commerce
Sécurisation applicatives pour le e-commerceSécurisation applicatives pour le e-commerce
Sécurisation applicatives pour le e-commerceWoomeet
 
Ch19 E Commerce Security
Ch19 E Commerce SecurityCh19 E Commerce Security
Ch19 E Commerce Securityphanleson
 
Legal ethical issues E commerce
Legal ethical issues E commerceLegal ethical issues E commerce
Legal ethical issues E commerceWisnu Dewobroto
 
Diagnostic des sites web e-commerce affiliés au seul prestataire de payement ...
Diagnostic des sites web e-commerce affiliés au seul prestataire de payement ...Diagnostic des sites web e-commerce affiliés au seul prestataire de payement ...
Diagnostic des sites web e-commerce affiliés au seul prestataire de payement ...Made In Morocco
 
E-Commerce Security Workable Attacks Againest E-Commerce
E-Commerce Security Workable Attacks Againest E-CommerceE-Commerce Security Workable Attacks Againest E-Commerce
E-Commerce Security Workable Attacks Againest E-Commerceabe8512000
 
E-commerce & Security
E-commerce & SecurityE-commerce & Security
E-commerce & SecurityNetstarterSL
 

Andere mochten auch (20)

Limitations E - Commerce Security measures
Limitations E - Commerce Security measuresLimitations E - Commerce Security measures
Limitations E - Commerce Security measures
 
6. Security Threats with E-Commerce
6. Security Threats with E-Commerce6. Security Threats with E-Commerce
6. Security Threats with E-Commerce
 
E commerce ppt
E commerce pptE commerce ppt
E commerce ppt
 
E commerce
E commerceE commerce
E commerce
 
Grappe d'innovation des TIC
Grappe d'innovation des TICGrappe d'innovation des TIC
Grappe d'innovation des TIC
 
Comment sécuriser les cgv de votre site e-commerce
Comment sécuriser les cgv de votre site e-commerceComment sécuriser les cgv de votre site e-commerce
Comment sécuriser les cgv de votre site e-commerce
 
Presentation confoo2012 survivrea-agile
Presentation confoo2012 survivrea-agilePresentation confoo2012 survivrea-agile
Presentation confoo2012 survivrea-agile
 
Think like a great Entrepreneur
Think like a great EntrepreneurThink like a great Entrepreneur
Think like a great Entrepreneur
 
Business model generation
Business model generationBusiness model generation
Business model generation
 
Value proposition Design
Value proposition DesignValue proposition Design
Value proposition Design
 
Web semantique et e-commerce : la vague va déferler !
Web semantique et e-commerce : la vague va déferler !Web semantique et e-commerce : la vague va déferler !
Web semantique et e-commerce : la vague va déferler !
 
Vademecom presentation full_save
Vademecom presentation full_saveVademecom presentation full_save
Vademecom presentation full_save
 
Ecommerce Security
Ecommerce SecurityEcommerce Security
Ecommerce Security
 
Sécurisation applicatives pour le e-commerce
Sécurisation applicatives pour le e-commerceSécurisation applicatives pour le e-commerce
Sécurisation applicatives pour le e-commerce
 
Ch19 E Commerce Security
Ch19 E Commerce SecurityCh19 E Commerce Security
Ch19 E Commerce Security
 
Amazon & E Bay
Amazon & E BayAmazon & E Bay
Amazon & E Bay
 
Legal ethical issues E commerce
Legal ethical issues E commerceLegal ethical issues E commerce
Legal ethical issues E commerce
 
Diagnostic des sites web e-commerce affiliés au seul prestataire de payement ...
Diagnostic des sites web e-commerce affiliés au seul prestataire de payement ...Diagnostic des sites web e-commerce affiliés au seul prestataire de payement ...
Diagnostic des sites web e-commerce affiliés au seul prestataire de payement ...
 
E-Commerce Security Workable Attacks Againest E-Commerce
E-Commerce Security Workable Attacks Againest E-CommerceE-Commerce Security Workable Attacks Againest E-Commerce
E-Commerce Security Workable Attacks Againest E-Commerce
 
E-commerce & Security
E-commerce & SecurityE-commerce & Security
E-commerce & Security
 

Ähnlich wie E commerce Security

L1 introduction to e-security Online Security
L1 introduction to e-security Online SecurityL1 introduction to e-security Online Security
L1 introduction to e-security Online Securitybayhehua
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security BasicsMohan Jadhav
 
Security for e commerce
Security for e commerceSecurity for e commerce
Security for e commerceMohsin Ahmad
 
Sgsits cyber securityworkshop_4mar2017
Sgsits cyber securityworkshop_4mar2017Sgsits cyber securityworkshop_4mar2017
Sgsits cyber securityworkshop_4mar2017Anil Jain
 
The Threat Is Real. Protect Yourself.
The Threat Is Real. Protect Yourself.The Threat Is Real. Protect Yourself.
The Threat Is Real. Protect Yourself.Teri Radichel
 
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Knowledge Group
 
Security and Privacy Considerations in the Open Network for Digital Commerce.pdf
Security and Privacy Considerations in the Open Network for Digital Commerce.pdfSecurity and Privacy Considerations in the Open Network for Digital Commerce.pdf
Security and Privacy Considerations in the Open Network for Digital Commerce.pdfNikhil Khunteta
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfCareerera
 
The Top Five Security Threats to Hyperledger Fabric & How to Mitigate Them
The Top Five Security Threats to Hyperledger Fabric & How to Mitigate ThemThe Top Five Security Threats to Hyperledger Fabric & How to Mitigate Them
The Top Five Security Threats to Hyperledger Fabric & How to Mitigate ThemCapital Numbers
 
Top 20 cyber security interview questions and answers in 2023.pdf
Top 20 cyber security interview questions and answers in 2023.pdfTop 20 cyber security interview questions and answers in 2023.pdf
Top 20 cyber security interview questions and answers in 2023.pdfAnanthReddy38
 
Role of data mining in cyber security
Role of data mining in cyber securityRole of data mining in cyber security
Role of data mining in cyber securityPranto26
 
All You Wanted To Know About Top Online Payment Security Methods.pptx
All You Wanted To Know About Top Online Payment Security Methods.pptxAll You Wanted To Know About Top Online Payment Security Methods.pptx
All You Wanted To Know About Top Online Payment Security Methods.pptxITIO Innovex
 
New Developments in Cybersecurity and Technology for RDOs: Howland
New Developments in Cybersecurity and Technology for RDOs: HowlandNew Developments in Cybersecurity and Technology for RDOs: Howland
New Developments in Cybersecurity and Technology for RDOs: Howlandnado-web
 

Ähnlich wie E commerce Security (20)

L1 introduction to e-security Online Security
L1 introduction to e-security Online SecurityL1 introduction to e-security Online Security
L1 introduction to e-security Online Security
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
 
6 e commerce security
6 e commerce security6 e commerce security
6 e commerce security
 
Security for e commerce
Security for e commerceSecurity for e commerce
Security for e commerce
 
Sgsits cyber securityworkshop_4mar2017
Sgsits cyber securityworkshop_4mar2017Sgsits cyber securityworkshop_4mar2017
Sgsits cyber securityworkshop_4mar2017
 
The Threat Is Real. Protect Yourself.
The Threat Is Real. Protect Yourself.The Threat Is Real. Protect Yourself.
The Threat Is Real. Protect Yourself.
 
TOPIC7.pptx
TOPIC7.pptxTOPIC7.pptx
TOPIC7.pptx
 
Lecture 1-2.pptx
Lecture 1-2.pptxLecture 1-2.pptx
Lecture 1-2.pptx
 
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
 
Security and Privacy Considerations in the Open Network for Digital Commerce.pdf
Security and Privacy Considerations in the Open Network for Digital Commerce.pdfSecurity and Privacy Considerations in the Open Network for Digital Commerce.pdf
Security and Privacy Considerations in the Open Network for Digital Commerce.pdf
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
 
The Top Five Security Threats to Hyperledger Fabric & How to Mitigate Them
The Top Five Security Threats to Hyperledger Fabric & How to Mitigate ThemThe Top Five Security Threats to Hyperledger Fabric & How to Mitigate Them
The Top Five Security Threats to Hyperledger Fabric & How to Mitigate Them
 
Top 20 cyber security interview questions and answers in 2023.pdf
Top 20 cyber security interview questions and answers in 2023.pdfTop 20 cyber security interview questions and answers in 2023.pdf
Top 20 cyber security interview questions and answers in 2023.pdf
 
Role of data mining in cyber security
Role of data mining in cyber securityRole of data mining in cyber security
Role of data mining in cyber security
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
All You Wanted To Know About Top Online Payment Security Methods.pptx
All You Wanted To Know About Top Online Payment Security Methods.pptxAll You Wanted To Know About Top Online Payment Security Methods.pptx
All You Wanted To Know About Top Online Payment Security Methods.pptx
 
New Developments in Cybersecurity and Technology for RDOs: Howland
New Developments in Cybersecurity and Technology for RDOs: HowlandNew Developments in Cybersecurity and Technology for RDOs: Howland
New Developments in Cybersecurity and Technology for RDOs: Howland
 
Network Security
Network SecurityNetwork Security
Network Security
 
Module 1.pdf
Module 1.pdfModule 1.pdf
Module 1.pdf
 
module 1 Cyber Security Concepts
module 1 Cyber Security Conceptsmodule 1 Cyber Security Concepts
module 1 Cyber Security Concepts
 

Mehr von Wisnu Dewobroto

Building a Social Enterprise
Building a Social Enterprise Building a Social Enterprise
Building a Social Enterprise Wisnu Dewobroto
 
Kompetisi Bisnis Mahasiswa Indonesia 2019
Kompetisi Bisnis Mahasiswa Indonesia 2019Kompetisi Bisnis Mahasiswa Indonesia 2019
Kompetisi Bisnis Mahasiswa Indonesia 2019Wisnu Dewobroto
 
Power of define, ideate power of prototyping
Power of define, ideate power of prototypingPower of define, ideate power of prototyping
Power of define, ideate power of prototypingWisnu Dewobroto
 
Design thinking meet the coorporation
Design thinking meet the coorporationDesign thinking meet the coorporation
Design thinking meet the coorporationWisnu Dewobroto
 
Intro to design thinking
Intro to design thinkingIntro to design thinking
Intro to design thinkingWisnu Dewobroto
 
Converting need into demand
Converting need into demandConverting need into demand
Converting need into demandWisnu Dewobroto
 
Managing growing business trough portfolio analysis and service
Managing growing business trough portfolio analysis and serviceManaging growing business trough portfolio analysis and service
Managing growing business trough portfolio analysis and serviceWisnu Dewobroto
 
Pro forma financial statement
Pro forma financial statementPro forma financial statement
Pro forma financial statementWisnu Dewobroto
 
Quality and global competitiveness
Quality and global competitivenessQuality and global competitiveness
Quality and global competitivenessWisnu Dewobroto
 
Quality management , ethics and csr
Quality management , ethics and csrQuality management , ethics and csr
Quality management , ethics and csrWisnu Dewobroto
 
Team building and teamwork
Team building and teamworkTeam building and teamwork
Team building and teamworkWisnu Dewobroto
 

Mehr von Wisnu Dewobroto (20)

Wirausaha Sosial
Wirausaha Sosial Wirausaha Sosial
Wirausaha Sosial
 
Building a Social Enterprise
Building a Social Enterprise Building a Social Enterprise
Building a Social Enterprise
 
Kompetisi Bisnis Mahasiswa Indonesia 2019
Kompetisi Bisnis Mahasiswa Indonesia 2019Kompetisi Bisnis Mahasiswa Indonesia 2019
Kompetisi Bisnis Mahasiswa Indonesia 2019
 
Beyond business model
Beyond business modelBeyond business model
Beyond business model
 
Power of define, ideate power of prototyping
Power of define, ideate power of prototypingPower of define, ideate power of prototyping
Power of define, ideate power of prototyping
 
Design experience
Design experienceDesign experience
Design experience
 
Story telling
Story tellingStory telling
Story telling
 
Design thinking meet the coorporation
Design thinking meet the coorporationDesign thinking meet the coorporation
Design thinking meet the coorporation
 
Intro to design thinking
Intro to design thinkingIntro to design thinking
Intro to design thinking
 
Converting need into demand
Converting need into demandConverting need into demand
Converting need into demand
 
PESTEL analysis
PESTEL analysisPESTEL analysis
PESTEL analysis
 
Managing growing business trough portfolio analysis and service
Managing growing business trough portfolio analysis and serviceManaging growing business trough portfolio analysis and service
Managing growing business trough portfolio analysis and service
 
Pro forma financial statement
Pro forma financial statementPro forma financial statement
Pro forma financial statement
 
Quality and global competitiveness
Quality and global competitivenessQuality and global competitiveness
Quality and global competitiveness
 
Quality management , ethics and csr
Quality management , ethics and csrQuality management , ethics and csr
Quality management , ethics and csr
 
Qfd
QfdQfd
Qfd
 
Service quality
Service qualityService quality
Service quality
 
Team building and teamwork
Team building and teamworkTeam building and teamwork
Team building and teamwork
 
Quality culture
Quality cultureQuality culture
Quality culture
 
Quality concept
Quality conceptQuality concept
Quality concept
 

Kürzlich hochgeladen

Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptxnandhinijagan9867
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756dollysharma2066
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon investment
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentationuneakwhite
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...daisycvs
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfAdmir Softic
 
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceMalegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceDamini Dixit
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 MonthsIndeedSEO
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...amitlee9823
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1kcpayne
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...amitlee9823
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Sheetaleventcompany
 
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...lizamodels9
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityEric T. Tung
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableSeo
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876dlhescort
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 

Kürzlich hochgeladen (20)

Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business Growth
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort ServiceMalegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
Malegaon Call Girls Service ☎ ️82500–77686 ☎️ Enjoy 24/7 Escort Service
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
 
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 

E commerce Security

  • 1. 1 Chapter 12 E-Commerce Security 12.1 Opening Case 12.2 The need for security 12.3 Why Now ? 12.4 Basic Security Issues 12.5 Types of Threats and Attacks 12.6 Security Risk Management 12.7 Security Technology 12.8 Managerial Issues
  • 2. 2 Brute Force Credit Card Attack Story n The Problem n Spitfire Novelties usually generates between 5 and 30 transactions per day n On September 12, 2002 in a “brute force” credit card attack, Spitfire’s credit card transaction processor processed 140,000 fake credit card charges worth $5.07 each (62,000 were approved) n The total value of the approved charges was around $300,000 n Spitfire found out about the transactions only when they were called by one of the credit card owners who had been checking his statement online and had noticed the $5.07 charge n Brute force credit card attacks require minimal skill n Hackers run thousands of small charges through merchant accounts, picking numbers at random n When the perpetrator finds a valid credit card number it can then be sold on the black market n Some modern-day black markets are actually member-only Web sites like carderplanet.com, shadowcrew.com, and counterfeitlibrary.com
  • 3. 3 n Relies on a perpetrator’s ability to pose as a merchant requesting authorization for a credit card purchase requiring n A merchant ID n A password n Both n Online Data’s credit card processing services, all a perpetrator needed was a merchant’s password in order to request authorization n Online Data is a reseller of VeriSign Inc. credit card gateway services n VeriSign blamed Online Data for the incident n Online Data blamed Spitfire for not changing their initial starter password n In April 2002 hackers got into the Authorize.Net card processing system (largest gateway payment system on the Internet) n Executed 13,000 credit card transactions, of which 7,000 succeeded n Entry into the Authorize.Net system required only a log-on name, not a password
  • 4. 4 Brute Force Solution n Online Data should assign strong passwords at the start n Customers should modify those passwords frequently n Authorization services such as VeriSign and Authorize.Net should have built-in safeguards that recognize brute force attacks n Signals that something is amiss: n A merchant issues an extraordinary number of requests n Repeated requests for small amounts emanating from the same merchants
  • 5. 5 n The Results n VeriSign halted the transactions before they were settled, saving Spitfire $316,000 in charges n Authorize.Net merchants were charged $0.35 for each transaction n The criminals acquired thousands of valid credit card numbers to sell on the black market
  • 6. 6 n What we can learn… n Any type of EC involves a number of players who use a variety of network and application services that provide access to a variety of data sources n A perpetrator needs only a single weakness in order to attack a system n Some attacks require sophisticated techniques and technologies n Most attacks are not sophisticated; standard security risk management procedures can be used to minimize their probability and impact Home
  • 7. 7 12.2 The Need for Security § Data from Computer Security Institute and FBI indicate: § Cyber attacks are on the increase § Internet connections are increasingly a point of attack § The variety of attacks is on the rise § The reporting of serious crimes to law enforcement has declined n According to the statistics reported to CERT/CC over the past year (CERT/CC 2002) n The number of cyber attacks skyrocketed from approximately 22,000 in 2000 to over 82,000 in 2002 n First quarter of 2003 the number was already over 43,000 Home
  • 8. 8 12.3 Why Now ? § Security systems are only as strong as their weakest points § Security and ease of use (or implementation) are antithetical to one another § Security takes a back seat to market pressures § Security of an EC site depends on the security of the Internet as a whole § Security vulnerabilities are increasing faster than they can be combated § Security compromised by common applications Home
  • 9. 9 12.4 Basic Security Issues Issues at a simple marketing site: § User’s perspective § Is Web server owned and operated by legitimate company? § Web page and form contain some malicious code content? § Will Web server distribute the user’s information to another party? § Company’s perspective § Will the user attempt to break into the Web server or alter the site? § Will the user try to disrupt the server so it isn’t available to others? § User and company perspective § Is network connection free from eavesdropping? § Has information sent back and forth between server and browser been altered?
  • 10. 10 13.4 Basic Security Issues (cont.) Major security issues in EC § Confidentiality Menimpan informasi pribadi dan sensitif dari pihak-pihak yang tidak berwenang § Integrity Mencegah dan melindungi data dari usaha merubah dan menghancurkan baik sengaja maupun tidak § Non-repudiation Kemampuan untuk membatasi penyangkalan terhadap transaksi, biasanya dengan menggunakan signature § Authentication Proses dimana pihak yang satu mengkui keberadaan pihak yang lainnya § Authorization Proses yang memastikan bahwa seseorang mempunyai hak akses § Auditing Proses pencatatan informasi tentang aktivitas akses, penggunaan fasiltas, atau ancaman terhadap security
  • 12. 12 12.5 Type of Threats and Attacks Nontechnical attack: Serangan dengan cara menipu seseorang untuk memberikan informasi yang berhubungan dengan akses kedalam jaringan Multiprong approach used to combat social engineering: 1. Education and training 2. Policies and procedures 3. Penetration testing
  • 13. 13 Technical attack: An attack perpetrated using software and systems knowledge or expertise The players § Hackers § Crackers § Script kiddies § Systems and software bugs and misconfigurations § Distributed Denial-of- service (DDoS) attacks § Malicious code § Viruses § Worms § Macro viruses and macro worms § Trojan horses 12.5 Type of Threats and Attacks (Cont.)
  • 14. 14 Figure 12-1 Using Zombies in a Distributed Denial of Service Attack Home
  • 15. 15 13.6 Security Risk Management n Common mistakes in managing their security risks (McConnell 2002): n Undervalued information n Narrowly defined security boundaries n Reactive security management n Dated security management processes n Lack of communication about security responsibilities n Security risk management: A systematic process for determining the likelihood of various security attacks and for identifying the actions needed to prevent or mitigate those attacks
  • 16. 16 § Definitions involved in risk management § Assets—anything of value worth securing § Threat—eventuality representing danger to an asset § Vulnerability—weakness in a safeguard § Required to determine security needs § 4 phases of risk management § Assessment § Planning § Implementation § Monitoring
  • 17. 17 § Assessment phase evaluation of assets, threats, vulnerabilities § Determine organizational objectives § Inventory assets § Delineate threats § Identify vulnerabilities § Quantify the value of each risk § Planning phase of risk management arrive at a set of security policies § Define specific policies § Establish processes for audit and review § Establish an incident response team and contingency plan 13.6 Security Risk Management (cont.)
  • 18. 18 13.6 Security Risk Management (cont.) § Implementation phase of risk management choose particular technologies to deal with high priority threats § Monitoring phase of risk management ongoing processes used to determine which measures are successful, unsuccessful and need modification Home
  • 19. 19 13.7 Security Technology Securing EC Communication n Authentication system: System that identifies the legitimate parties to a transaction, determines the actions they are allowed to perform, and limits their actions to only those that are necessary to initiate and complete the transaction
  • 20. 20 Biometric systems: Authentication systems that identify a person by measurement of a biological characteristic such as a fingerprint, iris (eye) pattern, facial features, or voice Physiological biometric (fingerprint, iris, voice) Behavioral biometric (keystroke monitoring) Encryption: The process of scrambling (encrypting) a message in such a way that it is difficult, expensive, or time-consuming for an unauthorized person to unscramble (decrypt) it Security Protocol n Secure Socket Layer (SSL): Protocol that utilizes standard certificates for authentication and data encryption to ensure privacy or confidentiality n Transport Layer Security (TLS): As of 1996, another name for the SSL protocol n Secure Electronic Transaction (SET): A protocol designed to provide secure online credit card transactions for both consumers and merchants; developed jointly by Netscape, Visa, MasterCard, and others
  • 21. 21 Securing EC Networks n Firewall: A network node consisting of both hardware and software that isolates a private network from a public network n Virtual private network (VPN): A network that uses the public Internet to carry information but remains private by using encryption to scramble the communications, authentication to ensure that information has not been tampered with, and access control to verify the identity of anyone using the network n Intrusion detection systems (IDSs): A special category of software that can monitor activity across a network or on a host computer, watch for suspicious activity, and take automated action based on what it sees
  • 22. 22 Figure 13-6 Application-Level Proxy (Bastion Gateway Host)
  • 24. 24 Figure 13-8 Screen Subnet Firewall (with DMZ) Home
  • 25. 25 13.8 Managerial Issues 1. Have we budgeted enough for security? 2. What are the business consequences of poor security? 3. Which e-commerce sites are vulnerable to attack? 4. What is the key to establishing strong e-commerce security? 5. What steps should businesses follow inestablishing a security plan? 6. Should organizations be concerned with internal security threats? Home
  • 26. 26
  • 27. 27