SlideShare a Scribd company logo
1 of 30
Download to read offline
1 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
1 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Securing Online Transactions
Simplifying Security.
Module 8
Alireza Ghahrood
Security Solution Provider :
Cyber Space |BigData |Cloud |Virtualization
www.about.me/alirezaghahrood
| Cell :+98 (912) 1964383 |
2 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
OddJob, Zeus Mitmo Trojans Target Financial Data
Hide your bank account details, as two new pieces of banking malware are making the rounds: the
OddJob Trojan, which keeps banking sessions open after users log out, as well as a variant of Zeus
Mitmo that targets Symbian and BlackBerry smartphones.
On Tuesday, browser security firm Trusteer warned that the OddJob malware could keep banking Web
site sessions open even after users thought they'd logged off. "By tapping the session ID token ‐‐ which
banks use to identify a user's online banking session ‐‐ the fraudsters can electronically impersonate the
legitimate user and complete a range of banking operations," according to a blog post from Amit Klein,
CTO of security firm Trusteer.
Trusteer discovered OddJob several months ago, but
withheld disclosing details until law enforcement
agencies concluded related investigations. It said that
the malware has targeted customers in the
United States, Poland, and Denmark, and appeared to be the work of criminals based in eastern Europe.
http://www.informationweek.com
3
C O P Y R I G H T © B Y EC-COUNCIL
A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
3 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
4
C O P Y R I G H T © B Y EC-COUNCIL
A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
MODULE
OBJECTIVES
Online Shopping
How Online Shopping Works?
Online Banking
Securing Online Transactions
Choosing a Secure Online
Payment Service
SSL and the Padlock Symbol
Identifying a Trustworthy Website
Identifying an Untrustworthy
Website
McAfee’s SiteAdvisor
Online Transactions Security
Checklist
4 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Online
Shopping
Online
Banking
Securing
Online
Transactions
SSL and the
Padlock
Symbol
Identifying a
Trustworthy
Website
Choosing a
Secure Online
Payment
Service
Identifying an
Untrustworthy
Website
Online
Transactions
Security
Checklist
How Online
Shopping
Works?
5
C O P Y R I G H T © B Y EC-COUNCIL
A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
MODULE
FLOW
5 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
5 Copyright © by EC-Council
served. Reproduction is Strictly Prohibited.All Rights Re
ONLINE
SHOPPINGOnline shopping is the
process of buying
goods and services
directly from the seller
over the Internet
The benefits of online shopping are:
Usually available 24 hours a day
Describe products with text, photos, and multimedia files
Quickly seek out deals for items/services with several vendors
Purchase a product without actually travelling to the store using a
credit/debit card
The ease of shopping and
facility to compare the
products and prices online
has made online shopping
an attractive option for
consumers
6 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
How Online
ShoppingWorks?
1
Users visit the e‐commerce site where
they wish to buy goods/products from
Users browse for the required product
through the online catalogue2
7
C O P Y R I G H T © B Y EC-COUNCIL
A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
7 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
8
C O P Y R I G H T © B Y EC-COUNCIL
A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
HOW ONLINE
SHOPPING
WORKS?
3
They add the product/service to the shopping cart
The shopping cart shows:
The products being purchased
The number of units of the product
The price of the product, taxes
(inclusive/exclusive)
Shipping costs, etc.
They fill in the online order form with:
Shipping information
Shipping address
Consumer name
Billing address and its details
Credit card details
Any other information the merchant requires
4
8 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
8 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
5
The user’s credit card information
is encrypted and sent to the
merchant
The user receives an on‐screen
confirmation or/and a
confirmation e‐mail
HOW ONLINE
SHOPPING
WORKS?
9 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
ONLINE
BANKING
10
C O P Y R I G H T © B Y EC-COUNCIL
A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
Online banking is the method of making bank transactions or
paying bills over the Internet
It allows the user to make deposits, withdrawals, and pay bills
with a single click of the mouse
Advantages
Online banking allows you
to perform transactions, pay
bills, and check balances
24x7
Online banking is fast,
efficient, and effective
Disadvantages
Online banking sites can take a
while to start up and can be
tricky for the beginner
The customer may have a
doubt that his/her transaction
was successful
10 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Online
Shopping
Online
Banking
Securing
Online
Transactions
SSL and the
Padlock
Symbol
Identifying a
Trustworthy
Website
Choosing a
Secure Online
Payment
Service
Identifying an
Untrustworthy
Website
How Online
Shopping
Works?
11
C O P Y R I G H T © B Y EC-COUNCIL
A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
MODULE
FLOW
Online
Transactions
Security
Checklist
11 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
12
C O P Y R I G H T © B Y EC-COUNCIL
A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
CREDIT CARD
PAYMENTSCredit cards are still the preferred
means for online purchases
because of ease of use and the
ability to pay the bills at a later
date
Credit cards are issued by a credit
card issuing bank or credit union
after verifying the user’s
credentials
The card user agrees to pay
the card issuer the amount
used for making the purchase
The cardholder indicates
consent to pay by signing a
receipt with a record of the
card details and indicating the
amount to be paid or by
entering a personal
identification number (PIN)
or Card Verification Value
(CVV or CVV2)
12 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Card‐not‐present (CNP) fraud
An offender obtains credit card details and then
purchases goods and services over the Internet or by
telephone, fax, or email
Cash machine fraud
The offender tampers with the cash machine and
then tricks the user into entering the pin in their
presence
Shoulder‐surfing
The offender oversees the user entering PIN at
the machine
Identity theft
The offender uses fraudulently obtained personal
information of a credit card holder to access credit
card accounts
Credit card mail order fraud
The offender gathers information about a card holder and sends a
request to the bank for a new or replacement card
Skimming/counterfeit credit card
Electronically copying authentic data on a card's magnetic stripe
to another card without the genuine card holder’s knowledge
Chargeback fraud
Genuine credit card holder uses the card to purchase goods or
services, and when bank statements are issued, they call the bank and
claim that they never authorized the transaction
Lost and stolen card fraud
Card is physically stolen or lost and then used by the offender
13
C O P Y R I G H T © B Y EC-COUNCIL
A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
TYPES OF
CREDIT CARD
FRAUDS
CREDIT CARD FRAUDS REFER TO THE ACTS OF
MAKING PURCHASES USING SOMEONE ELSE'S
CREDIT CARD INFORMATION
13 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
14
C O P Y R I G H T © B Y EC-COUNCIL
A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
GUIDELINES FOR
ENSURING CREDIT
CARD SAFETYBefore You Shop
1. Check if the site is of a known business
entity (e.g., GAP)
2. Check for a third‐party seal of trust
(e.g., VeriSign, eTrust)
3. Check reviews of other shoppers (e.g.,
www.epinions.com)
4. Review the privacy statement
5. Use only one credit card for all your
online purchases
6. Keep records of your online
transactions
7. Do not share your credit card
information with anyone
While You Shop
1. Disclose only required personal
information. Be discreet.
2. Ensure that you are using a secure
computer and using a secure site
3. Adopt a strong password
4. Use one‐click shopping cautiously
5. Check for a confirmation email after an
online purchase/transaction/payment
14 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Stored Value Cards
Stored‐value cards are plastic cards
with a monetary value encoded in the
magnetic strip
They are an effective replacement for
cash and can be used for low‐value
retail purchases
They are not associated with the name
of the user, hence they do not reveal
any information about the customer
Even if lost, the consumer tends to lose
only the value that is still unused
Smart Cards
Smart cards are the same size as a
credit card
They have a microprocessor in them,
which differentiates them from a credit
card (which has a magnetic strip)
The data on the magnetic stripe can be
read, deleted, or even changed
Smart cards can be used with smart‐
card reader attached to a personal
computer to authenticate a user
Online transactions can be secured by using the alternatives to credit cards
SECURING
ONLINE
TRANSACTIONS
15
C O P Y R I G H T © B Y EC-COUNCIL
A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
15 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Digital Cash
Digital cash is a method of purchasing cash
credits in small amounts
Cash credits can be stored in your computer
and spent when making electronic
purchases on the Internet
The consumer can buy the credits from a
financial institution
Digital cash is associated with a serial
number that can be used for online
transactions
Sending the serial number does not give out
any personal information
E‐Wallets
E‐Wallet is a software program used for
online transactions
Once the software is installed, personal
information can be filled out in the E‐wallet
and stored
When the user orders something, the order
form can be automatically completed using
the wallet
This helps prevent the theft of personal
information
By default, most of the electronic wallet
software requests users to enter a
password before completing the form
16
C O P Y R I G H T © B Y EC-COUNCIL
A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
SECURING
ONLINE
TRANSACTIONS
16 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
SECURING
ONLINE
TRANSACTIONS
17
C O P Y R I G H T © B Y EC-COUNCIL
A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
Online Payment Services
Third‐party payment services can be used to
make online payments to avoid giving away
credit card information to the merchant directly
When using an online payment service, the
user should transfer money to an account
associated with the online payment service
All the purchases and transactions can be
carried out through this account
 This way the customer does not have to reveal
credit card information or other personal details to
the merchants
17 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
1
2
3
4
Choosing a Secure Online
Payment Service
Make sure that the payment service
is legitimate/registered
Check the reviews of these services
at websites such as Epinions.com or
BizRate.com
Look at the payment service's website for
seals of approval from TRUSTe, VeriSign, or
Better Business Bureau Online (BBBOnline)
Ensure that the website uses encryption
technology to help protect your
information
18
C O P Y R I G H T © B Y EC-COUNCIL
A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
18 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Online Payment Services
https://www.paypal.com http://www.amazon.com
http://www.worldpay.com http://www.2checkout.com
19
C O P Y R I G H T © B Y EC-COUNCIL
A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
19 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
SSL and the Padlock Symbol
Secure Sockets
Layer (SSL) is the
standard security
technology for creating
an encrypted link
between a web
server and a
browser
This link ensures
that all information
transmitted between
the web server and the
browser is secured
The Padlock symbol is
an indicator that the
session is protected by
the SSL encryption
Padlock Symbol
20
C O P Y R I G H T © B Y EC-COUNCIL
A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
20 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
20 Copyright © by EC-Council
served. Reproduction is Strictly Prohibited.All Rights Re
WHAT DOES THE
SSL SHOW?
If the browser encounters an untrustworthy certificate authority, a site warning is displayed
Details of the
certification
authority that
issued the
certificate
Expiration
date of the
certificate
Name and
address of the
company
Domain name
of the
company
21 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Online
Shopping
Online
Banking
Securing
Online
Transactions
SSL and the
Padlock
Symbol
Identifying a
Trustworthy
Website
Choosing a
Secure Online
Payment
Service
Identifying an
Untrustworthy
Website
How Online
Shopping
Works?
22
C O P Y R I G H T © B Y EC-COUNCIL
A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
MODULE
FLOW
Online
Transactions
Security
Checklist
22 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Identifying a TrustworthyWebsite
A secure site usually begins with the prefix https
The Padlock symbol appears either at the bottom right in the browser or beside
the URL
The certificate used to encrypt the connection also contains information about
the identity of the website owner or organization
The user can click the lock to view the identity of the website
Padlock
symbol
https
23
C O P Y R I G H T © B Y EC-COUNCIL
A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
23 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
23 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
IDENTIFYING A
TRUSTWORTHY
WEBSITE
Clicking the Padlock symbol reveals the website
information
Click View Certificate to view the authenticity
of the certificate
Certification authority
24 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
24 Copyright © by EC-Council
IDENTIFYING AN
UNTRUSTWORTH
Y WEBSITEUntrustworthy websites are generally referred to the user
through an email message from someone unknown
The website presents objectionable content, such as
pornography or illegal materials
The website offers schemes that seem too good to be true,
indicating a possible scam
When the user is asked for a credit card to verify his/her
identity or for personal information when it's not necessary
When the user is asked for credit card information without any
proof that the transaction has been secured
All Rights Reserved. Reproduction is Strictly Prohibited.
25 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
25 Copyright © by EC-Counc
All Rights Reserved. Reproduction is Strictly Prohibite
MCAFEE’
S
SITEADVI
SORMcAfee’s SiteAdvisor software is a
free browser plug‐in that gives safety
advice about websites before the
user clicks a risky site
Once the software is installed, small
site‐rating icons are added to the
user’s search results
These site ratings are based on tests
conducted by McAfee using an array
of computers that look for various
threats
The icons alert the user of the
potential risky sites and help
him/her find safer alternatives http://www.siteadvisor.com
il
d.
26 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
RATING ICONS
27
C O P Y R I G H T © B Y EC-COUNCIL
A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
McAfee SECURE: Tested daily for hacker
vulnerabilities
WARNING: Serious risk issues
SAFE: Very low or no risk issues
CAUTION: Minor risk issues
UNKNOWN: Not yet rated. Use caution
27 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
MODULE
SUMMARY
28
C O P Y R I G H T © B Y EC-COUNCIL
A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
 The ease of shopping and comparing the products and prices online has made
online shopping an attractive option for consumers
 Online banking allows the user to make deposits, withdrawals, and pay bills with a
single click of the mouse
 The consumer has to take all the necessary steps to ensure that the credit card
information is not compromised
 Using third‐party payment services avoids giving your credit card information to
the merchant directly
 The Padlock symbol is an indicator that the session is protected by the SSL
encryption
28 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Regularly update your operating system and other installed applications
Ensure that you have the latest web browser installed in the system
Ensure that you are connected to a secured network when using a wireless
network
Regularly scan your system for viruses, worms, Trojans, spyware, key loggers
and other malware using updated anti‐virus
Use strong passwords for all online transactions and keep them changing at regular
interval
Use Virtual Keyboard to enter sensitive information
Do not perform online transactions from public systems Always
ONLINE
TRANSACTIONS
SECURITY
CHECKLIST
29
C O P Y R I G H T © B Y EC-COUNCIL
A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
29 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
ONLINE
TRANSACTIONS
SECURITY
CHECKLIST
30
C O P Y R I G H T © B Y EC-COUNCIL
A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
Never respond to unsolicited email offers or requests for information
Use browser filters that warn about reported phishing sites and block access
to the addresses
Register for the bank's mobile alert service to get alerts whenever there
is a significant transaction
Protect yourself from identity theft
Always check the address bar for the correct URL
Always check for the website certificate, SSL padlocks, and HTTPs

More Related Content

What's hot

What is sim swipe fraud
What is sim swipe fraudWhat is sim swipe fraud
What is sim swipe fraudCyberSangam
 
Beware of Scam Artists - Recognize Them Before They Get You!
Beware of Scam Artists - Recognize Them Before They Get You!Beware of Scam Artists - Recognize Them Before They Get You!
Beware of Scam Artists - Recognize Them Before They Get You!Narayan Makaram
 
PhishingandPharming
PhishingandPharmingPhishingandPharming
PhishingandPharmingDawn Hicks
 
Phishing, Pharming, Clickjacking
Phishing, Pharming, ClickjackingPhishing, Pharming, Clickjacking
Phishing, Pharming, ClickjackingAshley_Coy
 
RSA Online Fraud Report - August 2014
RSA Online Fraud Report - August 2014RSA Online Fraud Report - August 2014
RSA Online Fraud Report - August 2014EMC
 
Fonreg presentation - official
Fonreg presentation - officialFonreg presentation - official
Fonreg presentation - officialAyodele Thomas
 
ICE Homeland Security Complaint on Director Olli Saarela
ICE Homeland Security Complaint on Director Olli SaarelaICE Homeland Security Complaint on Director Olli Saarela
ICE Homeland Security Complaint on Director Olli SaarelaSOCIAL SHOPPING NETWORK
 
Identity as easy as LMNOP
Identity as easy as LMNOPIdentity as easy as LMNOP
Identity as easy as LMNOPEric Sachs
 
Cyber Crime Campain Messages_Poster_Final
Cyber Crime Campain Messages_Poster_FinalCyber Crime Campain Messages_Poster_Final
Cyber Crime Campain Messages_Poster_FinalSiphiwe Msibi
 
Driving Payment Innovation - Know Your Enemy
Driving Payment Innovation - Know Your EnemyDriving Payment Innovation - Know Your Enemy
Driving Payment Innovation - Know Your EnemyFirst Atlantic Commerce
 
SOUTHERN DISTRICT OF NEW YORK
SOUTHERN DISTRICT OF NEW YORKSOUTHERN DISTRICT OF NEW YORK
SOUTHERN DISTRICT OF NEW YORKFinance Magnates
 
Tradewin. tieng anh.online
Tradewin. tieng anh.onlineTradewin. tieng anh.online
Tradewin. tieng anh.onlinequanganhnguy
 
Fraud seminar for charities
Fraud seminar for charitiesFraud seminar for charities
Fraud seminar for charitiesBlake Morgan LLP
 

What's hot (18)

Hacking the world
Hacking the worldHacking the world
Hacking the world
 
Canadian Consumer Handbook
Canadian Consumer HandbookCanadian Consumer Handbook
Canadian Consumer Handbook
 
What is sim swipe fraud
What is sim swipe fraudWhat is sim swipe fraud
What is sim swipe fraud
 
Beware of Scam Artists - Recognize Them Before They Get You!
Beware of Scam Artists - Recognize Them Before They Get You!Beware of Scam Artists - Recognize Them Before They Get You!
Beware of Scam Artists - Recognize Them Before They Get You!
 
PhishingandPharming
PhishingandPharmingPhishingandPharming
PhishingandPharming
 
Identity theft godwin oyedokun
Identity theft   godwin oyedokunIdentity theft   godwin oyedokun
Identity theft godwin oyedokun
 
Phishing, Pharming, Clickjacking
Phishing, Pharming, ClickjackingPhishing, Pharming, Clickjacking
Phishing, Pharming, Clickjacking
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
RSA Online Fraud Report - August 2014
RSA Online Fraud Report - August 2014RSA Online Fraud Report - August 2014
RSA Online Fraud Report - August 2014
 
Internet Fraud
Internet FraudInternet Fraud
Internet Fraud
 
Fonreg presentation - official
Fonreg presentation - officialFonreg presentation - official
Fonreg presentation - official
 
ICE Homeland Security Complaint on Director Olli Saarela
ICE Homeland Security Complaint on Director Olli SaarelaICE Homeland Security Complaint on Director Olli Saarela
ICE Homeland Security Complaint on Director Olli Saarela
 
Identity as easy as LMNOP
Identity as easy as LMNOPIdentity as easy as LMNOP
Identity as easy as LMNOP
 
Cyber Crime Campain Messages_Poster_Final
Cyber Crime Campain Messages_Poster_FinalCyber Crime Campain Messages_Poster_Final
Cyber Crime Campain Messages_Poster_Final
 
Driving Payment Innovation - Know Your Enemy
Driving Payment Innovation - Know Your EnemyDriving Payment Innovation - Know Your Enemy
Driving Payment Innovation - Know Your Enemy
 
SOUTHERN DISTRICT OF NEW YORK
SOUTHERN DISTRICT OF NEW YORKSOUTHERN DISTRICT OF NEW YORK
SOUTHERN DISTRICT OF NEW YORK
 
Tradewin. tieng anh.online
Tradewin. tieng anh.onlineTradewin. tieng anh.online
Tradewin. tieng anh.online
 
Fraud seminar for charities
Fraud seminar for charitiesFraud seminar for charities
Fraud seminar for charities
 

Similar to Securing Online Transactions Module

Fraud Prevention in International Commerce
Fraud Prevention in International CommerceFraud Prevention in International Commerce
Fraud Prevention in International CommerceSecure Trading
 
Electronic transaction final
Electronic transaction finalElectronic transaction final
Electronic transaction finalShikhaLohchab1
 
eCommerce Summit Atlanta Moneybookers Presentation
eCommerce Summit Atlanta Moneybookers PresentationeCommerce Summit Atlanta Moneybookers Presentation
eCommerce Summit Atlanta Moneybookers PresentationeCommerce Merchants
 
Ce hv6 module 58 credit card frauds
Ce hv6 module 58 credit card fraudsCe hv6 module 58 credit card frauds
Ce hv6 module 58 credit card fraudsVi Tính Hoàng Nam
 
Strong Authentication for Payments
Strong Authentication for PaymentsStrong Authentication for Payments
Strong Authentication for PaymentsSrivatsan Srinivasan
 
MIS 10 Electronic Payment System
MIS 10 Electronic Payment SystemMIS 10 Electronic Payment System
MIS 10 Electronic Payment SystemTushar B Kute
 
payment gateway for tech support
payment gateway for tech supportpayment gateway for tech support
payment gateway for tech supportKristinajozy
 
S.m.o.k.e. technologies
S.m.o.k.e. technologiesS.m.o.k.e. technologies
S.m.o.k.e. technologiesshub99
 
electronicpaymentsystem-12697023522629-phpapp01.pdf
electronicpaymentsystem-12697023522629-phpapp01.pdfelectronicpaymentsystem-12697023522629-phpapp01.pdf
electronicpaymentsystem-12697023522629-phpapp01.pdfUjwalReddyPB
 
Smart card emv for dummies
Smart card emv for dummiesSmart card emv for dummies
Smart card emv for dummiesBACKSEATRIDER
 
Unicorn Business Plans - Blockchain Pitch Deck
Unicorn Business Plans - Blockchain Pitch DeckUnicorn Business Plans - Blockchain Pitch Deck
Unicorn Business Plans - Blockchain Pitch DeckUnicorn Business Plans
 
Ultimate Guide on Card Not Present (CNP) Fraud.pptx
Ultimate Guide on Card Not Present (CNP) Fraud.pptxUltimate Guide on Card Not Present (CNP) Fraud.pptx
Ultimate Guide on Card Not Present (CNP) Fraud.pptxFTx Identity
 
Electronic payment System
Electronic payment SystemElectronic payment System
Electronic payment SystemRajat Sharma
 
Online payment system
Online payment systemOnline payment system
Online payment systemmyangel27
 
methods of e payment system
methods of e payment systemmethods of e payment system
methods of e payment systemAnju Jaiswal
 
Review on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment GatewayReview on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment GatewayIRJET Journal
 
Understanding Dynamic Chinese Online Payments Market
Understanding Dynamic Chinese Online Payments MarketUnderstanding Dynamic Chinese Online Payments Market
Understanding Dynamic Chinese Online Payments MarketChristopher Uriarte
 

Similar to Securing Online Transactions Module (20)

Fraud Prevention in International Commerce
Fraud Prevention in International CommerceFraud Prevention in International Commerce
Fraud Prevention in International Commerce
 
Electronic transaction final
Electronic transaction finalElectronic transaction final
Electronic transaction final
 
eCommerce Summit Atlanta Moneybookers Presentation
eCommerce Summit Atlanta Moneybookers PresentationeCommerce Summit Atlanta Moneybookers Presentation
eCommerce Summit Atlanta Moneybookers Presentation
 
E transaction
E transactionE transaction
E transaction
 
Ce hv6 module 58 credit card frauds
Ce hv6 module 58 credit card fraudsCe hv6 module 58 credit card frauds
Ce hv6 module 58 credit card frauds
 
Strong Authentication for Payments
Strong Authentication for PaymentsStrong Authentication for Payments
Strong Authentication for Payments
 
MIS 10 Electronic Payment System
MIS 10 Electronic Payment SystemMIS 10 Electronic Payment System
MIS 10 Electronic Payment System
 
payment gateway for tech support
payment gateway for tech supportpayment gateway for tech support
payment gateway for tech support
 
S.m.o.k.e. technologies
S.m.o.k.e. technologiesS.m.o.k.e. technologies
S.m.o.k.e. technologies
 
electronicpaymentsystem-12697023522629-phpapp01.pdf
electronicpaymentsystem-12697023522629-phpapp01.pdfelectronicpaymentsystem-12697023522629-phpapp01.pdf
electronicpaymentsystem-12697023522629-phpapp01.pdf
 
Smart card emv for dummies
Smart card emv for dummiesSmart card emv for dummies
Smart card emv for dummies
 
Unicorn Business Plans - Blockchain Pitch Deck
Unicorn Business Plans - Blockchain Pitch DeckUnicorn Business Plans - Blockchain Pitch Deck
Unicorn Business Plans - Blockchain Pitch Deck
 
Electronic payment by ahmad
Electronic payment by ahmadElectronic payment by ahmad
Electronic payment by ahmad
 
Ultimate Guide on Card Not Present (CNP) Fraud.pptx
Ultimate Guide on Card Not Present (CNP) Fraud.pptxUltimate Guide on Card Not Present (CNP) Fraud.pptx
Ultimate Guide on Card Not Present (CNP) Fraud.pptx
 
Electronic payment System
Electronic payment SystemElectronic payment System
Electronic payment System
 
Online payment system
Online payment systemOnline payment system
Online payment system
 
methods of e payment system
methods of e payment systemmethods of e payment system
methods of e payment system
 
Tushar nevaskar
Tushar nevaskarTushar nevaskar
Tushar nevaskar
 
Review on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment GatewayReview on Fraud Detection in Electronic Payment Gateway
Review on Fraud Detection in Electronic Payment Gateway
 
Understanding Dynamic Chinese Online Payments Market
Understanding Dynamic Chinese Online Payments MarketUnderstanding Dynamic Chinese Online Payments Market
Understanding Dynamic Chinese Online Payments Market
 

More from Alireza Ghahrood

Manipulating Social Media to Undermine Democracy 2017 Final
Manipulating Social Media to Undermine Democracy 2017 Final Manipulating Social Media to Undermine Democracy 2017 Final
Manipulating Social Media to Undermine Democracy 2017 Final Alireza Ghahrood
 
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...Alireza Ghahrood
 
Fighting in the “Grey Zone”: Lessons from Russian Influence Operations in Ukr...
Fighting in the “Grey Zone”: Lessons from Russian Influence Operations in Ukr...Fighting in the “Grey Zone”: Lessons from Russian Influence Operations in Ukr...
Fighting in the “Grey Zone”: Lessons from Russian Influence Operations in Ukr...Alireza Ghahrood
 
NATO - Robotrolling Report.NATO Strategic Communications Centre of Excellence
NATO - Robotrolling Report.NATO Strategic Communications Centre of ExcellenceNATO - Robotrolling Report.NATO Strategic Communications Centre of Excellence
NATO - Robotrolling Report.NATO Strategic Communications Centre of ExcellenceAlireza Ghahrood
 
DIGITAL HYDRA: SECURITY IMPLICATIONS OF FALSE INFORMATION ONLINE
DIGITAL HYDRA: SECURITY IMPLICATIONS OF FALSE INFORMATION ONLINEDIGITAL HYDRA: SECURITY IMPLICATIONS OF FALSE INFORMATION ONLINE
DIGITAL HYDRA: SECURITY IMPLICATIONS OF FALSE INFORMATION ONLINEAlireza Ghahrood
 
Optional Reading - Symantec Stuxnet Dossier
Optional Reading - Symantec Stuxnet DossierOptional Reading - Symantec Stuxnet Dossier
Optional Reading - Symantec Stuxnet DossierAlireza Ghahrood
 
MIT Open Access Articles Why Employees (Still) Click on Phishing Links: An In...
MIT Open Access Articles Why Employees (Still) Click on Phishing Links: An In...MIT Open Access Articles Why Employees (Still) Click on Phishing Links: An In...
MIT Open Access Articles Why Employees (Still) Click on Phishing Links: An In...Alireza Ghahrood
 
http://www.neetuchoudhary.com/
http://www.neetuchoudhary.com/http://www.neetuchoudhary.com/
http://www.neetuchoudhary.com/Alireza Ghahrood
 
Power your businesswith risk informed decisions
Power your businesswith risk informed decisionsPower your businesswith risk informed decisions
Power your businesswith risk informed decisionsAlireza Ghahrood
 
Effectively Manage and Continuously Monitor Tech and Cyber Risk and Compliance
Effectively Manage and Continuously Monitor Tech and Cyber Risk and ComplianceEffectively Manage and Continuously Monitor Tech and Cyber Risk and Compliance
Effectively Manage and Continuously Monitor Tech and Cyber Risk and ComplianceAlireza Ghahrood
 
participatea in the identity management lifecycle
participatea in the identity management lifecycleparticipatea in the identity management lifecycle
participatea in the identity management lifecycleAlireza Ghahrood
 
implement authentication mechanisms
implement authentication mechanismsimplement authentication mechanisms
implement authentication mechanismsAlireza Ghahrood
 
BancoEstado Accelerates Digital Transformation with Cloud-based MFA & Card Is...
BancoEstado Accelerates Digital Transformation with Cloud-based MFA & Card Is...BancoEstado Accelerates Digital Transformation with Cloud-based MFA & Card Is...
BancoEstado Accelerates Digital Transformation with Cloud-based MFA & Card Is...Alireza Ghahrood
 
Identity and Access Management Solutions for Financial Institutions
Identity and Access Management Solutions for Financial InstitutionsIdentity and Access Management Solutions for Financial Institutions
Identity and Access Management Solutions for Financial InstitutionsAlireza Ghahrood
 
Cscu module 12 information security and legal compliance
Cscu module 12 information security and legal complianceCscu module 12 information security and legal compliance
Cscu module 12 information security and legal complianceAlireza Ghahrood
 
Cscu module 06 internet security
Cscu module 06 internet securityCscu module 06 internet security
Cscu module 06 internet securityAlireza Ghahrood
 
Cscu module 07 securing network connections
Cscu module 07 securing network connectionsCscu module 07 securing network connections
Cscu module 07 securing network connectionsAlireza Ghahrood
 
Cscu module 05 data backup and disaster recovery
Cscu module 05 data backup and disaster recoveryCscu module 05 data backup and disaster recovery
Cscu module 05 data backup and disaster recoveryAlireza Ghahrood
 

More from Alireza Ghahrood (20)

Manipulating Social Media to Undermine Democracy 2017 Final
Manipulating Social Media to Undermine Democracy 2017 Final Manipulating Social Media to Undermine Democracy 2017 Final
Manipulating Social Media to Undermine Democracy 2017 Final
 
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
 
Fighting in the “Grey Zone”: Lessons from Russian Influence Operations in Ukr...
Fighting in the “Grey Zone”: Lessons from Russian Influence Operations in Ukr...Fighting in the “Grey Zone”: Lessons from Russian Influence Operations in Ukr...
Fighting in the “Grey Zone”: Lessons from Russian Influence Operations in Ukr...
 
NATO - Robotrolling Report.NATO Strategic Communications Centre of Excellence
NATO - Robotrolling Report.NATO Strategic Communications Centre of ExcellenceNATO - Robotrolling Report.NATO Strategic Communications Centre of Excellence
NATO - Robotrolling Report.NATO Strategic Communications Centre of Excellence
 
DIGITAL HYDRA: SECURITY IMPLICATIONS OF FALSE INFORMATION ONLINE
DIGITAL HYDRA: SECURITY IMPLICATIONS OF FALSE INFORMATION ONLINEDIGITAL HYDRA: SECURITY IMPLICATIONS OF FALSE INFORMATION ONLINE
DIGITAL HYDRA: SECURITY IMPLICATIONS OF FALSE INFORMATION ONLINE
 
ANT Catalog
ANT CatalogANT Catalog
ANT Catalog
 
Optional Reading - Symantec Stuxnet Dossier
Optional Reading - Symantec Stuxnet DossierOptional Reading - Symantec Stuxnet Dossier
Optional Reading - Symantec Stuxnet Dossier
 
MIT Open Access Articles Why Employees (Still) Click on Phishing Links: An In...
MIT Open Access Articles Why Employees (Still) Click on Phishing Links: An In...MIT Open Access Articles Why Employees (Still) Click on Phishing Links: An In...
MIT Open Access Articles Why Employees (Still) Click on Phishing Links: An In...
 
http://www.neetuchoudhary.com/
http://www.neetuchoudhary.com/http://www.neetuchoudhary.com/
http://www.neetuchoudhary.com/
 
Power your businesswith risk informed decisions
Power your businesswith risk informed decisionsPower your businesswith risk informed decisions
Power your businesswith risk informed decisions
 
Effectively Manage and Continuously Monitor Tech and Cyber Risk and Compliance
Effectively Manage and Continuously Monitor Tech and Cyber Risk and ComplianceEffectively Manage and Continuously Monitor Tech and Cyber Risk and Compliance
Effectively Manage and Continuously Monitor Tech and Cyber Risk and Compliance
 
participatea in the identity management lifecycle
participatea in the identity management lifecycleparticipatea in the identity management lifecycle
participatea in the identity management lifecycle
 
implement access controls
implement access controlsimplement access controls
implement access controls
 
implement authentication mechanisms
implement authentication mechanismsimplement authentication mechanisms
implement authentication mechanisms
 
BancoEstado Accelerates Digital Transformation with Cloud-based MFA & Card Is...
BancoEstado Accelerates Digital Transformation with Cloud-based MFA & Card Is...BancoEstado Accelerates Digital Transformation with Cloud-based MFA & Card Is...
BancoEstado Accelerates Digital Transformation with Cloud-based MFA & Card Is...
 
Identity and Access Management Solutions for Financial Institutions
Identity and Access Management Solutions for Financial InstitutionsIdentity and Access Management Solutions for Financial Institutions
Identity and Access Management Solutions for Financial Institutions
 
Cscu module 12 information security and legal compliance
Cscu module 12 information security and legal complianceCscu module 12 information security and legal compliance
Cscu module 12 information security and legal compliance
 
Cscu module 06 internet security
Cscu module 06 internet securityCscu module 06 internet security
Cscu module 06 internet security
 
Cscu module 07 securing network connections
Cscu module 07 securing network connectionsCscu module 07 securing network connections
Cscu module 07 securing network connections
 
Cscu module 05 data backup and disaster recovery
Cscu module 05 data backup and disaster recoveryCscu module 05 data backup and disaster recovery
Cscu module 05 data backup and disaster recovery
 

Recently uploaded

Fertilization: Sperm and the egg—collectively called the gametes—fuse togethe...
Fertilization: Sperm and the egg—collectively called the gametes—fuse togethe...Fertilization: Sperm and the egg—collectively called the gametes—fuse togethe...
Fertilization: Sperm and the egg—collectively called the gametes—fuse togethe...D. B. S. College Kanpur
 
REVISTA DE BIOLOGIA E CIÊNCIAS DA TERRA ISSN 1519-5228 - Artigo_Bioterra_V24_...
REVISTA DE BIOLOGIA E CIÊNCIAS DA TERRA ISSN 1519-5228 - Artigo_Bioterra_V24_...REVISTA DE BIOLOGIA E CIÊNCIAS DA TERRA ISSN 1519-5228 - Artigo_Bioterra_V24_...
REVISTA DE BIOLOGIA E CIÊNCIAS DA TERRA ISSN 1519-5228 - Artigo_Bioterra_V24_...Universidade Federal de Sergipe - UFS
 
User Guide: Orion™ Weather Station (Columbia Weather Systems)
User Guide: Orion™ Weather Station (Columbia Weather Systems)User Guide: Orion™ Weather Station (Columbia Weather Systems)
User Guide: Orion™ Weather Station (Columbia Weather Systems)Columbia Weather Systems
 
Microphone- characteristics,carbon microphone, dynamic microphone.pptx
Microphone- characteristics,carbon microphone, dynamic microphone.pptxMicrophone- characteristics,carbon microphone, dynamic microphone.pptx
Microphone- characteristics,carbon microphone, dynamic microphone.pptxpriyankatabhane
 
Manassas R - Parkside Middle School 🌎🏫
Manassas R - Parkside Middle School 🌎🏫Manassas R - Parkside Middle School 🌎🏫
Manassas R - Parkside Middle School 🌎🏫qfactory1
 
CHROMATOGRAPHY PALLAVI RAWAT.pptx
CHROMATOGRAPHY  PALLAVI RAWAT.pptxCHROMATOGRAPHY  PALLAVI RAWAT.pptx
CHROMATOGRAPHY PALLAVI RAWAT.pptxpallavirawat456
 
User Guide: Pulsar™ Weather Station (Columbia Weather Systems)
User Guide: Pulsar™ Weather Station (Columbia Weather Systems)User Guide: Pulsar™ Weather Station (Columbia Weather Systems)
User Guide: Pulsar™ Weather Station (Columbia Weather Systems)Columbia Weather Systems
 
Ai in communication electronicss[1].pptx
Ai in communication electronicss[1].pptxAi in communication electronicss[1].pptx
Ai in communication electronicss[1].pptxsubscribeus100
 
Four Spheres of the Earth Presentation.ppt
Four Spheres of the Earth Presentation.pptFour Spheres of the Earth Presentation.ppt
Four Spheres of the Earth Presentation.pptJoemSTuliba
 
《Queensland毕业文凭-昆士兰大学毕业证成绩单》
《Queensland毕业文凭-昆士兰大学毕业证成绩单》《Queensland毕业文凭-昆士兰大学毕业证成绩单》
《Queensland毕业文凭-昆士兰大学毕业证成绩单》rnrncn29
 
The dark energy paradox leads to a new structure of spacetime.pptx
The dark energy paradox leads to a new structure of spacetime.pptxThe dark energy paradox leads to a new structure of spacetime.pptx
The dark energy paradox leads to a new structure of spacetime.pptxEran Akiva Sinbar
 
Vision and reflection on Mining Software Repositories research in 2024
Vision and reflection on Mining Software Repositories research in 2024Vision and reflection on Mining Software Repositories research in 2024
Vision and reflection on Mining Software Repositories research in 2024AyushiRastogi48
 
Pests of Bengal gram_Identification_Dr.UPR.pdf
Pests of Bengal gram_Identification_Dr.UPR.pdfPests of Bengal gram_Identification_Dr.UPR.pdf
Pests of Bengal gram_Identification_Dr.UPR.pdfPirithiRaju
 
Davis plaque method.pptx recombinant DNA technology
Davis plaque method.pptx recombinant DNA technologyDavis plaque method.pptx recombinant DNA technology
Davis plaque method.pptx recombinant DNA technologycaarthichand2003
 
bonjourmadame.tumblr.com bhaskar's girls
bonjourmadame.tumblr.com bhaskar's girlsbonjourmadame.tumblr.com bhaskar's girls
bonjourmadame.tumblr.com bhaskar's girlshansessene
 
Servosystem Theory / Cybernetic Theory by Petrovic
Servosystem Theory / Cybernetic Theory by PetrovicServosystem Theory / Cybernetic Theory by Petrovic
Servosystem Theory / Cybernetic Theory by PetrovicAditi Jain
 
FREE NURSING BUNDLE FOR NURSES.PDF by na
FREE NURSING BUNDLE FOR NURSES.PDF by naFREE NURSING BUNDLE FOR NURSES.PDF by na
FREE NURSING BUNDLE FOR NURSES.PDF by naJASISJULIANOELYNV
 
GENERAL PHYSICS 2 REFRACTION OF LIGHT SENIOR HIGH SCHOOL GENPHYS2.pptx
GENERAL PHYSICS 2 REFRACTION OF LIGHT SENIOR HIGH SCHOOL GENPHYS2.pptxGENERAL PHYSICS 2 REFRACTION OF LIGHT SENIOR HIGH SCHOOL GENPHYS2.pptx
GENERAL PHYSICS 2 REFRACTION OF LIGHT SENIOR HIGH SCHOOL GENPHYS2.pptxRitchAndruAgustin
 
Thermodynamics ,types of system,formulae ,gibbs free energy .pptx
Thermodynamics ,types of system,formulae ,gibbs free energy .pptxThermodynamics ,types of system,formulae ,gibbs free energy .pptx
Thermodynamics ,types of system,formulae ,gibbs free energy .pptxuniversity
 
Pests of castor_Binomics_Identification_Dr.UPR.pdf
Pests of castor_Binomics_Identification_Dr.UPR.pdfPests of castor_Binomics_Identification_Dr.UPR.pdf
Pests of castor_Binomics_Identification_Dr.UPR.pdfPirithiRaju
 

Recently uploaded (20)

Fertilization: Sperm and the egg—collectively called the gametes—fuse togethe...
Fertilization: Sperm and the egg—collectively called the gametes—fuse togethe...Fertilization: Sperm and the egg—collectively called the gametes—fuse togethe...
Fertilization: Sperm and the egg—collectively called the gametes—fuse togethe...
 
REVISTA DE BIOLOGIA E CIÊNCIAS DA TERRA ISSN 1519-5228 - Artigo_Bioterra_V24_...
REVISTA DE BIOLOGIA E CIÊNCIAS DA TERRA ISSN 1519-5228 - Artigo_Bioterra_V24_...REVISTA DE BIOLOGIA E CIÊNCIAS DA TERRA ISSN 1519-5228 - Artigo_Bioterra_V24_...
REVISTA DE BIOLOGIA E CIÊNCIAS DA TERRA ISSN 1519-5228 - Artigo_Bioterra_V24_...
 
User Guide: Orion™ Weather Station (Columbia Weather Systems)
User Guide: Orion™ Weather Station (Columbia Weather Systems)User Guide: Orion™ Weather Station (Columbia Weather Systems)
User Guide: Orion™ Weather Station (Columbia Weather Systems)
 
Microphone- characteristics,carbon microphone, dynamic microphone.pptx
Microphone- characteristics,carbon microphone, dynamic microphone.pptxMicrophone- characteristics,carbon microphone, dynamic microphone.pptx
Microphone- characteristics,carbon microphone, dynamic microphone.pptx
 
Manassas R - Parkside Middle School 🌎🏫
Manassas R - Parkside Middle School 🌎🏫Manassas R - Parkside Middle School 🌎🏫
Manassas R - Parkside Middle School 🌎🏫
 
CHROMATOGRAPHY PALLAVI RAWAT.pptx
CHROMATOGRAPHY  PALLAVI RAWAT.pptxCHROMATOGRAPHY  PALLAVI RAWAT.pptx
CHROMATOGRAPHY PALLAVI RAWAT.pptx
 
User Guide: Pulsar™ Weather Station (Columbia Weather Systems)
User Guide: Pulsar™ Weather Station (Columbia Weather Systems)User Guide: Pulsar™ Weather Station (Columbia Weather Systems)
User Guide: Pulsar™ Weather Station (Columbia Weather Systems)
 
Ai in communication electronicss[1].pptx
Ai in communication electronicss[1].pptxAi in communication electronicss[1].pptx
Ai in communication electronicss[1].pptx
 
Four Spheres of the Earth Presentation.ppt
Four Spheres of the Earth Presentation.pptFour Spheres of the Earth Presentation.ppt
Four Spheres of the Earth Presentation.ppt
 
《Queensland毕业文凭-昆士兰大学毕业证成绩单》
《Queensland毕业文凭-昆士兰大学毕业证成绩单》《Queensland毕业文凭-昆士兰大学毕业证成绩单》
《Queensland毕业文凭-昆士兰大学毕业证成绩单》
 
The dark energy paradox leads to a new structure of spacetime.pptx
The dark energy paradox leads to a new structure of spacetime.pptxThe dark energy paradox leads to a new structure of spacetime.pptx
The dark energy paradox leads to a new structure of spacetime.pptx
 
Vision and reflection on Mining Software Repositories research in 2024
Vision and reflection on Mining Software Repositories research in 2024Vision and reflection on Mining Software Repositories research in 2024
Vision and reflection on Mining Software Repositories research in 2024
 
Pests of Bengal gram_Identification_Dr.UPR.pdf
Pests of Bengal gram_Identification_Dr.UPR.pdfPests of Bengal gram_Identification_Dr.UPR.pdf
Pests of Bengal gram_Identification_Dr.UPR.pdf
 
Davis plaque method.pptx recombinant DNA technology
Davis plaque method.pptx recombinant DNA technologyDavis plaque method.pptx recombinant DNA technology
Davis plaque method.pptx recombinant DNA technology
 
bonjourmadame.tumblr.com bhaskar's girls
bonjourmadame.tumblr.com bhaskar's girlsbonjourmadame.tumblr.com bhaskar's girls
bonjourmadame.tumblr.com bhaskar's girls
 
Servosystem Theory / Cybernetic Theory by Petrovic
Servosystem Theory / Cybernetic Theory by PetrovicServosystem Theory / Cybernetic Theory by Petrovic
Servosystem Theory / Cybernetic Theory by Petrovic
 
FREE NURSING BUNDLE FOR NURSES.PDF by na
FREE NURSING BUNDLE FOR NURSES.PDF by naFREE NURSING BUNDLE FOR NURSES.PDF by na
FREE NURSING BUNDLE FOR NURSES.PDF by na
 
GENERAL PHYSICS 2 REFRACTION OF LIGHT SENIOR HIGH SCHOOL GENPHYS2.pptx
GENERAL PHYSICS 2 REFRACTION OF LIGHT SENIOR HIGH SCHOOL GENPHYS2.pptxGENERAL PHYSICS 2 REFRACTION OF LIGHT SENIOR HIGH SCHOOL GENPHYS2.pptx
GENERAL PHYSICS 2 REFRACTION OF LIGHT SENIOR HIGH SCHOOL GENPHYS2.pptx
 
Thermodynamics ,types of system,formulae ,gibbs free energy .pptx
Thermodynamics ,types of system,formulae ,gibbs free energy .pptxThermodynamics ,types of system,formulae ,gibbs free energy .pptx
Thermodynamics ,types of system,formulae ,gibbs free energy .pptx
 
Pests of castor_Binomics_Identification_Dr.UPR.pdf
Pests of castor_Binomics_Identification_Dr.UPR.pdfPests of castor_Binomics_Identification_Dr.UPR.pdf
Pests of castor_Binomics_Identification_Dr.UPR.pdf
 

Securing Online Transactions Module

  • 1. 1 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 1 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Securing Online Transactions Simplifying Security. Module 8
  • 2. Alireza Ghahrood Security Solution Provider : Cyber Space |BigData |Cloud |Virtualization www.about.me/alirezaghahrood | Cell :+98 (912) 1964383 |
  • 3. 2 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. OddJob, Zeus Mitmo Trojans Target Financial Data Hide your bank account details, as two new pieces of banking malware are making the rounds: the OddJob Trojan, which keeps banking sessions open after users log out, as well as a variant of Zeus Mitmo that targets Symbian and BlackBerry smartphones. On Tuesday, browser security firm Trusteer warned that the OddJob malware could keep banking Web site sessions open even after users thought they'd logged off. "By tapping the session ID token ‐‐ which banks use to identify a user's online banking session ‐‐ the fraudsters can electronically impersonate the legitimate user and complete a range of banking operations," according to a blog post from Amit Klein, CTO of security firm Trusteer. Trusteer discovered OddJob several months ago, but withheld disclosing details until law enforcement agencies concluded related investigations. It said that the malware has targeted customers in the United States, Poland, and Denmark, and appeared to be the work of criminals based in eastern Europe. http://www.informationweek.com 3 C O P Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
  • 4. 3 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 4 C O P Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D . MODULE OBJECTIVES Online Shopping How Online Shopping Works? Online Banking Securing Online Transactions Choosing a Secure Online Payment Service SSL and the Padlock Symbol Identifying a Trustworthy Website Identifying an Untrustworthy Website McAfee’s SiteAdvisor Online Transactions Security Checklist
  • 5. 4 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Online Shopping Online Banking Securing Online Transactions SSL and the Padlock Symbol Identifying a Trustworthy Website Choosing a Secure Online Payment Service Identifying an Untrustworthy Website Online Transactions Security Checklist How Online Shopping Works? 5 C O P Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D . MODULE FLOW
  • 6. 5 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 5 Copyright © by EC-Council served. Reproduction is Strictly Prohibited.All Rights Re ONLINE SHOPPINGOnline shopping is the process of buying goods and services directly from the seller over the Internet The benefits of online shopping are: Usually available 24 hours a day Describe products with text, photos, and multimedia files Quickly seek out deals for items/services with several vendors Purchase a product without actually travelling to the store using a credit/debit card The ease of shopping and facility to compare the products and prices online has made online shopping an attractive option for consumers
  • 7. 6 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. How Online ShoppingWorks? 1 Users visit the e‐commerce site where they wish to buy goods/products from Users browse for the required product through the online catalogue2 7 C O P Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
  • 8. 7 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 8 C O P Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D . HOW ONLINE SHOPPING WORKS? 3 They add the product/service to the shopping cart The shopping cart shows: The products being purchased The number of units of the product The price of the product, taxes (inclusive/exclusive) Shipping costs, etc. They fill in the online order form with: Shipping information Shipping address Consumer name Billing address and its details Credit card details Any other information the merchant requires 4
  • 9. 8 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 8 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 5 The user’s credit card information is encrypted and sent to the merchant The user receives an on‐screen confirmation or/and a confirmation e‐mail HOW ONLINE SHOPPING WORKS?
  • 10. 9 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. ONLINE BANKING 10 C O P Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D . Online banking is the method of making bank transactions or paying bills over the Internet It allows the user to make deposits, withdrawals, and pay bills with a single click of the mouse Advantages Online banking allows you to perform transactions, pay bills, and check balances 24x7 Online banking is fast, efficient, and effective Disadvantages Online banking sites can take a while to start up and can be tricky for the beginner The customer may have a doubt that his/her transaction was successful
  • 11. 10 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Online Shopping Online Banking Securing Online Transactions SSL and the Padlock Symbol Identifying a Trustworthy Website Choosing a Secure Online Payment Service Identifying an Untrustworthy Website How Online Shopping Works? 11 C O P Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D . MODULE FLOW Online Transactions Security Checklist
  • 12. 11 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 12 C O P Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D . CREDIT CARD PAYMENTSCredit cards are still the preferred means for online purchases because of ease of use and the ability to pay the bills at a later date Credit cards are issued by a credit card issuing bank or credit union after verifying the user’s credentials The card user agrees to pay the card issuer the amount used for making the purchase The cardholder indicates consent to pay by signing a receipt with a record of the card details and indicating the amount to be paid or by entering a personal identification number (PIN) or Card Verification Value (CVV or CVV2)
  • 13. 12 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Card‐not‐present (CNP) fraud An offender obtains credit card details and then purchases goods and services over the Internet or by telephone, fax, or email Cash machine fraud The offender tampers with the cash machine and then tricks the user into entering the pin in their presence Shoulder‐surfing The offender oversees the user entering PIN at the machine Identity theft The offender uses fraudulently obtained personal information of a credit card holder to access credit card accounts Credit card mail order fraud The offender gathers information about a card holder and sends a request to the bank for a new or replacement card Skimming/counterfeit credit card Electronically copying authentic data on a card's magnetic stripe to another card without the genuine card holder’s knowledge Chargeback fraud Genuine credit card holder uses the card to purchase goods or services, and when bank statements are issued, they call the bank and claim that they never authorized the transaction Lost and stolen card fraud Card is physically stolen or lost and then used by the offender 13 C O P Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D . TYPES OF CREDIT CARD FRAUDS CREDIT CARD FRAUDS REFER TO THE ACTS OF MAKING PURCHASES USING SOMEONE ELSE'S CREDIT CARD INFORMATION
  • 14. 13 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 14 C O P Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D . GUIDELINES FOR ENSURING CREDIT CARD SAFETYBefore You Shop 1. Check if the site is of a known business entity (e.g., GAP) 2. Check for a third‐party seal of trust (e.g., VeriSign, eTrust) 3. Check reviews of other shoppers (e.g., www.epinions.com) 4. Review the privacy statement 5. Use only one credit card for all your online purchases 6. Keep records of your online transactions 7. Do not share your credit card information with anyone While You Shop 1. Disclose only required personal information. Be discreet. 2. Ensure that you are using a secure computer and using a secure site 3. Adopt a strong password 4. Use one‐click shopping cautiously 5. Check for a confirmation email after an online purchase/transaction/payment
  • 15. 14 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Stored Value Cards Stored‐value cards are plastic cards with a monetary value encoded in the magnetic strip They are an effective replacement for cash and can be used for low‐value retail purchases They are not associated with the name of the user, hence they do not reveal any information about the customer Even if lost, the consumer tends to lose only the value that is still unused Smart Cards Smart cards are the same size as a credit card They have a microprocessor in them, which differentiates them from a credit card (which has a magnetic strip) The data on the magnetic stripe can be read, deleted, or even changed Smart cards can be used with smart‐ card reader attached to a personal computer to authenticate a user Online transactions can be secured by using the alternatives to credit cards SECURING ONLINE TRANSACTIONS 15 C O P Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
  • 16. 15 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Digital Cash Digital cash is a method of purchasing cash credits in small amounts Cash credits can be stored in your computer and spent when making electronic purchases on the Internet The consumer can buy the credits from a financial institution Digital cash is associated with a serial number that can be used for online transactions Sending the serial number does not give out any personal information E‐Wallets E‐Wallet is a software program used for online transactions Once the software is installed, personal information can be filled out in the E‐wallet and stored When the user orders something, the order form can be automatically completed using the wallet This helps prevent the theft of personal information By default, most of the electronic wallet software requests users to enter a password before completing the form 16 C O P Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D . SECURING ONLINE TRANSACTIONS
  • 17. 16 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. SECURING ONLINE TRANSACTIONS 17 C O P Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D . Online Payment Services Third‐party payment services can be used to make online payments to avoid giving away credit card information to the merchant directly When using an online payment service, the user should transfer money to an account associated with the online payment service All the purchases and transactions can be carried out through this account  This way the customer does not have to reveal credit card information or other personal details to the merchants
  • 18. 17 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 1 2 3 4 Choosing a Secure Online Payment Service Make sure that the payment service is legitimate/registered Check the reviews of these services at websites such as Epinions.com or BizRate.com Look at the payment service's website for seals of approval from TRUSTe, VeriSign, or Better Business Bureau Online (BBBOnline) Ensure that the website uses encryption technology to help protect your information 18 C O P Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
  • 19. 18 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Online Payment Services https://www.paypal.com http://www.amazon.com http://www.worldpay.com http://www.2checkout.com 19 C O P Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
  • 20. 19 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. SSL and the Padlock Symbol Secure Sockets Layer (SSL) is the standard security technology for creating an encrypted link between a web server and a browser This link ensures that all information transmitted between the web server and the browser is secured The Padlock symbol is an indicator that the session is protected by the SSL encryption Padlock Symbol 20 C O P Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
  • 21. 20 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 20 Copyright © by EC-Council served. Reproduction is Strictly Prohibited.All Rights Re WHAT DOES THE SSL SHOW? If the browser encounters an untrustworthy certificate authority, a site warning is displayed Details of the certification authority that issued the certificate Expiration date of the certificate Name and address of the company Domain name of the company
  • 22. 21 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Online Shopping Online Banking Securing Online Transactions SSL and the Padlock Symbol Identifying a Trustworthy Website Choosing a Secure Online Payment Service Identifying an Untrustworthy Website How Online Shopping Works? 22 C O P Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D . MODULE FLOW Online Transactions Security Checklist
  • 23. 22 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Identifying a TrustworthyWebsite A secure site usually begins with the prefix https The Padlock symbol appears either at the bottom right in the browser or beside the URL The certificate used to encrypt the connection also contains information about the identity of the website owner or organization The user can click the lock to view the identity of the website Padlock symbol https 23 C O P Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
  • 24. 23 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 23 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. IDENTIFYING A TRUSTWORTHY WEBSITE Clicking the Padlock symbol reveals the website information Click View Certificate to view the authenticity of the certificate Certification authority
  • 25. 24 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 24 Copyright © by EC-Council IDENTIFYING AN UNTRUSTWORTH Y WEBSITEUntrustworthy websites are generally referred to the user through an email message from someone unknown The website presents objectionable content, such as pornography or illegal materials The website offers schemes that seem too good to be true, indicating a possible scam When the user is asked for a credit card to verify his/her identity or for personal information when it's not necessary When the user is asked for credit card information without any proof that the transaction has been secured All Rights Reserved. Reproduction is Strictly Prohibited.
  • 26. 25 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 25 Copyright © by EC-Counc All Rights Reserved. Reproduction is Strictly Prohibite MCAFEE’ S SITEADVI SORMcAfee’s SiteAdvisor software is a free browser plug‐in that gives safety advice about websites before the user clicks a risky site Once the software is installed, small site‐rating icons are added to the user’s search results These site ratings are based on tests conducted by McAfee using an array of computers that look for various threats The icons alert the user of the potential risky sites and help him/her find safer alternatives http://www.siteadvisor.com il d.
  • 27. 26 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. RATING ICONS 27 C O P Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D . McAfee SECURE: Tested daily for hacker vulnerabilities WARNING: Serious risk issues SAFE: Very low or no risk issues CAUTION: Minor risk issues UNKNOWN: Not yet rated. Use caution
  • 28. 27 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. MODULE SUMMARY 28 C O P Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .  The ease of shopping and comparing the products and prices online has made online shopping an attractive option for consumers  Online banking allows the user to make deposits, withdrawals, and pay bills with a single click of the mouse  The consumer has to take all the necessary steps to ensure that the credit card information is not compromised  Using third‐party payment services avoids giving your credit card information to the merchant directly  The Padlock symbol is an indicator that the session is protected by the SSL encryption
  • 29. 28 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Regularly update your operating system and other installed applications Ensure that you have the latest web browser installed in the system Ensure that you are connected to a secured network when using a wireless network Regularly scan your system for viruses, worms, Trojans, spyware, key loggers and other malware using updated anti‐virus Use strong passwords for all online transactions and keep them changing at regular interval Use Virtual Keyboard to enter sensitive information Do not perform online transactions from public systems Always ONLINE TRANSACTIONS SECURITY CHECKLIST 29 C O P Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D .
  • 30. 29 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. ONLINE TRANSACTIONS SECURITY CHECKLIST 30 C O P Y R I G H T © B Y EC-COUNCIL A L L R I G H T S RESERVED. R E P R O D U C T IO N IS STRICTLY P R O H I B I T E D . Never respond to unsolicited email offers or requests for information Use browser filters that warn about reported phishing sites and block access to the addresses Register for the bank's mobile alert service to get alerts whenever there is a significant transaction Protect yourself from identity theft Always check the address bar for the correct URL Always check for the website certificate, SSL padlocks, and HTTPs