SlideShare una empresa de Scribd logo
1 de 28
To establish the extent of internet
fraud and its operational impact
on ecommerce.
The effectiveness of current fraud
prevention systems.
Finally to identify common
features in the way internet
fraudsters operate.
The effect of cyber fraud on e
commerce: examining various aspects
involved.
 1. Introduction
 2. Ecommerce and its relation to cyber
fraud.
 3. Various aspects of ecommerce.
 4. Technical issues involved.
 5. Legal issues: substantive and procedural.
 6. Conclusion and suggestions
The major issues tackled with in this paper are as
follows:
 1. How ecommerce is affected by cyber fraud.
 2. Adequacy of regulations in the national and
international level.
 3. Technical measures.
 4. Mechanisms and laws to check cyber fraud
Confidentiality
Authentication
Integrity
 Financial accounting : From manual to
computerized
 Information system: From paper based to
digital
 Advertising : Offline to online
 Corporate purchasing : Manual to E-
procurement
 A network of Networks.
 Hardware and Software.
 Building E-Commerce enabled website.
 Client-Server Computing.
 Hosting site on Web Server.
 Finding provider for electronic funds transfer
 Credit card
 Debit card
 E-cheques
 E-wallets
 Crime committed using a computer and the
internet to steal a person's identity or illegal
imports or malicious programs.
 Cybercrime is nothing but where the
computer is used as an object or subject of
crime.
 Online activities are just as vulnerable to crime
and can compromise personal safety just as
effectively as common everyday crimes.
 Lawmakers, law enforcement, and individuals
need to know how to protect themselves and
the persons for which they are responsible.
We can categorize Cyber crime in two ways :
 The Computer as a Target :- using a
computer to attack other computers. e.g.
Hacking, Virus/Worm attacks, DOS attack
etc.
 The computer as a weapon :- using a
computer to commit real world crimes. e.g.
Cyber Terrorism, IPR violations, Credit card
frauds, EFT frauds, Pornography. Cyber
Crime regulated by Cyber Laws or Internet
Laws.
 Hacking
 Software Piracy
 Denial Of Service Attack
 Virus Dissemination
 Computer Vandalism
 Cyber terrorism
Types of Cyber attacks, by percentage
(source- FBI,2007)
 Financial fraud: 11%
 Sabotage of data/networks: 17%
 Theft of proprietary information: 20%
 System penetration from the outside: 25%
 Denial of service: 27%
 Unauthorized access by insiders: 71%
 Employee abuse of internet privileges 79%
 Viruses: 85%
 Manipulate data integrity 6.8%
 Installed a sniffer 6.6%
 Stole password files 5.6%
 Proving/scanning systems 14.6%
 Trojan logons 5.8%
 IP spoofing 4.8%
 Introduced virus 10.6%
 Denied use of services 6.3%
 Downloaded data 8.1%
 Compromised trade secrets 9.8%
 Stole/diverted money 0.3%
 Compromised e-mail/documents
12.6%
 Publicized intrusion 0.5%
 Harassed personnel 4.5%
 Other 3.0%
User community
Network Administration
Introducers/Hackers
MVS mainframe users (5%)
UNIX users (25%)
Desktop users (50%)
Electronic mail can be intercepted and read
Customer’s credit card numbers may be read
 Customers risks :
Stolen credentials or password
Dishonest merchant
 Merchants risk :
Forged or copied instruments
Insufficient funds in customers account
 Authorization , Access Control:
protect intranet from hoarders: Firewalls
 Confidentiality , Data Integrity:
message must not be altered or tampered with :
 Encryption
 Authentication:
both parties prove identity before starting
transaction: Digital Certificates
 Non-repudiation:
proof that the document originated by you and
you only: Digital signature
 The cyber security will defend us from
critical attacks.
 Internet security process all the incoming
and outgoing data on our computer.
 Cyber security will defend from hacks
and virus.
 Held orders
 In-house database
 Shared database/Chain calls
 Telephone database
 Issuing Bank
 Call the customer
 Implementation of existing laws in a stricter
manner.
 Changes in the:1. Information Technology
Act, 2000, Amendment 2008 should be strictly
adhered to.
2. Indian Penal Code, 1908
should be in amended, stricter punishment
should be imposed on violators.
3. The newly added sections
of the Indian Evidence Act should be
considered while giving judgments on cyber
fraud
 The police officers, judges lawyers and the
persons associated with legal profession
should be sensitized on the matter.
 The general public, companies and
corporate houses should be made aware
of the damages cyber fraud can cause
 Advertisements in all forms of media is an
effective tool for creating awareness.
 High fines should be imposed which should
be deterrent in nature.

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrime and security
Cybercrime and securityCybercrime and security
Cybercrime and security
 
Cyber Crime - What is Cyber Crime
Cyber Crime - What is Cyber CrimeCyber Crime - What is Cyber Crime
Cyber Crime - What is Cyber Crime
 
Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threat
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in india
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Identity theft ppt
Identity theft pptIdentity theft ppt
Identity theft ppt
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 

Destacado

Security in E-commerce
Security in E-commerceSecurity in E-commerce
Security in E-commercem8817
 
EMEA_UK_Why Invest in Fraud Management_Brochure
EMEA_UK_Why Invest in Fraud Management_BrochureEMEA_UK_Why Invest in Fraud Management_Brochure
EMEA_UK_Why Invest in Fraud Management_BrochureRYAN ORTON
 
eCommerce Summit Atlanta Moneybookers Presentation
eCommerce Summit Atlanta Moneybookers PresentationeCommerce Summit Atlanta Moneybookers Presentation
eCommerce Summit Atlanta Moneybookers PresentationeCommerce Merchants
 
Cyber
CyberCyber
Cybermmgca
 
Analysis of frauds in banks nigeria’s experience
Analysis of frauds in banks nigeria’s experienceAnalysis of frauds in banks nigeria’s experience
Analysis of frauds in banks nigeria’s experienceAlexander Decker
 
E-commerce and fraud
E-commerce and fraudE-commerce and fraud
E-commerce and fraudblogzilla
 
Managing Payment and Fraud - Ecommerce Masterclass
Managing Payment and Fraud - Ecommerce MasterclassManaging Payment and Fraud - Ecommerce Masterclass
Managing Payment and Fraud - Ecommerce MasterclassThe ID Co.
 
Chapter 17 a fraud in e commerce Jen
Chapter 17 a  fraud in e commerce JenChapter 17 a  fraud in e commerce Jen
Chapter 17 a fraud in e commerce JenVidaB
 
Cyber Security Threats and Data Breaches
Cyber Security Threats and Data BreachesCyber Security Threats and Data Breaches
Cyber Security Threats and Data BreachesBijay Senihang
 
Browser Extensions in Mozilla Firefox & Google Chrome
Browser Extensions in Mozilla Firefox & Google ChromeBrowser Extensions in Mozilla Firefox & Google Chrome
Browser Extensions in Mozilla Firefox & Google ChromeKenneth Auchenberg
 
E commerce security(without animation)
E commerce security(without animation)E commerce security(without animation)
E commerce security(without animation)mmousavi
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindSaurabh Kheni
 
Understanding and preventing cyber crime and its impact on your organisation
Understanding and preventing cyber crime and its impact on your organisationUnderstanding and preventing cyber crime and its impact on your organisation
Understanding and preventing cyber crime and its impact on your organisationJacqueline Fick
 
Eamonn O Raghallaigh The Major Security Issues In E Commerce
Eamonn O Raghallaigh   The Major Security Issues In E CommerceEamonn O Raghallaigh   The Major Security Issues In E Commerce
Eamonn O Raghallaigh The Major Security Issues In E CommerceEamonnORagh
 

Destacado (20)

Cyber Crimes
Cyber CrimesCyber Crimes
Cyber Crimes
 
Security in E-commerce
Security in E-commerceSecurity in E-commerce
Security in E-commerce
 
EMEA_UK_Why Invest in Fraud Management_Brochure
EMEA_UK_Why Invest in Fraud Management_BrochureEMEA_UK_Why Invest in Fraud Management_Brochure
EMEA_UK_Why Invest in Fraud Management_Brochure
 
eCommerce Summit Atlanta Moneybookers Presentation
eCommerce Summit Atlanta Moneybookers PresentationeCommerce Summit Atlanta Moneybookers Presentation
eCommerce Summit Atlanta Moneybookers Presentation
 
Cyber
CyberCyber
Cyber
 
Analysis of frauds in banks nigeria’s experience
Analysis of frauds in banks nigeria’s experienceAnalysis of frauds in banks nigeria’s experience
Analysis of frauds in banks nigeria’s experience
 
E-commerce and fraud
E-commerce and fraudE-commerce and fraud
E-commerce and fraud
 
Managing Payment and Fraud - Ecommerce Masterclass
Managing Payment and Fraud - Ecommerce MasterclassManaging Payment and Fraud - Ecommerce Masterclass
Managing Payment and Fraud - Ecommerce Masterclass
 
Chapter 17 a fraud in e commerce Jen
Chapter 17 a  fraud in e commerce JenChapter 17 a  fraud in e commerce Jen
Chapter 17 a fraud in e commerce Jen
 
Cyber Security Threats and Data Breaches
Cyber Security Threats and Data BreachesCyber Security Threats and Data Breaches
Cyber Security Threats and Data Breaches
 
Browser Extensions in Mozilla Firefox & Google Chrome
Browser Extensions in Mozilla Firefox & Google ChromeBrowser Extensions in Mozilla Firefox & Google Chrome
Browser Extensions in Mozilla Firefox & Google Chrome
 
E commerce security(without animation)
E commerce security(without animation)E commerce security(without animation)
E commerce security(without animation)
 
Web Browsers
Web BrowsersWeb Browsers
Web Browsers
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
 
Understanding and preventing cyber crime and its impact on your organisation
Understanding and preventing cyber crime and its impact on your organisationUnderstanding and preventing cyber crime and its impact on your organisation
Understanding and preventing cyber crime and its impact on your organisation
 
Security@ecommerce
Security@ecommerceSecurity@ecommerce
Security@ecommerce
 
Eamonn O Raghallaigh The Major Security Issues In E Commerce
Eamonn O Raghallaigh   The Major Security Issues In E CommerceEamonn O Raghallaigh   The Major Security Issues In E Commerce
Eamonn O Raghallaigh The Major Security Issues In E Commerce
 
Ecommerce Security
Ecommerce SecurityEcommerce Security
Ecommerce Security
 
Cyber fraud in banks
Cyber fraud in banksCyber fraud in banks
Cyber fraud in banks
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 

Similar a Cyber fraud a threat to E commerce

cyber crimes ppt computer vulnerability softeware testing
cyber crimes ppt computer vulnerability softeware testingcyber crimes ppt computer vulnerability softeware testing
cyber crimes ppt computer vulnerability softeware testingakshayathetopper
 
CYBER-CRIME PRESENTATION with real-time examples
CYBER-CRIME PRESENTATION with real-time examplesCYBER-CRIME PRESENTATION with real-time examples
CYBER-CRIME PRESENTATION with real-time examplesVivekanandaGN1
 
CYBER-CRIME PRESENTATION.ppt
CYBER-CRIME PRESENTATION.pptCYBER-CRIME PRESENTATION.ppt
CYBER-CRIME PRESENTATION.pptPraveen362297
 
CYBER CRIME PRESENTATION for Law Students for Semester four
CYBER CRIME PRESENTATION for Law Students for Semester fourCYBER CRIME PRESENTATION for Law Students for Semester four
CYBER CRIME PRESENTATION for Law Students for Semester fourssuser24dae7
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crimehomeworkping4
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Actmaruhope
 
English in written
English in writtenEnglish in written
English in writtenazhar manap
 
Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000V'vek Sharma
 
Introducion cyber crime and cyber law
Introducion cyber crime  and cyber lawIntroducion cyber crime  and cyber law
Introducion cyber crime and cyber lawYagnesh Garud
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptBushra22
 

Similar a Cyber fraud a threat to E commerce (20)

UNIT 5.docx
UNIT 5.docxUNIT 5.docx
UNIT 5.docx
 
cyber crimes ppt computer vulnerability softeware testing
cyber crimes ppt computer vulnerability softeware testingcyber crimes ppt computer vulnerability softeware testing
cyber crimes ppt computer vulnerability softeware testing
 
CYBER-CRIME PRESENTATION with real-time examples
CYBER-CRIME PRESENTATION with real-time examplesCYBER-CRIME PRESENTATION with real-time examples
CYBER-CRIME PRESENTATION with real-time examples
 
CYBER-CRIME PRESENTATION.ppt
CYBER-CRIME PRESENTATION.pptCYBER-CRIME PRESENTATION.ppt
CYBER-CRIME PRESENTATION.ppt
 
CYBER CRIME PRESENTATION for Law Students for Semester four
CYBER CRIME PRESENTATION for Law Students for Semester fourCYBER CRIME PRESENTATION for Law Students for Semester four
CYBER CRIME PRESENTATION for Law Students for Semester four
 
Cyber Laws.ppt
Cyber Laws.pptCyber Laws.ppt
Cyber Laws.ppt
 
cyber crime
cyber crime cyber crime
cyber crime
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime
 
cyber crime.pptx
cyber crime.pptxcyber crime.pptx
cyber crime.pptx
 
It security & crimes
It security & crimesIt security & crimes
It security & crimes
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
CS 1.ppt
CS 1.pptCS 1.ppt
CS 1.ppt
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Act
 
English in written
English in writtenEnglish in written
English in written
 
Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000
 
Introducion cyber crime and cyber law
Introducion cyber crime  and cyber lawIntroducion cyber crime  and cyber law
Introducion cyber crime and cyber law
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
12 c business i environment i society mba 2016
12 c business i environment i society mba 201612 c business i environment i society mba 2016
12 c business i environment i society mba 2016
 

Último

Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation StrategySmarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation StrategyJong Hyuk Choi
 
Who is Spencer McDaniel? And Does He Actually Exist?
Who is Spencer McDaniel? And Does He Actually Exist?Who is Spencer McDaniel? And Does He Actually Exist?
Who is Spencer McDaniel? And Does He Actually Exist?Abdul-Hakim Shabazz
 
3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.ppt3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.pptseri bangash
 
一比一原版悉尼科技大学毕业证如何办理
一比一原版悉尼科技大学毕业证如何办理一比一原版悉尼科技大学毕业证如何办理
一比一原版悉尼科技大学毕业证如何办理e9733fc35af6
 
ARTICLE 370 PDF about the indian constitution.
ARTICLE 370 PDF about the  indian constitution.ARTICLE 370 PDF about the  indian constitution.
ARTICLE 370 PDF about the indian constitution.tanughoshal0
 
Interpretation of statute topics for project
Interpretation of statute topics for projectInterpretation of statute topics for project
Interpretation of statute topics for projectVarshRR
 
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理bd2c5966a56d
 
买(rice毕业证书)莱斯大学毕业证本科文凭证书原版质量
买(rice毕业证书)莱斯大学毕业证本科文凭证书原版质量买(rice毕业证书)莱斯大学毕业证本科文凭证书原版质量
买(rice毕业证书)莱斯大学毕业证本科文凭证书原版质量acyefsa
 
一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理Airst S
 
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...Sangyun Lee
 
一比一原版(UM毕业证书)密苏里大学毕业证如何办理
一比一原版(UM毕业证书)密苏里大学毕业证如何办理一比一原版(UM毕业证书)密苏里大学毕业证如何办理
一比一原版(UM毕业证书)密苏里大学毕业证如何办理F La
 
Hely-Hutchinson v. Brayhead Ltd .pdf
Hely-Hutchinson v. Brayhead Ltd         .pdfHely-Hutchinson v. Brayhead Ltd         .pdf
Hely-Hutchinson v. Brayhead Ltd .pdfBritto Valan
 
一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理
一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理
一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理ss
 
Understanding the Role of Labor Unions and Collective Bargaining
Understanding the Role of Labor Unions and Collective BargainingUnderstanding the Role of Labor Unions and Collective Bargaining
Understanding the Role of Labor Unions and Collective Bargainingbartzlawgroup1
 
Navigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptxNavigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptxelysemiller87
 
一比一原版(MelbourneU毕业证书)墨尔本大学毕业证学位证书
一比一原版(MelbourneU毕业证书)墨尔本大学毕业证学位证书一比一原版(MelbourneU毕业证书)墨尔本大学毕业证学位证书
一比一原版(MelbourneU毕业证书)墨尔本大学毕业证学位证书irst
 
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理e9733fc35af6
 
Career As Legal Reporters for Law Students
Career As Legal Reporters for Law StudentsCareer As Legal Reporters for Law Students
Career As Legal Reporters for Law StudentsNilendra Kumar
 
Shubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubham Wadhonkar
 

Último (20)

Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation StrategySmarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
 
Who is Spencer McDaniel? And Does He Actually Exist?
Who is Spencer McDaniel? And Does He Actually Exist?Who is Spencer McDaniel? And Does He Actually Exist?
Who is Spencer McDaniel? And Does He Actually Exist?
 
Chambers Global Practice Guide - Canada M&A
Chambers Global Practice Guide - Canada M&AChambers Global Practice Guide - Canada M&A
Chambers Global Practice Guide - Canada M&A
 
3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.ppt3 Formation of Company.www.seribangash.com.ppt
3 Formation of Company.www.seribangash.com.ppt
 
一比一原版悉尼科技大学毕业证如何办理
一比一原版悉尼科技大学毕业证如何办理一比一原版悉尼科技大学毕业证如何办理
一比一原版悉尼科技大学毕业证如何办理
 
ARTICLE 370 PDF about the indian constitution.
ARTICLE 370 PDF about the  indian constitution.ARTICLE 370 PDF about the  indian constitution.
ARTICLE 370 PDF about the indian constitution.
 
Interpretation of statute topics for project
Interpretation of statute topics for projectInterpretation of statute topics for project
Interpretation of statute topics for project
 
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
 
买(rice毕业证书)莱斯大学毕业证本科文凭证书原版质量
买(rice毕业证书)莱斯大学毕业证本科文凭证书原版质量买(rice毕业证书)莱斯大学毕业证本科文凭证书原版质量
买(rice毕业证书)莱斯大学毕业证本科文凭证书原版质量
 
一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理
 
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...
 
一比一原版(UM毕业证书)密苏里大学毕业证如何办理
一比一原版(UM毕业证书)密苏里大学毕业证如何办理一比一原版(UM毕业证书)密苏里大学毕业证如何办理
一比一原版(UM毕业证书)密苏里大学毕业证如何办理
 
Hely-Hutchinson v. Brayhead Ltd .pdf
Hely-Hutchinson v. Brayhead Ltd         .pdfHely-Hutchinson v. Brayhead Ltd         .pdf
Hely-Hutchinson v. Brayhead Ltd .pdf
 
一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理
一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理
一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理
 
Understanding the Role of Labor Unions and Collective Bargaining
Understanding the Role of Labor Unions and Collective BargainingUnderstanding the Role of Labor Unions and Collective Bargaining
Understanding the Role of Labor Unions and Collective Bargaining
 
Navigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptxNavigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptx
 
一比一原版(MelbourneU毕业证书)墨尔本大学毕业证学位证书
一比一原版(MelbourneU毕业证书)墨尔本大学毕业证学位证书一比一原版(MelbourneU毕业证书)墨尔本大学毕业证学位证书
一比一原版(MelbourneU毕业证书)墨尔本大学毕业证学位证书
 
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
 
Career As Legal Reporters for Law Students
Career As Legal Reporters for Law StudentsCareer As Legal Reporters for Law Students
Career As Legal Reporters for Law Students
 
Shubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptxShubh_Burden of proof_Indian Evidence Act.pptx
Shubh_Burden of proof_Indian Evidence Act.pptx
 

Cyber fraud a threat to E commerce

  • 1.
  • 2. To establish the extent of internet fraud and its operational impact on ecommerce. The effectiveness of current fraud prevention systems. Finally to identify common features in the way internet fraudsters operate.
  • 3. The effect of cyber fraud on e commerce: examining various aspects involved.
  • 4.  1. Introduction  2. Ecommerce and its relation to cyber fraud.  3. Various aspects of ecommerce.  4. Technical issues involved.  5. Legal issues: substantive and procedural.  6. Conclusion and suggestions
  • 5. The major issues tackled with in this paper are as follows:  1. How ecommerce is affected by cyber fraud.  2. Adequacy of regulations in the national and international level.  3. Technical measures.  4. Mechanisms and laws to check cyber fraud
  • 6.
  • 8.
  • 9.
  • 10.
  • 11.  Financial accounting : From manual to computerized  Information system: From paper based to digital  Advertising : Offline to online  Corporate purchasing : Manual to E- procurement
  • 12.  A network of Networks.  Hardware and Software.  Building E-Commerce enabled website.  Client-Server Computing.  Hosting site on Web Server.  Finding provider for electronic funds transfer
  • 13.  Credit card  Debit card  E-cheques  E-wallets
  • 14.  Crime committed using a computer and the internet to steal a person's identity or illegal imports or malicious programs.  Cybercrime is nothing but where the computer is used as an object or subject of crime.  Online activities are just as vulnerable to crime and can compromise personal safety just as effectively as common everyday crimes.  Lawmakers, law enforcement, and individuals need to know how to protect themselves and the persons for which they are responsible.
  • 15. We can categorize Cyber crime in two ways :  The Computer as a Target :- using a computer to attack other computers. e.g. Hacking, Virus/Worm attacks, DOS attack etc.  The computer as a weapon :- using a computer to commit real world crimes. e.g. Cyber Terrorism, IPR violations, Credit card frauds, EFT frauds, Pornography. Cyber Crime regulated by Cyber Laws or Internet Laws.
  • 16.  Hacking  Software Piracy  Denial Of Service Attack  Virus Dissemination  Computer Vandalism  Cyber terrorism
  • 17. Types of Cyber attacks, by percentage (source- FBI,2007)  Financial fraud: 11%  Sabotage of data/networks: 17%  Theft of proprietary information: 20%  System penetration from the outside: 25%  Denial of service: 27%  Unauthorized access by insiders: 71%  Employee abuse of internet privileges 79%  Viruses: 85%
  • 18.  Manipulate data integrity 6.8%  Installed a sniffer 6.6%  Stole password files 5.6%  Proving/scanning systems 14.6%  Trojan logons 5.8%  IP spoofing 4.8%  Introduced virus 10.6%  Denied use of services 6.3%
  • 19.  Downloaded data 8.1%  Compromised trade secrets 9.8%  Stole/diverted money 0.3%  Compromised e-mail/documents 12.6%  Publicized intrusion 0.5%  Harassed personnel 4.5%  Other 3.0%
  • 20.
  • 21. User community Network Administration Introducers/Hackers MVS mainframe users (5%) UNIX users (25%) Desktop users (50%)
  • 22. Electronic mail can be intercepted and read Customer’s credit card numbers may be read
  • 23.  Customers risks : Stolen credentials or password Dishonest merchant  Merchants risk : Forged or copied instruments Insufficient funds in customers account
  • 24.  Authorization , Access Control: protect intranet from hoarders: Firewalls  Confidentiality , Data Integrity: message must not be altered or tampered with :  Encryption  Authentication: both parties prove identity before starting transaction: Digital Certificates  Non-repudiation: proof that the document originated by you and you only: Digital signature
  • 25.  The cyber security will defend us from critical attacks.  Internet security process all the incoming and outgoing data on our computer.  Cyber security will defend from hacks and virus.
  • 26.  Held orders  In-house database  Shared database/Chain calls  Telephone database  Issuing Bank  Call the customer
  • 27.  Implementation of existing laws in a stricter manner.  Changes in the:1. Information Technology Act, 2000, Amendment 2008 should be strictly adhered to. 2. Indian Penal Code, 1908 should be in amended, stricter punishment should be imposed on violators. 3. The newly added sections of the Indian Evidence Act should be considered while giving judgments on cyber fraud
  • 28.  The police officers, judges lawyers and the persons associated with legal profession should be sensitized on the matter.  The general public, companies and corporate houses should be made aware of the damages cyber fraud can cause  Advertisements in all forms of media is an effective tool for creating awareness.  High fines should be imposed which should be deterrent in nature.