SlideShare una empresa de Scribd logo
1 de 33
Chapter Three
E-Security
By: Marya sholevar
Fall 2014
The Scope of the Problem

Overall size of cybercrime unclear; amount of losses
significant but stable; individuals face new risks of fraud that
may involve substantial uninsured losses.

Internet Crime Complaint Center (IC3): Logged 1 000 000+
consumer complaints about alleged online fraud or cyber
crime and referred 460,000+ complaints to law enforcement
agencies

2007 Computer Security Institute (CSI) survey: 46% detected
security breach; 91% suffered financial loss as a result. The
average annual loss reported in this year’s survey shot up
to $350,424 from $168,000 the previous year.
The Different Dimensions of
E-commerce Security
1-Integrity
The ability to ensure that information being displayed
on a web site or transmitted or received over the
internet has not been altered in any way by an
unauthorized party
2-Nonrepudiation
The ability to ensure that e-commerce participants do
not deny (i.e. repudiate) their online actions
3-Authenticity
The ability to identify the identity of a person or entity
with whom you are dealing in the internet
The Different Dimensions of
E-commerce Security
4-Confidentiality
The ability to ensure that messages and data are
available only to those who are authorized to view
them
5-Privacy
The ability to control the use of information about
oneself
6-Availability
The ability to ensure that an e-commerce site continues
top function as intended.
The tension between
security and other values

Security vs. ease of use:

the more security measures added, the more
difficult a site is to use, and the slower it
becomes

Security vs. desire of individuals to act
anonymously

Use of technology by criminals to plan crimes
o threaten nation-state
Security Threats in the E-
commerce Environment

Three key points of vulnerability:

Client

Server

Communications channel
What Is Good E-
commerce Security?

To achieve highest degree of security

New technologies

Organizational policies and procedures

Industry standards and government laws

Other factors

Time value of money

Cost of security vs. potential loss

Security often breaks at weakest link
Common Security Threats
in the E-commerce
1-Malicious code:
1-1 Viruses:

Replicate and spread to other files; most deliver
“payload” destructive or benign)

Macro viruses, file-infecting viruses, script viruses
1-2 Worms:

Designed to spread from computer to computer
Can replicate without being executed by a user or
program like virus
Common Security Threats
in the E-commerce
1-3 Trojan horses:

Appears benign, but does something other than
expected
1-4 Bots, botnets:

Covertly installed on computer; respond to
external commands sent by attacker to create a
network of compromised computers for sending
spam, generating a DDoS attack, and stealing info
from computers
Common Security Threats
in the E-commerce
2- Unwanted programs:

Unwanted Programs Installed without user’s informed
consent
2-1 Browser parasites:

Can monitor and change settings of a user’s browser.
2-2 Adware:Calls for unwanted pop-up ads
2-3 Spyware:

Can be used to obtain information, such as a user’s
keystrokes, e-mail, IMs, etc.
Common Security
Threats: Phishing

Phishing:Deceptive online attempt to obtain
confidential information

Social engineering E-mail scams, Spoofing
legitimate Web sites

Use of information to commit fraudulent acts
(access checking accounts), steal identity
Common Security
Threats: Hackers

Hackers: Individual who intends to gain unauthorized
access to computer systems

Crackers: Hacker with criminal intent

Types of hackers:

White hats – hired by corporate to find weaknesses in
the firm’s computer system

Black hats – hackers with intention of causing harm

Grey hats – hackers breaking in and revealing system
flaws without disrupting site or attempting to profit
from their finds.
Common Security Threats:
Credit Card Fraud

Fear of stolen credit card information deters online
purchases.

US’s federal law limits liability of individuals to $50 for a
stolen credit card.

Hackers target credit card files and other customer.
information files on merchant servers; use stolen data to
establish credit under false identity.

Online companies at higher risk than offline due to difficulty
of guarenteeing true identity of customers.

“E-Sign” law giving digital signatures same authority as
hand-written ones applies only to large corporations, but not
to B2C e-commerce.
Common Security
Threats:Spoofing

Misrepresenting oneself by using fake e-mail
addresses or masquerading as someone else.

Spoofing a Web site is called “pharming,” redirecting a
Web link to another IP address different from the real
one.

Threatens integrity (steal business from true site, or
alter orders and send to true site), and authenticity
(difficult to distinguish between true and fake Web
address).

Carried out by hacking local DNS servers.
Common Security Threats:
Spam (Junk) Web sites

Collection of advertisements for other sites, some of
which containing malicious code.

Appears on search results, hiding their identities by
using domain names similar to legitimate ones, and
redirecting traffic to spammer domains, e.g.,
topsearch10.com.
Common Security Threats:
Denial of service (DoS) attack

Hackers flood Web site with useless traffic to inundate
and overwhelm network.

Use of bot networks built from hundreds of
compromised workstations.
Common Security Threats:
Distributed denial of service (DDoS) attack

Hackers use multiple computers to attack target
network from numerous launch points.

Microsoft and Yahoo have experienced such attacks.
Common Security Threats:
Sniffing, Insider jobs: , ...

Sniffing:

Eavesdropping program that monitors information
traveling over a network.

Insider jobs:

Single largest financial threat .

Poorly designed server and client software:

Due to increase in complexity and size of OS,
application software, and browsers.
Common Security Threats:
Sniffing, Insider jobs: , ...

Social network security:

Social engineering attacks tempting visitors to FB
pages.

Mobile platform threats:

Same risks as any Internet device Malware, botnets,
vishing/smishing .
Technology Solutions

Protecting Internet communications:

Encryption

Securing channels of communication

SSL, S-HTTP, VPNs

Protecting networks

Firewalls

Protecting servers and clients
Protecting Internet Communications:
Encryption

Encryption Transforms plain text data into cipher text
readable only by sender and receiver.

Purpose:

Secures stored information and information
transmission.
Protecting Internet Communications:
Encryption

Provides 4 of 6 key dimensions of e-commerce security:

Message integrity – assurance that message hasn’t been
altered.

Nonrepudiation – prevents user from denying sending the
message.

Authentication – verification of identity of person
(computer) sending the msg.

Confidentiality – assurance that msg. was not read by
others.
Securing Channels of Communication
Secure Sockets Layer (SSL):

Establishes a secure, negotiated client-server session in
which URL of requested document, along with contents, is
encrypted.

Designed to establish a secure connection between two
computers .
Virtual Private Network (VPN):

Allows remote users to securely access internal network
via the Internet, using Point-to-Point Tunneling Protocol
(PPTP)
Protecting Networks
Firewall:

Hardware or software that filters packets (prevents some
packets from entering the network) by using security
policy.
Two main methods:

Packet filters – looks inside data packets to decide
whether they are destined for a prohibited port or originate
from a prohibited IP address.

Application gateways – filters communications based on
the application being requested, rather than the source or
destination of the message
Protecting Networks

Application gateways provide greater security than packet
filters, but can compromise system performance
Proxy servers (proxies):

Software servers that handle all communications
originating from or being sent to the Internet.

Initially for limiting access of internal clients to external
Internet servers.

Can be used to restrict access to certain types of sites,
such as porno, auction, or stock-trading sites, or to
cache frequently-accessed Web pages to reduce
download times.
Protecting Servers and Clients

Operating system security enhancements :

Upgrades, patches.

Anti-virus software:

Easiest and least expensive way to prevent threats to
system integrity.

Requires daily updates
E-Security Risks and Solutions

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

protection & security of e-commerce ...
protection & security of e-commerce ...protection & security of e-commerce ...
protection & security of e-commerce ...
 
Security Threats in E-Commerce
Security Threats in E-CommerceSecurity Threats in E-Commerce
Security Threats in E-Commerce
 
E commerce security
E commerce securityE commerce security
E commerce security
 
Security in E-commerce
Security in E-commerceSecurity in E-commerce
Security in E-commerce
 
Full Notes on E-Commerce | Study Material for E-Commerce
Full Notes on E-Commerce | Study Material for E-Commerce Full Notes on E-Commerce | Study Material for E-Commerce
Full Notes on E-Commerce | Study Material for E-Commerce
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Electronic Data Interchange (EDI) | E-Commerce
Electronic Data Interchange (EDI) | E-CommerceElectronic Data Interchange (EDI) | E-Commerce
Electronic Data Interchange (EDI) | E-Commerce
 
Chapter 8 / Electronic Payment
Chapter 8 / Electronic  PaymentChapter 8 / Electronic  Payment
Chapter 8 / Electronic Payment
 
Security issues in E-commerce
Security issues in E-commerceSecurity issues in E-commerce
Security issues in E-commerce
 
Some E-commerce Applications
Some E-commerce ApplicationsSome E-commerce Applications
Some E-commerce Applications
 
e-commerce
e-commercee-commerce
e-commerce
 
Electronic Payment System (EPS) Presentation
Electronic Payment System (EPS) PresentationElectronic Payment System (EPS) Presentation
Electronic Payment System (EPS) Presentation
 
E Commerce -Security Threats and Challenges
E Commerce -Security Threats and ChallengesE Commerce -Security Threats and Challenges
E Commerce -Security Threats and Challenges
 
Sms banking
Sms bankingSms banking
Sms banking
 
Edi ppt
Edi pptEdi ppt
Edi ppt
 
E commerce
E commerceE commerce
E commerce
 
Regulatory Framework of E-Commerce
Regulatory Framework of E-CommerceRegulatory Framework of E-Commerce
Regulatory Framework of E-Commerce
 
Internet Fraud
Internet FraudInternet Fraud
Internet Fraud
 
Data and Message Security
Data and Message SecurityData and Message Security
Data and Message Security
 

Destacado

Chapter Two E commerc business model
Chapter Two E commerc business modelChapter Two E commerc business model
Chapter Two E commerc business modelMarya Sholevar
 
DSS - ITSEC conf - Arcot - Security for eCommerce - Riga Nov2011
DSS - ITSEC conf - Arcot - Security for eCommerce - Riga Nov2011DSS - ITSEC conf - Arcot - Security for eCommerce - Riga Nov2011
DSS - ITSEC conf - Arcot - Security for eCommerce - Riga Nov2011Andris Soroka
 
E Crm
E CrmE Crm
E Crmjim
 
04-1 E-commerce Security slides
04-1 E-commerce Security slides04-1 E-commerce Security slides
04-1 E-commerce Security slidesmonchai sopitka
 
102 e-business model - 20 cases - v6.8 - update 9 jan 2014
102   e-business model - 20 cases - v6.8 - update 9 jan 2014102   e-business model - 20 cases - v6.8 - update 9 jan 2014
102 e-business model - 20 cases - v6.8 - update 9 jan 2014Dao Hoa
 
The Digital economy's next Top e-Business Model
The Digital economy's next Top e-Business ModelThe Digital economy's next Top e-Business Model
The Digital economy's next Top e-Business ModelIan Miles
 
Electronic Payment System
Electronic Payment SystemElectronic Payment System
Electronic Payment SystemRitesh Goyal
 
The electronic payment systems
The electronic payment systemsThe electronic payment systems
The electronic payment systemsVishal Singh
 
Chapter 4 payment systems in e-commerce
Chapter 4  payment systems in e-commerceChapter 4  payment systems in e-commerce
Chapter 4 payment systems in e-commerceMarya Sholevar
 
E commerce business models
E commerce business modelsE commerce business models
E commerce business modelsVikram g b
 

Destacado (14)

Chapter Two E commerc business model
Chapter Two E commerc business modelChapter Two E commerc business model
Chapter Two E commerc business model
 
Chapter 6:e marketing
Chapter 6:e marketingChapter 6:e marketing
Chapter 6:e marketing
 
DSS - ITSEC conf - Arcot - Security for eCommerce - Riga Nov2011
DSS - ITSEC conf - Arcot - Security for eCommerce - Riga Nov2011DSS - ITSEC conf - Arcot - Security for eCommerce - Riga Nov2011
DSS - ITSEC conf - Arcot - Security for eCommerce - Riga Nov2011
 
Chapter 7 e crm
Chapter 7 e crmChapter 7 e crm
Chapter 7 e crm
 
E Crm
E CrmE Crm
E Crm
 
04-1 E-commerce Security slides
04-1 E-commerce Security slides04-1 E-commerce Security slides
04-1 E-commerce Security slides
 
102 e-business model - 20 cases - v6.8 - update 9 jan 2014
102   e-business model - 20 cases - v6.8 - update 9 jan 2014102   e-business model - 20 cases - v6.8 - update 9 jan 2014
102 e-business model - 20 cases - v6.8 - update 9 jan 2014
 
The Digital economy's next Top e-Business Model
The Digital economy's next Top e-Business ModelThe Digital economy's next Top e-Business Model
The Digital economy's next Top e-Business Model
 
Electronic Payment System
Electronic Payment SystemElectronic Payment System
Electronic Payment System
 
The electronic payment systems
The electronic payment systemsThe electronic payment systems
The electronic payment systems
 
E business models
E business modelsE business models
E business models
 
Chapter 4 payment systems in e-commerce
Chapter 4  payment systems in e-commerceChapter 4  payment systems in e-commerce
Chapter 4 payment systems in e-commerce
 
E-Commerce PPT
E-Commerce PPTE-Commerce PPT
E-Commerce PPT
 
E commerce business models
E commerce business modelsE commerce business models
E commerce business models
 

Similar a E-Security Risks and Solutions

Similar a E-Security Risks and Solutions (20)

Important Notes
Important NotesImportant Notes
Important Notes
 
onlinesecurityandpaymentsystem-140116021418-phpapp01.pdf
onlinesecurityandpaymentsystem-140116021418-phpapp01.pdfonlinesecurityandpaymentsystem-140116021418-phpapp01.pdf
onlinesecurityandpaymentsystem-140116021418-phpapp01.pdf
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
 
E commerce security 4
E commerce security 4E commerce security 4
E commerce security 4
 
Security for e commerce
Security for e commerceSecurity for e commerce
Security for e commerce
 
Information security
Information securityInformation security
Information security
 
cybersecurity
cybersecuritycybersecurity
cybersecurity
 
Security environment
Security environmentSecurity environment
Security environment
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingment
 
Computer Secutity.
Computer Secutity.Computer Secutity.
Computer Secutity.
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptx
 
Mis security system threads
Mis security system threadsMis security system threads
Mis security system threads
 
Security issue in e commerce
Security issue in e commerceSecurity issue in e commerce
Security issue in e commerce
 
INTERNET SECURITY.pptx
INTERNET SECURITY.pptxINTERNET SECURITY.pptx
INTERNET SECURITY.pptx
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering students
 
E comm jatin
E comm jatinE comm jatin
E comm jatin
 
securityenvironment.pptx
securityenvironment.pptxsecurityenvironment.pptx
securityenvironment.pptx
 
Improving Cybersecurity Awareness In Advanced Payment Systems
Improving Cybersecurity Awareness In Advanced Payment SystemsImproving Cybersecurity Awareness In Advanced Payment Systems
Improving Cybersecurity Awareness In Advanced Payment Systems
 
web-security-1215757214755670-9.pdf
web-security-1215757214755670-9.pdfweb-security-1215757214755670-9.pdf
web-security-1215757214755670-9.pdf
 

Más de Marya Sholevar

Marketing Financial Services
Marketing Financial ServicesMarketing Financial Services
Marketing Financial ServicesMarya Sholevar
 
Chapter 5 tech in e commerce
Chapter 5 tech in e commerceChapter 5 tech in e commerce
Chapter 5 tech in e commerceMarya Sholevar
 
Chapter one Overview of E-Commerce
Chapter one Overview of E-CommerceChapter one Overview of E-Commerce
Chapter one Overview of E-CommerceMarya Sholevar
 
Chapter 6: FINANCIAL OPERATIONS OF I NSURERS
Chapter 6: FINANCIAL OPERATIONS OF I NSURERSChapter 6: FINANCIAL OPERATIONS OF I NSURERS
Chapter 6: FINANCIAL OPERATIONS OF I NSURERSMarya Sholevar
 
Chapter 5: Insurance Marketing
Chapter 5: Insurance MarketingChapter 5: Insurance Marketing
Chapter 5: Insurance MarketingMarya Sholevar
 
Chapter 4: INSURANCE COMPANY OPERATIONS
Chapter 4: INSURANCE COMPANY OPERATIONSChapter 4: INSURANCE COMPANY OPERATIONS
Chapter 4: INSURANCE COMPANY OPERATIONSMarya Sholevar
 
Chapter 3: Organization of insurer
Chapter 3: Organization of insurerChapter 3: Organization of insurer
Chapter 3: Organization of insurerMarya Sholevar
 
Chapter 2:Insurance Contract
Chapter 2:Insurance ContractChapter 2:Insurance Contract
Chapter 2:Insurance ContractMarya Sholevar
 
Chapter 1: Introduction to Insurance
Chapter 1: Introduction to InsuranceChapter 1: Introduction to Insurance
Chapter 1: Introduction to InsuranceMarya Sholevar
 

Más de Marya Sholevar (9)

Marketing Financial Services
Marketing Financial ServicesMarketing Financial Services
Marketing Financial Services
 
Chapter 5 tech in e commerce
Chapter 5 tech in e commerceChapter 5 tech in e commerce
Chapter 5 tech in e commerce
 
Chapter one Overview of E-Commerce
Chapter one Overview of E-CommerceChapter one Overview of E-Commerce
Chapter one Overview of E-Commerce
 
Chapter 6: FINANCIAL OPERATIONS OF I NSURERS
Chapter 6: FINANCIAL OPERATIONS OF I NSURERSChapter 6: FINANCIAL OPERATIONS OF I NSURERS
Chapter 6: FINANCIAL OPERATIONS OF I NSURERS
 
Chapter 5: Insurance Marketing
Chapter 5: Insurance MarketingChapter 5: Insurance Marketing
Chapter 5: Insurance Marketing
 
Chapter 4: INSURANCE COMPANY OPERATIONS
Chapter 4: INSURANCE COMPANY OPERATIONSChapter 4: INSURANCE COMPANY OPERATIONS
Chapter 4: INSURANCE COMPANY OPERATIONS
 
Chapter 3: Organization of insurer
Chapter 3: Organization of insurerChapter 3: Organization of insurer
Chapter 3: Organization of insurer
 
Chapter 2:Insurance Contract
Chapter 2:Insurance ContractChapter 2:Insurance Contract
Chapter 2:Insurance Contract
 
Chapter 1: Introduction to Insurance
Chapter 1: Introduction to InsuranceChapter 1: Introduction to Insurance
Chapter 1: Introduction to Insurance
 

Último

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 

Último (20)

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 

E-Security Risks and Solutions

  • 2. The Scope of the Problem  Overall size of cybercrime unclear; amount of losses significant but stable; individuals face new risks of fraud that may involve substantial uninsured losses.  Internet Crime Complaint Center (IC3): Logged 1 000 000+ consumer complaints about alleged online fraud or cyber crime and referred 460,000+ complaints to law enforcement agencies  2007 Computer Security Institute (CSI) survey: 46% detected security breach; 91% suffered financial loss as a result. The average annual loss reported in this year’s survey shot up to $350,424 from $168,000 the previous year.
  • 3.
  • 4.
  • 5.
  • 6. The Different Dimensions of E-commerce Security 1-Integrity The ability to ensure that information being displayed on a web site or transmitted or received over the internet has not been altered in any way by an unauthorized party 2-Nonrepudiation The ability to ensure that e-commerce participants do not deny (i.e. repudiate) their online actions 3-Authenticity The ability to identify the identity of a person or entity with whom you are dealing in the internet
  • 7. The Different Dimensions of E-commerce Security 4-Confidentiality The ability to ensure that messages and data are available only to those who are authorized to view them 5-Privacy The ability to control the use of information about oneself 6-Availability The ability to ensure that an e-commerce site continues top function as intended.
  • 8. The tension between security and other values  Security vs. ease of use:  the more security measures added, the more difficult a site is to use, and the slower it becomes  Security vs. desire of individuals to act anonymously  Use of technology by criminals to plan crimes o threaten nation-state
  • 9. Security Threats in the E- commerce Environment  Three key points of vulnerability:  Client  Server  Communications channel
  • 10.
  • 11.
  • 12. What Is Good E- commerce Security?  To achieve highest degree of security  New technologies  Organizational policies and procedures  Industry standards and government laws  Other factors  Time value of money  Cost of security vs. potential loss  Security often breaks at weakest link
  • 13. Common Security Threats in the E-commerce 1-Malicious code: 1-1 Viruses:  Replicate and spread to other files; most deliver “payload” destructive or benign)  Macro viruses, file-infecting viruses, script viruses 1-2 Worms:  Designed to spread from computer to computer Can replicate without being executed by a user or program like virus
  • 14. Common Security Threats in the E-commerce 1-3 Trojan horses:  Appears benign, but does something other than expected 1-4 Bots, botnets:  Covertly installed on computer; respond to external commands sent by attacker to create a network of compromised computers for sending spam, generating a DDoS attack, and stealing info from computers
  • 15. Common Security Threats in the E-commerce 2- Unwanted programs:  Unwanted Programs Installed without user’s informed consent 2-1 Browser parasites:  Can monitor and change settings of a user’s browser. 2-2 Adware:Calls for unwanted pop-up ads 2-3 Spyware:  Can be used to obtain information, such as a user’s keystrokes, e-mail, IMs, etc.
  • 16. Common Security Threats: Phishing  Phishing:Deceptive online attempt to obtain confidential information  Social engineering E-mail scams, Spoofing legitimate Web sites  Use of information to commit fraudulent acts (access checking accounts), steal identity
  • 17. Common Security Threats: Hackers  Hackers: Individual who intends to gain unauthorized access to computer systems  Crackers: Hacker with criminal intent  Types of hackers:  White hats – hired by corporate to find weaknesses in the firm’s computer system  Black hats – hackers with intention of causing harm  Grey hats – hackers breaking in and revealing system flaws without disrupting site or attempting to profit from their finds.
  • 18. Common Security Threats: Credit Card Fraud  Fear of stolen credit card information deters online purchases.  US’s federal law limits liability of individuals to $50 for a stolen credit card.  Hackers target credit card files and other customer. information files on merchant servers; use stolen data to establish credit under false identity.  Online companies at higher risk than offline due to difficulty of guarenteeing true identity of customers.  “E-Sign” law giving digital signatures same authority as hand-written ones applies only to large corporations, but not to B2C e-commerce.
  • 19. Common Security Threats:Spoofing  Misrepresenting oneself by using fake e-mail addresses or masquerading as someone else.  Spoofing a Web site is called “pharming,” redirecting a Web link to another IP address different from the real one.  Threatens integrity (steal business from true site, or alter orders and send to true site), and authenticity (difficult to distinguish between true and fake Web address).  Carried out by hacking local DNS servers.
  • 20. Common Security Threats: Spam (Junk) Web sites  Collection of advertisements for other sites, some of which containing malicious code.  Appears on search results, hiding their identities by using domain names similar to legitimate ones, and redirecting traffic to spammer domains, e.g., topsearch10.com.
  • 21. Common Security Threats: Denial of service (DoS) attack  Hackers flood Web site with useless traffic to inundate and overwhelm network.  Use of bot networks built from hundreds of compromised workstations.
  • 22. Common Security Threats: Distributed denial of service (DDoS) attack  Hackers use multiple computers to attack target network from numerous launch points.  Microsoft and Yahoo have experienced such attacks.
  • 23. Common Security Threats: Sniffing, Insider jobs: , ...  Sniffing:  Eavesdropping program that monitors information traveling over a network.  Insider jobs:  Single largest financial threat .  Poorly designed server and client software:  Due to increase in complexity and size of OS, application software, and browsers.
  • 24. Common Security Threats: Sniffing, Insider jobs: , ...  Social network security:  Social engineering attacks tempting visitors to FB pages.  Mobile platform threats:  Same risks as any Internet device Malware, botnets, vishing/smishing .
  • 25. Technology Solutions  Protecting Internet communications:  Encryption  Securing channels of communication  SSL, S-HTTP, VPNs  Protecting networks  Firewalls  Protecting servers and clients
  • 26.
  • 27. Protecting Internet Communications: Encryption  Encryption Transforms plain text data into cipher text readable only by sender and receiver.  Purpose:  Secures stored information and information transmission.
  • 28. Protecting Internet Communications: Encryption  Provides 4 of 6 key dimensions of e-commerce security:  Message integrity – assurance that message hasn’t been altered.  Nonrepudiation – prevents user from denying sending the message.  Authentication – verification of identity of person (computer) sending the msg.  Confidentiality – assurance that msg. was not read by others.
  • 29. Securing Channels of Communication Secure Sockets Layer (SSL):  Establishes a secure, negotiated client-server session in which URL of requested document, along with contents, is encrypted.  Designed to establish a secure connection between two computers . Virtual Private Network (VPN):  Allows remote users to securely access internal network via the Internet, using Point-to-Point Tunneling Protocol (PPTP)
  • 30. Protecting Networks Firewall:  Hardware or software that filters packets (prevents some packets from entering the network) by using security policy. Two main methods:  Packet filters – looks inside data packets to decide whether they are destined for a prohibited port or originate from a prohibited IP address.  Application gateways – filters communications based on the application being requested, rather than the source or destination of the message
  • 31. Protecting Networks  Application gateways provide greater security than packet filters, but can compromise system performance Proxy servers (proxies):  Software servers that handle all communications originating from or being sent to the Internet.  Initially for limiting access of internal clients to external Internet servers.  Can be used to restrict access to certain types of sites, such as porno, auction, or stock-trading sites, or to cache frequently-accessed Web pages to reduce download times.
  • 32. Protecting Servers and Clients  Operating system security enhancements :  Upgrades, patches.  Anti-virus software:  Easiest and least expensive way to prevent threats to system integrity.  Requires daily updates