0% found this document useful (0 votes)
56 views37 pages

E-Commerce Chap 4

vbghh

Uploaded by

hoppnb21
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
56 views37 pages

E-Commerce Chap 4

vbghh

Uploaded by

hoppnb21
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 37

E-Commerce: Business. Technology.

Society

CHAPTER 4

E-commerce Security and


Payment Systems
MSc Ta Minh Thao

Copyright © 2023 Pearson Education, Inc. All Rights Reserve


4.1 Understand the scope of e-
commerce crime and security 4.2 Identify the key security
Learning Objectives
problems, the key dimensions of
e-commerce security, and the
threats in the e-commerce
environment.
tension between security and
4.3 Describe
other values. how technology 4.4 Appreciate the importance of
helps secure Internet
policies, procedures, and laws in
communications channels and
creating security.
protect networks, servers, and
clients.
4.5 Identify the major e- 4.6 Describe the features and
commerce payment systems in functionality of electronic billing
use today. presentment and payment
systems.

Copyright © 2023 Pearson Education, Inc. All Rights Reserve


1 2 3 Security
The E-commerce 4 Environment
5
Overall size Average total Low-cost Online credit Underground
and losses of cost of data web attack card fraud economy
cyber-crime breach to kits marketplace
unclear U.S.
corporations
was almost
$4 million
(2018)

Copyright © 2023 Pearson Education, Inc. All Rights Reserve


What Is Good E-commerce Security?

 To achieve highest degree


of security
- New technologies
- Organizational policies and
procedures
- Industry standards and
government laws

Copyright © 2023 Pearson Education, Inc. All Rights Reserve


Customer and Merchant Perspectives on the
Different Dimensions of E-commerce Security

Copyright © 2023 Pearson Education, Inc. All Rights Reserve


The Tension Between Security and Other Values
 Ease of use
- The more security measures added, the more difficult a site is to
use, and the slower it becomes
 Public safety and criminal uses of the Internet
- Use of technology by criminals to plan crimes or threaten
nation-state
 Why China's New Digital Currency Raises Privacy Concerns
https://www.youtube.com/watch?v=Y6YLQXM5izM

Copyright © 2023 Pearson Education, Inc. All Rights Reserve


Security Threats in the E-commerce Environment
 Three key points of vulnerability in e-commerce environment:
- Client
- Server
- Communications pipeline (Internet communications channels)
 The most common and most damaging forms of security
threats to e-commerce consumers and site operators
- Malicious code
- Potentially unwanted programs
- Phishing
- Hacking
- Cybervandalism
Copyright © 2023 Pearson Education, Inc. All Rights Reserve
Security Threats in the E-commerce Environment
 Three key points of vulnerability in e-commerce environment:
- Client
- Server
- Communications pipeline (Internet communications channels)
 The most common and most damaging forms of security
threats to e-commerce consumers and site operators
- Malicious code
- Potentially unwanted programs
- Phishing
- Hacking
- Cybervandalism
Copyright © 2023 Pearson Education, Inc. All Rights Reserve
Exploits and Drive-by
exploit kits Malicious
Maladvertising Code
download
Viruses

Ransomware
Worms Trojan horses Backdoors
(scareware)

Bots, botnets

Copyright © 2023 Pearson Education, Inc. All Rights Reserve


Potentially Unwanted Programs
 Browser parasites
- Monitor and change user’s browser
 Adware
- Used to call pop-up ads
 Spyware
- Tracks user’s keystrokes, e-mails, IMs, etc.

Copyright © 2023 Pearson Education, Inc. All Rights Reserve


Phishing
 Any deceptive, online attempt by a third party to obtain
confidential information for financial gain
 Tactics
- Social engineering
- E-mail scams
- Spear phishing
 Used for identity fraud and theft

Copyright © 2023 Pearson Education, Inc. All Rights Reserve


 Hacking
- Hackers vs. crackers
- Goals: cybervandalism, data breaches
 Cybervandalism:
Hacking, - Disrupting, defacing, destroying
Cybervandalism website
and Hacktivism  Hacktivism
- Hacktivists attack governments,
organizations and individuals for
political purposes

Copyright © 2023 Pearson Education, Inc. All Rights Reserve


Data Breaches
 When organizations lose control over corporate information
to outsiders
 Leading causes
- Hacking
- Employee error/negligence
- Accidental e-mail/Internet exposure
- Insider theft
Copyright © 2023 Pearson Education, Inc. All Rights Reserve
Credit Card Fraud/Theft
 Systematic hacking and looting of corporate servers storing
credit card information is the primary cause of stolen credit
card and card information.
 Central security issue: establishing customer identity
- E-signatures
- Multi-factor authentication
- Fingerprint identification, face ID - biomatrix devices

Copyright © 2023 Pearson Education, Inc. All Rights Reserve


Identity Fraud/Theft
 Unauthorized use of another person’s personal data
for illegal financial benefit
- Social security number
- Driver’s license
- Credit card numbers
- Usernames/passwords

Copyright © 2023 Pearson Education, Inc. All Rights Reserve


Spoofing, Pharming, and Spam (Junk) Websites
 Spoofing
- Attempting to hide true identity by using someone else’s e-
mail or IP address
 Pharming
- Automatically redirecting a web link to a different address,
to benefit the hacker
 Spam (junk) websites
- Offer collection of advertisements for other sites, which
may contain malicious code

Copyright © 2023 Pearson Education, Inc. All Rights Reserve


Sniffing and Man-in-the-Middle Attacks

 Sniffer
- Eavesdropping program monitoring networks
- Can be used by criminals to steal proprietary information
 E-mail wiretaps
- Recording e-mails at the mail server level
 Man-in-the-middle attack
- The attacker intercepts and changes communication between
two parties who believe they are communicating directly
Copyright © 2023 Pearson Education, Inc. All Rights Reserve
Denial of Service (DoS) and
Distributed Denial of Service (DDoS) Attacks
 Denial of service (DoS) attack
- Flooding website with pings and page requests
- Overwhelm and can shut down site’s web servers
- Often accompanied by blackmail attempts
- Botnets
 Distributed Denial of Service (DDoS) attack
- Uses hundreds or thousands of computers to attack target
network
- Can use devices from the Internet of Things, mobile devices
Copyright © 2023 Pearson Education, Inc. All Rights Reserve
Insider Attacks

Largest threat to business Employee access to privileged


institutions comes from insider information
embezzlement

Poor security procedures Insiders more likely to be source of


cyberattacks than outsiders

Copyright © 2023 Pearson Education, Inc. All Rights Reserve


The increase in complexity of and demand for software has led to
an increase in flaws and vulnerabilities
Poorly Designed Software
SQL injection attacks

Zero-day vulnerability

Heartbleed bug

Copyright © 2023 Pearson Education, Inc. All Rights Reserve


Social Network Security Issues

 Social networks an environment for:


- Viruses, site takeovers, identity fraud, malware-loaded
apps, click hijacking, phishing, spam
 Manual sharing scams
 Fake offerings, fake Like buttons, and fake apps

Copyright © 2023 Pearson Education, Inc. All Rights Reserve


Mobile Platform Security Issues
SMS
Vishing Smishing Madware
spoofing

Copyright © 2023 Pearson Education, Inc. All Rights Reserve


Cloud Security Issues
DDos (distributed denial Cloud offers a popular
of service) attacks cloud file-sharing service
where the data could be
accessed without
authorization on Dropbox.
Lack of encryption and
strong security procedures

Copyright © 2023 Pearson Education, Inc. All Rights Reserve


Internet of Things (IoT) Security Issues

 IoT: the use of internet to connect wide variety of devices,


machines and sensors
 Challenging environment to protect
 Vast quantity of interconnected links
 Near identical devices with long service lives
 Many devices have no upgrade features
 Little visibility into workings, data, or security
Copyright © 2023 Pearson Education, Inc. All Rights Reserve
Technology Solutions (1 of 3)
 Protecting Internet communications
- Encryption: transform the message into code
- These 4 key dimensions of e-commerce security involve
encryption:
• Message integrity
• Nonrepudiation
• Authentication
• Confidentiality
- Availability and privacy do not related to encryption.

Copyright © 2023 Pearson Education, Inc. All Rights Reserve


Technology Solutions (2 of 3)
 Public key cryptography
- Public key cryptography uses two mathematically related
digital keys.
- Public key cryptography does not ensure message integrity.
- Public key cryptography is based on the idea of irreversible
mathematical functions.
 Securing channels of communication
- SSL, TLS, VPNs, Wi-Fi

Copyright © 2023 Pearson Education, Inc. All Rights Reserve


Technology Solutions (3 of 3)
 Protecting networks
- Firewalls: hardware or software that act as a filter to prevent
unwanted packets from entering their network
- Proxy servers: software servers that handle all communications
from or sent to the Internet (dual home systems)
 Protecting servers and clients
- OS security
- Anti-virus software: easiest and least expensive way to prevent
threats to system integrity

Copyright © 2023 Pearson Education, Inc. All Rights Reserve


Tools Available to Achieve E-commerce Security

Copyright © 2023 Pearson Education, Inc. All Rights Reserve


Securing Channels of Communication (1 of 2)
 Secure Sockets Layer (SSL)/Transport Layer Security (TLS)
- Establishes secure communication by verification of username
and password (credit card processing)
- Processes the certificates and private/public key information
issued for authentication of an online merchant
 Virtual Private Network (VPN)
- Allows remote users to securely access the internal network via
the Internet

Copyright © 2023 Pearson Education, Inc. All Rights Reserve


Securing Channels of Communication (2 of 2)
 Digital certificate includes:
- Name of subject/company
- Subject's public key.
- Digital signature of the certification authority.
- Digital certificate serial number
- Expiration date, issuance date
- Digital signature of CA
 Wireless (Wi-Fi) networks
- WPA2 is the current standard used to protect Wi-Fi networks
Copyright © 2023 Pearson Education, Inc. All Rights Reserve
Management Policies, Business
Procedures, and Public Laws
 Managing risk includes:
- Technology
- Effective management policies, e.g.: authorization management
system restricts access to private information within a company’s
internet infrastructure. Specified where and when a user is
permitted to access certain parts of a website
- Public laws and active enforcement

Copyright © 2023 Pearson Education, Inc. All Rights Reserve


Developing an E-commerce Security Plan

 The security organization typically


administers access control,
authentication procedures and
authorization policies. Biometric
devices, e.g: face ID can be used
for verification of an individual.
 Examples of access control:
firewalls, proxy servers, login
procedures

Copyright © 2023 Pearson Education, Inc. All Rights Reserve


 In the U.S., credit and debit cards
are primary online payment methods
- Other countries have different systems
E-commerce  Limitations of online credit card
Payment payment
Systems - Security, merchant risk
- Cost
- Social equity

Copyright © 2023 Pearson Education, Inc. All Rights Reserve


Blockchain: a technology that enables organizations to create
and verify transactions on a network nearly instantaneously
without a centralBlockchain
authority. and Cryptocurrencies
Cryptocurrency: purely digital asset that works as a medium
of exchange using cryptography

Bitcoin: most prominent example of cryptocurrency in use


today

Copyright © 2023 Pearson Education, Inc. All Rights Reserve


How Blockchain Works

Copyright © 2023 Pearson Education, Inc. All Rights Reserve


Electronic Billing Presentment
and Payment (EBPP)
Major players in the U.S. EBPP marketspace

 Online payment systems for


monthly bills
 Four EBPP business models:
 All models are supported by
EBPP infrastructure providers

Copyright © 2023 Pearson Education, Inc. All Rights Reserve


END OF CHAPTER 4
THANK YOU !

Copyright © 2023 Pearson Education, Inc. All Rights Reserve

You might also like