Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.

Slides:



Advertisements
Similar presentations
CSC 330 E-Commerce Teacher Ahmed Mumtaz Mustehsan Ahmed Mumtaz Mustehsan GM-IT CIIT Islamabad GM-IT CIIT Islamabad CIIT Virtual Campus, CIIT COMSATS Institute.
Advertisements

CH # 5 Top – 2 The Tension Between Security and Other Values
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Network and Internet Security and Privacy.  Explain network and Internet security concerns  Identify online threats.
Copyright © 2004 Pearson Education, Inc. Slide 5-1 E-commerce Kenneth C. Laudon Carol Guercio Traver business. technology. society. Second Edition.
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice HallCopyright © 2009 Pearson Education, Inc. Slide 5-1 Online Security and Payment Systems.
7.1 Copyright © 2011 Pearson Education, Inc. 7 Chapter Securing Information Systems.
E-commerce business. technology. society. Kenneth C. Laudon
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Copyright © 2009 Pearson Education, Inc. Slide 5-1 E-commerce Kenneth C. Laudon Carol.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
Chapter 5 Security and Encryption
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Copyright © 2004 Pearson Education, Inc. Slide 5-1 E-commerce Kenneth C. Laudon Carol Guercio Traver business. technology. society. Second Edition.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Copyright © 2007 Pearson Education, Inc. Slide 5-1 E-commerce Kenneth C. Laudon Carol Guercio Traver business. technology. society. Second Edition.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Copyright © 2007 Pearson Education, Inc. Slide 5-1 E-commerce Kenneth C. Laudon Carol Guercio Traver business. technology. society. Second Edition.
BUSINESS B1 Information Security.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
Viruses & Destructive Programs
1.Too many users 2.Technical factors 3.Organizational factors 4.Environmental factors 5.Poor management decisions Which of the following is not a source.
C8- Securing Information Systems
Computer Security. 2 Computer Crime and Cybercrime Computer crimes occur when intruders gain unauthorized access to computer systems Cybercrime is crime.
Online Security and Payment Systems
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
Management Information Systems Chapter Eight Securing Information Systems Md. Golam Kibria Lecturer, Southeast University.
E-commerceEssentials Kenneth C. Laudon Carol Guercio Traver first edition Copyright © 2014 Pearson Education, Inc.
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice HallCopyright © 2009 Pearson Education, Inc. Slide 5-1 E-commerce Kenneth C. Laudon Carol.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
1 'According to the 2007 Internet Crime Report, Internet Crime Complaint Center (IC3) received 206,884 complaints of Internet crimes More than 90,000.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Chapter 5 Online Security and Payment Systems 1. Teaching Objectives Describe different types of payment systems. Describe different E-commerce payment.
 Malicious Code  Hacking  Natural Disaster  Theft.
Copyright © 2010 Pearson Education, Inc. E-commerce Kenneth C. Laudon Carol Guercio Traver business. technology. society. Sixth Edition.
Network Security.  With an increasing amount of people getting connected to networks, the security threats that cause massive harm are increasing also.
E-commerce Security By John Doran. What is e-commerce?  the buying and selling of products or services over the internet [3].  Most e-commerce transactions.
Information Systems Week 7 Securing Information Systems.
Be Safe Online. Agree, Disagree, Maybe if…  Worksheet Activity  Discussion.
Any criminal action perpetrated primarily through the use of a computer.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Copyright © 2009 Pearson Education, Inc. Slide 5-1 E-commerce Kenneth C. Laudon Carol.
ESTABLISHING AND MANAGING IT SECURITY Prepared by : Siti Mahani Mahmud Yong Azua Mat Zaliza Azan.
7 Chapter Securing Information Systems 1. The Boston Celtics Score Big Points Against Spyware Problem: frequency of wireless usage exposed Celtics’ proprietary.
Securing Information Systems
Security and Encryption
Source: Ecommerce (Chapter 5) Pearson Education
Instructor Materials Chapter 7 Network Security
Chapter 5 Electronic Commerce | Security
Securing Information Systems
Chapter 5 Online Security and Payment Systems
– Communication Technology in a Changing World
E-commerce business. technology. society. Kenneth C. Laudon
ISNE101 Dr. Ken Cosh Week 13.
Chapter 5 Electronic Commerce | Security
Copyright © 2002 Pearson Education, Inc.
Securing Information Systems
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Security and Trust in E- Commerce

The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses significant but stable; individuals face new risks of fraud that may involve substantial uninsured losses –Symantec: Cybercrime on the rise from 2006 –2007 CSI survey: 46% detected security breach; 91% suffered financial loss as a result –Underground economy marketplace that offers sales of stolen information growing

The Tension Between Security and Other Values  Security vs. ease of use: the more security measures added, the more difficult a site is to use, and the slower it becomes  Security vs. desire of individuals to act anonymously

Security Threats in the E-commerce Environment  Three key points of vulnerability: –Client –Server –Communications channel

5 A Typical E-commerce Transaction SOURCE: Boncella, 2000.

6 Vulnerable Points in an E-commerce Environment SOURCE: Boncella, 2000.

Most Common Security Threats in the E-commerce Environment  Malicious code (viruses,Trojans)  Unwanted programs (spyware, browser parasites)  Phishing/identity theft  Credit card fraud/theft  DoS attacks  Phishing and Identity Theft  Insider attacks

Malicious Code  Viruses: Have ability to replicate and spread to other files; most also deliver a “payload” of some sort (destructive or benign); include macro viruses, file- infecting viruses, and script viruses  Worms: Designed to spread from computer to computer  Trojan horse: Appears to be benign, but then does something other than expected  Bots: Can be covertly installed on computer; responds to external commands sent by the attacker

Unwanted Programs  Installed without the user’s informed consent –Browser parasites: Can monitor and change settings of a user’s browser –Adware: Calls for unwanted pop-up ads –Spyware: Can be used to obtain information, such as a user’s keystrokes, , IMs, etc.

Phishing and Identity Theft  Any deceptive, online attempt by a third party to obtain confidential information for financial gain –Most popular type: scam letter –One of fastest growing forms of e-commerce crime

Hacking and Cybervandalism  Hacker: Individual who intends to gain unauthorized access to computer systems  Cracker: Hacker with criminal intent (two terms often used interchangeably)  Cybervandalism: Intentionally disrupting, defacing or destroying a Web site

Credit Card Fraud  Fear that credit card information will be stolen deters online purchases  Hackers target credit card files and other customer information files on merchant servers; use stolen data to establish credit under false identity  One solution: New identity verification mechanisms

Spoofing (Pharming) and Spam (Junk) Web Sites  Spoofing (Pharming) –Misrepresenting oneself by using fake addresses or masquerading as someone else –Threatens integrity of site; authenticity  Spam (Junk) Web sites –Use domain names similar to legitimate one, redirect traffic to spammer-redirection domains

DoS and DDoS Attacks  Denial of service (DoS) attack –Hackers flood Web site with useless traffic to inundate and overwhelm network  Distributed denial of service (DDoS) attack –Hackers use numerous computers to attack target network from numerous launch points

Other Security Threats  Sniffing: Type of eavesdropping program that monitors information traveling over a network; enables hackers to steal proprietary information from anywhere on a network  Insider jobs: Single largest financial threat  Poorly designed server and client software: Increase in complexity of software programs has contributed to increase is vulnerabilities that hackers can exploit

Technology Solutions  Protecting Internet communications (encryption)  Protecting networks (firewalls)  Protecting servers and clients