Chapter 19 Protecting E-Commerce systems. Is IT different? There is some discussion that IT today is no different than past enabling technologies Telegraph.

Slides:



Advertisements
Similar presentations
Weighing the Risks and Benefits of Online Financial Transactions
Advertisements

Section 2- Getting Started with Credit CHAPTER 7.
Zenith Visa Web Acquiring A quick over view. Web Acquiring Allows merchants to receive payments for goods and services through the Internet Allows customers.
Chapter 6 E-commerce Payment Systems. Traditional Payment Systems Cash Checking Transfers Credit Card Accounts Stored Value Accounts Accumulating Balance.
Implications and Security Issues of the Internet By Neelesh Patel.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
1. 2 Someone steals your personal information to commit fraud. A “buy now, pay never” shopping experience. What is Identity Theft?
Consumer Issues Chapter 28.
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
Understand Merchandise Planning in Retailing. The Merchandise Plan A budgeting tool that helps retailer or buyer to meet department goals ▫Planned sales.
Payment Systems The Credit Card System. Basic Concepts.
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
LECTURE 7 REF: CHAPTER 11 ELECTRONIC COMMERCE PAYMENT SYSTEMS PREPARED BY : L. Nouf Almujally Copyright © 2010 Pearson Education, Inc. 1.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
Credit Card Fraud PRESENTED BY THE VIRGINIA OFFICE OF THE ATTORNEY GENERAL June 2013.
CREDIT CARD FRAUDS. Objectives Identify and describe examples of Credit Card frauds. List ways to protect yourself from Credit Card fraud in card present.
FINANCIAL SOCCER Module 3 Credit, debit and prepaid cards Collect a quiz and worksheet from your teacher.
Ecommerce Applications 2009/10 Session 31 E-Commerce Applications E-payment.
EFFECTS & USES OF ICT.
Internet Auctions Users can post items for sale and set a minimum price for it. Other internet users can now bid for the item being sold. These items.
Payment Systems for Electronic Commerce
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
Traditional and Electronic Payment Methods Chapter 3.
Oz – Foundations of Electronic Commerce © 2002 Prentice Hall E-money.
XML AND THE LEGAL FOUNDATIONS FOR ELECTRONIC COMMERCE: Making XML Pay: Revising Existing Electronic Payments Law to Accommodate Innovation Copyright (c)
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Web Payments via Christopher Woods Aaron Buma. Agenda  Introduction  About it  Why to use it  Services they Provide  Seller Protection  Ebay Aspect.
Basic BankingCreditShopping Online Banking Taxes
Electronic Payment Systems
Defining Security Issues
PART THREE E-commerce in Action Norton University E-commerce in Action.
Chapter 11 E-Commerce.
Britannia/NET1 Web Seminar 2007 Presented By: NET1 Payment Solutions Presenter: Brian Morabito.
Objectives  Explore ways to prevent identity theft.  Determine the differences between identity theft and consumer fraud.  Examine how media and technological.
Accounting for Purchases and Cash Payments
Online Goods and Services. Topics Online Shops and Physical Goods Online Shops and Physical Goods Booking Systems Banking Education and Training Gaming.
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
E-commerce Vocabulary Terms. E-commerce Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the Internet.
E-commerce Vocabulary Terms By: Laura Kinchen. Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the.
JPMorgan Chase Purchasing Card Program Executive Summary.
Traditional and Electronic Payment Methods Chapter 3.
Chapter 4 Getting Paid. Objectives Understand electronic payment systems Know why you need a merchant account Know how to get a merchant account Explain.
COMP3121 E-Commerce Technologies Richard Henson University of Worcester November 2011.
CHAPTER 9 CREDIT PROBLEMS AND LAWS LESSON 9-1: RESOLVING CREDIT PROBLEMS Learning Goals -Explain how to dispute errors on billing statements and list ways.
ND e-commerce Carl Arrowsmith Session 14 Consumer Protection & Trust.
Purchasing Items Needed by a Business
1 Fast, secure checkout across the Web. 2 Opportunities in E-Commerce * 2006 State of Retailing Online, Shop.org/Forrester 2006 Consumer Purchases by.
0 Glencoe Accounting Unit 4 Chapter 15 Copyright © by The McGraw-Hill Companies, Inc. All rights reserved. Unit 4 The Accounting Cycle for a Merchandising.
© 2013 Cengage Learning. All rights reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Execute sales transactions. Sales transactions include: Cash or check Debit card sales Credit card sales Layaway sales On approval sale Cash-on-delivery.
Networking E-commerce. E-commerce ► A general term used to describe the buying and selling of products or services over the Internet. ► This covers a.
Protecting Your Assets By Preventing Identity Theft 1.
Credit and Credit Cards Costs and Benefits of Having a Credit Card ©2012, TESCCC.
Electronic Money Lincoln Stein Whitehead Institute/MIT Center for Genome Research.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
SMART SHOPPING ONLINE. VOCABULARY: 30 Day Rule: merchants ship goods within 30 days or inform the customer of delays and their right to cancel the order.
KIARA MARSHALL SEMESTER PROJECT EIS 3302 Ethical Problems in E- Businesses.
How to Manage Risk. This is the process involves the process for any application from a: Individual Cardholder Company or Corporate cards Merchants Any.
Online Shopping. Learning Objectives To learn how society has been affected by online shopping (e-Commerce)
6.01- Shopping Options Effective Shopping Practices.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
Protecting Your Assets By Preventing Identity Theft
Protecting Your Credit Identity
UW Whitewater Procurement Card Program
What is Commerce According to Dictionary.com
Credit Cards and Online Shopping
© 2014 Cengage Learning. All Rights Reserved.
The Purchasing Process
Presentation transcript:

Chapter 19 Protecting E-Commerce systems

Is IT different? There is some discussion that IT today is no different than past enabling technologies Telegraph Electricity Rail TV Is IT becoming a commodity item?

Credit Cards Used for payment on the net In 70’s Mail Order Telephone Order (MOTO) Retailer did not have card for inspection Used expiration date as “password” Delivery to card holders address Liability fully on the merchant

Forgery Skimming Passing card through other device to capture data Can catch by looking at where card used Skimming II Do not bill for merchandise, save data use year later, no record of card being used at crooked merchant

Fraud detection Anomaly detection Travel patterns Patterns of misuse Profiling Bonuses for spotting fraud Online more difficult Based on where transaction originated from

Online Credit Card Fraud SSL makes you “feel” better Most credit card theft not “in transit” Visa guide One-time virtual card numbers

E-commerce site risks Fraud ➔ ◆ Customer uses a stolen card or account number to fraudulently purchase goods/services online. ◆ Family member uses bankcard to order goods/services online, but has not been authorized to do so. ◆ Customer falsely claims that he or she did not receive a shipment. ◆ Hackers find their way into an e-commerce merchant’s payment processing system and then issue credits to hacker card account numbers.

E-commerce site risks Account Information ➔ ◆ Hackers capture customer account data during transmission Theft (Cyber-Thieves) to/from merchant. ◆ Hackers gain access to service provider’s unprotected payment processing systems and steal cardholder account data.

E-commerce site risks Account Information ➔ ◆ Unauthorized individual accesses and steals cardholder Theft (Physical Site) data stored at merchant or service provider site and fraudulently uses or sells it for unauthorized use or identity theft purposes. ◆ Unscrupulous merchant or service provider employee steals cardholder data and fraudulently uses or sells it for unauthorized use or identity theft purposes. ◆ Dumpster-divers steal unshredded account information from trash bins at merchant or service provider location.

E-commerce site risks Customer Disputes and Charge backs ➔ ◆ Goods or services are not as described on the Website. ◆ Customer is billed before goods/services are shipped or delivered. ◆ Confusion and disagreement between customer and merchant over return and refund. ◆ Customer is billed twice for the same order and/or billed for an incorrect amount. ◆ Customer doesn’t recognize the merchant name on statement because merchant uses a service provider to handle billing.

Proper site design Credit card number only “exists” for a short period of time in an accessible location. Use of data pumps can assure it doesn’t move out to accessible location

B2B systems EDI Commercial Lack of legal documents Healthcare confidentiality

New techniques Hard to introduce For instance new payment method Merchants need equipment Customers must generate demand VHS verses Beta format Study of this in Metaverse (adopters)

IT Markets Technology high fixed cost, low marginal cost High costs to switch technologies leading to lock-in Value of product depends on how many adopt it.

Other issues Pricing Free limited version, basic service, gold premium version Free ups number using it, others make money Switching cost Monthly charges match hassle of changing Trying to achieve monopolies Microsoft passport XML makes comparison shopping BOTs easier to write Special offers, errors spread rapidly

Specific Vulnerabilities Web SQL Injection (covered) XSS (Cross Site Scripting) Not really cross site Exploits of holes in site Similar in concept to SQL injection, but inserts malicious code in variables

Articles SSL article Microsoft Passport from business perspective

Previous articles Firewall working%29 working%29 software.com/firewall_faqs/types_of_firewall.html software.com/firewall_faqs/types_of_firewall.html rewall_qa.pdf rewall_qa.pdf

Previous articles Passport Business “looks” s/articles/roi_4_intrusion.php s/articles/roi_4_intrusion.php uld+lead+to+lawsuits/ _ html uld+lead+to+lawsuits/ _ html

List of resources Credit card fraud d d MOTO trade/four/4.htm trade/four/4.htm pting_visa/ops_risk_management/visa_risk_ management_guide_ecommerce.pdf?it=sea rch pting_visa/ops_risk_management/visa_risk_ management_guide_ecommerce.pdf?it=sea rch

List or Resources Prevention p_van.htm p_van.htm Fuzz testing