Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.

Slides:



Advertisements
Similar presentations
CSC 330 E-Commerce Teacher Ahmed Mumtaz Mustehsan Ahmed Mumtaz Mustehsan GM-IT CIIT Islamabad GM-IT CIIT Islamabad CIIT Virtual Campus, CIIT COMSATS Institute.
Advertisements

What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Crime and Security in the Networked Economy Part 4.
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
Copyright © 2004 Pearson Education, Inc. Slide 5-1 E-commerce Kenneth C. Laudon Carol Guercio Traver business. technology. society. Second Edition.
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice HallCopyright © 2009 Pearson Education, Inc. Slide 5-1 Online Security and Payment Systems.
7.1 Copyright © 2011 Pearson Education, Inc. 7 Chapter Securing Information Systems.
E-commerce business. technology. society. Kenneth C. Laudon
Defining Security Issues Chapter 8. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
Chapter 5 Security and Encryption
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Copyright © 2004 Pearson Education, Inc. Slide 5-1 E-commerce Kenneth C. Laudon Carol Guercio Traver business. technology. society. Second Edition.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Lesson 10 – SECURING YOUR NETWORK Security devices Internal security External security Viruses and other malicious software OVERVIEW.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Copyright © 2007 Pearson Education, Inc. Slide 5-1 E-commerce Kenneth C. Laudon Carol Guercio Traver business. technology. society. Second Edition.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
Computer Crime and Information Technology Security
Defining Security Issues
PART THREE E-commerce in Action Norton University E-commerce in Action.
Copyright © 2007 Pearson Education, Inc. Slide 5-1 E-commerce Kenneth C. Laudon Carol Guercio Traver business. technology. society. Second Edition.
Lecture 10 Intrusion Detection modified from slides of Lawrie Brown.
BUSINESS B1 Information Security.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
1.Too many users 2.Technical factors 3.Organizational factors 4.Environmental factors 5.Poor management decisions Which of the following is not a source.
C8- Securing Information Systems
Copyright © 2004 Pearson Education, Inc. Slide 5-1 Securing Channels of Communication Secure Sockets Layer (SSL): Most common form of securing channels.
Online Security and Payment Systems
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
Management Information Systems Chapter Eight Securing Information Systems Md. Golam Kibria Lecturer, Southeast University.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
Course code: ABI 204 Introduction to E-Commerce Chapter 5: Security Threats to Electronic Commerce AMA University 1.
E-commerceEssentials Kenneth C. Laudon Carol Guercio Traver first edition Copyright © 2014 Pearson Education, Inc.
Topic 5: Basic Security.
Chap1: Is there a Security Problem in Computing?.
Chapter 5 Online Security and Payment Systems 1. Teaching Objectives Describe different types of payment systems. Describe different E-commerce payment.
Computer Skills and Applications Computer Security.
Chapter 7 1Artificial Intelligent. OBJECTIVES Explain why information systems need special protection from destruction, error, and abuse Assess the business.
Computer Security By Duncan Hall.
E-commerce Security By John Doran. What is e-commerce?  the buying and selling of products or services over the internet [3].  Most e-commerce transactions.
Any criminal action perpetrated primarily through the use of a computer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
ESTABLISHING AND MANAGING IT SECURITY Prepared by : Siti Mahani Mahmud Yong Azua Mat Zaliza Azan.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
HACKING Submitted By: Ch. Leela Sasi, I M.C.A, Y11MC29011, CJJC P.G College.
7 Chapter Securing Information Systems 1. The Boston Celtics Score Big Points Against Spyware Problem: frequency of wireless usage exposed Celtics’ proprietary.
Securing Information Systems
Security and Encryption
Source: Ecommerce (Chapter 5) Pearson Education
Chapter 5 Electronic Commerce | Security
Securing Information Systems
– Communication Technology in a Changing World
E-commerce business. technology. society. Kenneth C. Laudon
ISNE101 Dr. Ken Cosh Week 13.
Chapter 5 Electronic Commerce | Security
Copyright © 2002 Pearson Education, Inc.
Securing Information Systems
Computer Security By: Muhammed Anwar.
Chapter # 3 COMPUTER AND INTERNET CRIME
Presentation transcript:

Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8

Copyright © 2002 Pearson Education, Inc. Slide 5-2 CHAPTER 5 Created by, David Zolzer, Northwestern State University—Louisiana Security

Copyright © 2002 Pearson Education, Inc. Slide 5-3 Internet Fraud Complaints Reported to the IFCC Page 232, Figure 5.1

Copyright © 2002 Pearson Education, Inc. Slide 5-4 The E-commerce Security Environment Page 234, Figure 5.2

Copyright © 2002 Pearson Education, Inc. Slide 5-5 Dimensions of E-commerce Security Page 235, Table 5.1

Copyright © 2002 Pearson Education, Inc. Slide 5-6 The Tension Between Security and Other Values  Ease of use  The more security measures that are added to an e-commerce site, the more difficult it is to use and the slower the site becomes, hampering ease of use. Security is purchased at the price of slowing down processors and adding significantly to data storage demands. Too much security can harm profitability, while not enough can potentially put a business out of business.

Copyright © 2002 Pearson Education, Inc. Slide 5-7 The Tension Between Security and Other Values  Public Safety and the Criminal Uses of Security  There is tension between the claims of individuals to act anonymously and the needs of the public officials to maintain public safety that can be threatened by criminals or terrorists.

Copyright © 2002 Pearson Education, Inc. Slide 5-8 Security Threats in the E-commerce Environment  Three key points of vulnerability  the client  the server  communications pipeline

Copyright © 2002 Pearson Education, Inc. Slide 5-9 A Typical E-commerce Transaction Page 238, Figure 5.3

Copyright © 2002 Pearson Education, Inc. Slide 5-10 Vulnerable Points in an E-commerce Environment Page 239, Figure 5.4

Copyright © 2002 Pearson Education, Inc. Slide 5-11 Seven Security Threats to E- commerce Sites  Malicious code  includes a variety of threats such as viruses, worms, Trojan horses, and “bad applets”  virus is a computer program that has the ability to replicate or make copies of itself, and spread to other files  worm is designed to spread from computer to computer  Trojan horse appears to be benign, but then does something other than expected

Copyright © 2002 Pearson Education, Inc. Slide 5-12 Examples of Malicious Code Page 241 Table 5.2

Copyright © 2002 Pearson Education, Inc. Slide 5-13 Seven Security Threats to E- commerce Sites  Hacking and cybervandalism  hacker is an individual who intends to gain unauthorized access to a computer system  cracker is the term typically used within the hacking community to demote a hacker with criminal intent  cybervandalism is intentionally disrupting, defacing, or even destroying a site

Copyright © 2002 Pearson Education, Inc. Slide 5-14 Seven Security Threats to E- commerce Sites  Hacking and cybervandalism  white hats are “good” hackers that help organizations locate and fix security flaws  black hats are hackers who act with the intention of causing harm  grey hats are hackers who believe they are pursuing some greater good by breaking in and revealing system flaws

Copyright © 2002 Pearson Education, Inc. Slide 5-15 Seven Security Threats to E- commerce Sites  Credit card fraud  Different from traditional commerce  Hackers target files on merchant server  Spoofing  Misrepresenting oneself by using fake addresses or masquerading as someone else

Copyright © 2002 Pearson Education, Inc. Slide 5-16 Seven Security Threats to E- commerce Sites  Denial of Service Attacks  Flooding a Web site with useless traffic to inundate and overwhelm the network  Distributed Denial of Service attack uses numerous computers to attack the target network from numerous launch points

Copyright © 2002 Pearson Education, Inc. Slide 5-17 Seven Security Threats to E- commerce Sites  Sniffing  A type of eavesdropping program that monitors information traveling over a network  Insider Jobs  Employees with access to sensitive information  Sloppy internal security procedures  Able to roam throughout an organization’s system without leaving a trace

Copyright © 2002 Pearson Education, Inc. Slide 5-18 Tools Available to Achieve Site Security Page 247, Figure 5.5

Copyright © 2002 Pearson Education, Inc. Slide 5-19 Firewalls and Proxy Servers Page 262, Figure 5.11

Copyright © 2002 Pearson Education, Inc. Slide 5-20 Protecting Servers and Clients  Operating system controls allow for the authentication of the user and access controls to files, directories, and network paths  Anti-virus software is the easiest and least expensive way to prevent threats to system integrity

Copyright © 2002 Pearson Education, Inc. Slide 5-21 Policies, Procedures, and Laws  Developing an e-commerce security plan  perform a risk assessment  develop a security policy  develop an implementation plan  create a security organization  perform a security audit

Copyright © 2002 Pearson Education, Inc. Slide 5-22 Developing an E-commerce Security Plan Page 264, Figure 5.12

Copyright © 2002 Pearson Education, Inc. Slide 5-23 AKHIR PERTEMUAN 8