E-Commerce Emilee King. Introduction Ecommerce.About.com defines e-commerce or electronic commerce as “Transacting or facilitating business on the Internet.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

1 And Tips to Avoid Becoming a Victim Recent Cyber Crime Cases.
Introduction and Overview of Digital Crime and Digital Terrorism
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Victoria ISD Common Sense Media Grade 6: Scams and schemes
Social Network Security Issues: Social Engineering and Phishing Attacks Jeffrey Allen, Leon Gomez, Marlon Green, Phillip Ricciardi, Christian Sanabria.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Information Security Jim Cusson, CISSP. Largest Breaches 110, NorthgateArinso, Verity Trustees 6, Aurora St. Luke's Medical.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
What is identity theft, and how can you protect yourself from it?
The development of Internet A cow was lost in Jan 14th If you know where it is, please contact with me. My QQ number is QQ is one of the.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
Why is there Concern about the Effect of the Internet in Society? E-Commerce: Jason Logan eBay: Ben King Hacking: Khyle Westmoreland Censorship: Ben King.
Internet Phishing Not the kind of Fishing you are used to.
Threats To A Computer Network
Today’s Strategic Imperative: E-Business Jeremy Malley BSAD – 145 Ch February 2002.
Phishing, Pharming, and Spam Margaret StewartTuesday, Oct. 21, 2006.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Internet Fraud By: Noelle Woodman.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Security and Risk Management. Who Am I Matthew Strahan from Content Security Principal Security Consultant I look young, but I’ve been doing this for.
What is E-Commerce? Section 8.1. What is E-commerce? E-commerce is the exchange of goods, services, information, or other businesses through electronic.
Information Systems Today, 2/C/e ©2008 Pearson Education Canada 2-1 Lecture Outline 9 1. Using Information Systems for Competitive Advantage (p )
Speaker : YUN–KUAN,CHANG Date : 2009/10/13 Working the botnet: how dynamic DNS is revitalising the zombie army.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Information Systems Today, 2/C/e ©2008 Pearson Education Canada Lecture Outline eCommerce Highlights of Electronic Business 2-1.
WEB SPOOFING by Miguel and Ngan. Content Web Spoofing Demo What is Web Spoofing How the attack works Different types of web spoofing How to spot a spoofed.
Identity Theft By: Chelsea Thompson. What is identity theft? The crime of obtaining the personal or financial information of another person for the purpose.
Scams & Schemes Common Sense Media.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
Denial of Service Bryan Oemler Web Enhanced Information Management March 22 nd, 2011.
Dangers of the Internet CEL : C O M P U T E R S I N E V E R Y D A Y L I F E CEL 1 Dangers of the Internet Name: ____________________ Class: ________________.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
+ + SAM IT TECH E commerce History of Ecommerce + History: English entrepreneur ”Michael Aldrich” invented.
The Effects of E-Commerce on Entrepreneurship Chapter 9.
Client/User Analysis Website Design. 2 Questions to be answered: What is the purpose of the site? What is the purpose of the site? Who is the site for?
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
CCT355H5 F Presentation: Phishing November Jennifer Li.
Understanding e-Commerce A-Level Ict. E-Commerce is impossible to avoid now days.Almost everyone in the western world is at one point a consumer of the.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Inappropriate Content Hackers Phishers Scammers Child Abusers Bullies.
E-Commerce. E-commerce at the consumer level  Online shopping (B2C transactions)  Online banking  Online Finance E-commerce at the business level 
Internet Safety Internet Safety LPM
CYBER LITERACY CHAPTER 10 ONLINE SHOPPING: E-COMMERCE UNVEILED.
Staying Secure Online How do we buy and sell safely on the Internet?
INTRODUCTION & QUESTIONS.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
E-commerce Security By John Doran. What is e-commerce?  the buying and selling of products or services over the internet [3].  Most e-commerce transactions.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
KIARA MARSHALL SEMESTER PROJECT EIS 3302 Ethical Problems in E- Businesses.
E-Commerce & Bank Security By: Mark Reed COSC 480.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
that keeping money and personal information safe is very important That losing money or having personal information stolen can be distressing.
Online Shopping vs Traditional Shopping.
Phishing and Internet Scams. Definitions and recent statistics Why is it dangerous? Phishing techniques and identifiers Examples of phishing and scam.
CURRENT STATUS OF CYBERCRIME  Security is the fastest growing service in IT  Cyber Crime Costs $750 Billion annually  70% of threats arrive via .
Mrs. Esman Computer Special
Scams & Schemes Common Sense Media.
Protect Your Ecommerce Site From Hacking and Fraud
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

E-Commerce Emilee King

Introduction Ecommerce.About.com defines e-commerce or electronic commerce as “Transacting or facilitating business on the Internet. Growing use due to convince and cost differences both for customers and business owners. According to Prosper Insights & Analytics, 34% of Americans say that they completed 50% or more of their shopping online—that’s a 99% increase from the 2006 shopping season.

Web Spoofing Web spoofing is where a person makes a web site that looks like the site that the user believes that they are visiting; so the user will give the hoax website all of their information thinking it is the site that they wanted to go to. Most of these websites rely on the user accidentally mistyping in the address of the website they wanted to go to, or are a result from the hacker sending fake s saying the user needs to reset their password or verify their information.

Ebay’s Problem with Web Spoofing Classified ads are being exploited on eBay by modifying the listings with JavaScript Redirects and proxies. JavaScript embedded within the item's description will automatically redirect the victim's browser to the attacker's website. The victim is completely unaware and usually gives the scammer money.

How is EBay Handling This..? Essentially, they aren’t. Since the scams are happening in the classified section, the buyers and sellers are not protected by Ebay. EBay put a new clause in their terms in conditions that users are not allowed to use javascript in their listings. So a user gets banned if they are caught. Since the scammers use compromised accounts, Ebay ends up banning someone who just got their password stolen.

How Easy Is This To Fix? Pretty darn easy. Seriously, just Google “How to secure an iFrame” Ebay would just append their terms and conditions rather than fix the problem.

Denial of Service Attacks Standard DDoS attacks Smokescreen DDoS attacks New Amplified DDoS attacks

Standard DDoS Attacks E-commerce sites are hurt by DDoS attacks by loss of revenue, damaging the company’s brand image, and the company’s relationship with its customers. Attackers tell botnets to contact a specific server or Web site repeatedly. This can generate enough traffic to slow the site or in some cases take the site offline.

Amazon and DDoS 2009 major e-commerce sites such as Wal-Mart and Amazon were a target of a DDoS attack that took down their site for an hour. It’s just an hour right? How much can a business lose for not selling things for an hour? When Amazon went down for just 40 minutes last year Forbes estimated the online retail giant lost $66,240 dollars per minute, totaling nearly $2 million dollars.

Amazon’s Solution Elastic Infrastructure or EC2 Designed to automatically scale to handle giant traffic spikes. Proven effective when hacktivist group Anonymous tried a DDoS attack after Amazon stopped hosting WikiLeaks after US documents were leaked.

Smoke Screen DDoS Shorter but more intense attacks, this attack does not have the intention of taking a site down. While IT staff is distracted trying to take care of a DDoS attack, they are not monitoring everything else for a breach. So criminals come in and steal private data, intellectual property, and in some cases deleted information off of organizations’ servers. In one case, crooks used DDoS to help steal bank customers’ credentials and drain $9 million from ATMs in just 48 hours.

New Amplified Attacks CloudFlare’s data centers were recently attacked, and reached bandwidths of 400 gigabits per second.

Why This Matters E-Commerce is now a common practice and it’s not going to go away. We need to be able to build secure sites or fix them to avoid Ebays problem, or work on solutions like EC2.

References Clay, K. (2013, August 19). Amazon.com Goes Down, Loses $66,240 Per Minute. Retrieved from Forbes: com-goes-down-loses per-minute/ Drenik, G. (2014, February 03). Year Of Reckoning For Brick And Mortar Retailers. Retrieved from Forbes: reckoning-for-brick-and-mortar-retailers/ Invesp. (2011, July 18). How Big Is E-commerce Industry. Retrieved from Invespsoft: Lemos, R. (2013, September 9). Countering Attacks Hiding In Denial-Of-Service Smokescreens. Retrieved from Dark Reading: Mello, J. J. (2014, February 12). Hackers Perfectly Time Largest DDoS Attack Ever. Retrieved from E Commerce Times: Mutton, P. (2014, April 28). Fraudsters modify eBay listings with JavaScript redirects and proxies. Retrieved from NetCraft: Neustar. (2014, April 28). Smokescreening: Data Theft Makes DDoS More Dangerous. Retrieved from CircleID: Time. (1999, December 27) Person of the Year. Retrieved from Time.com: