1 SGW Forums November 2000 Protecting against cyber-fraud Kimberley Heitman Manager, Legal and Regulatory, iiNet Group www.iinet.net.au.

Slides:



Advertisements
Similar presentations
Weighing the Risks and Benefits of Online Financial Transactions
Advertisements

Ethics, Privacy and Information Security
Chapter 6 E-commerce Payment Systems. Traditional Payment Systems Cash Checking Transfers Credit Card Accounts Stored Value Accounts Accumulating Balance.
Information System Audit : © South-Asian Management Technologies Foundation Chapter 4: Information System Audit Requirements.
Creating a Winning E-Business Second Edition
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
Introduction E-Commerce is firmly established: –1997: $500M –2001: $50B Amazon.com: –First big online retailer –New business model: no brick-and-mortar.
Lecture 10 Security and Control.
10.1 © 2006 by Prentice Hall 10 Chapter Security and Control.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Government Databases and You or How I Learned to Stop Worrying and Love Information Loss. By Patrick Fahey Mis 304.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
E-commerce security by Asif Dalwai Introduction E-commerce applications Threats in e-commerce applications Measures to handle threats Incorporate.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Building Your Security Strategy with 3D.
Chapter 8 Security and Control.
10.1 © 2006 by Prentice Hall 10 Chapter Security and Control.
Computing Concepts – Part 2 Getting Started with Applied Computer Concepts Computing Concepts: Part 2 1.
Securing Information Systems
The Office Procedures and Technology
INFORMATION SECURITY THE NEXT GENERATION 13 th World Electronics Forum Israel Christopher Joscelyne Board Member & Membership Chairman AEEMA November 2007.
Unit 19 INTERNET SECURITY
Being Ecommerce Sophon Thanasrivilai #100485
Creating a Winning E-Business Second Edition Operating Your E-Business Chapter 5.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
Private and Confidential. Levels of Identity Verification Is this person who they claim to be? Knowledge based Authentication Is this a real identity?
Internet Security for Small & Medium Business Week 6
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
Course ILT Internet transactions and security Unit objectives Learn how to purchase goods online by using credit cards and Web-based forms Describe the.
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
Electronic Commerce & Marketing. What is E-Commerce? Business communications and transactions over networks and through computers, specifically –The buying.
E-commerce Vocabulary Terms. E-commerce Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the Internet.
E-commerce Vocabulary Terms By: Laura Kinchen. Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the.
StorTech Security Regulatory compliance provides the business foundation for security Organisations need to tackle all security challenges from a business.
Chapter 4 Getting Paid. Objectives Understand electronic payment systems Know why you need a merchant account Know how to get a merchant account Explain.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Cyber Security Action against cyber crime. What is cyber security?  Cyber security standards are security standards which enable organizations to practice.
PKI Forum Business Panel March 6, 2000 Dr. Ray Wagner Sr. Director, Technology Research.
Chapter 30 - Electronic Commerce and Business Introduction E-Commerce is Big Business –all commercial transactions conducted over the Internet shopping,
Merchant Review By Ben Robbins. Merchant 1: National Bank card
Security Policies. Threats to security and integrity  Threats to information systems include  Human error –keying errors, program errors, operator errors,
OBJECTIVES  To understand the concept of Electronic Payment System and its security services.  To bring out solution in the form of applications to.
Chapter 7 1Artificial Intelligent. OBJECTIVES Explain why information systems need special protection from destruction, error, and abuse Assess the business.
The Different Payment Systems Different types of technologies Used for payment transactions on the Internet –SSL –SET –eDankort –MasterCard SecureCode.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
Security and Ethics Safeguards and Codes of Conduct.
Networking E-commerce. E-commerce ► A general term used to describe the buying and selling of products or services over the Internet. ► This covers a.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
SMART SHOPPING ONLINE. VOCABULARY: 30 Day Rule: merchants ship goods within 30 days or inform the customer of delays and their right to cancel the order.
Security risks in a network. Remote access  When you connect a computer to a network it is visible to all other computers on the network. When you connect.
Vijay V Vijayakumar.  Implementations  Server Side Security  Transmission Security  Client Side Security  ATM’s.
E-Business – Technology and Networks Barani institute of Management sciences Fazal Rehman Shamil
Information Management System Ali Saeed Khan 29 th April, 2016.
10.1 © 2006 by Prentice Hall 10 Chapter Security and Control.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
The technology behind the USPS EPM. AND COMPLIANCE March 25, 2004 Adam Hoffman.
Submitted By : Seamless Chex. Considerably like paper counterparts, checks are used to pay bills and transfer money starting with one bank then onto the.
Securing Information Systems
Secure Electronic Transaction
Securing Information Systems
SECURITY MECHANISM & E-COMMERCE
CONFIDENTIALITY, INTEGRITY, LEGAL INTERCEPTION
Security Measures Module 7 Section 1.
Control , Audit & Security of Information
Presentation transcript:

1 SGW Forums November 2000 Protecting against cyber-fraud Kimberley Heitman Manager, Legal and Regulatory, iiNet Group

2 Creating a safe e-commerce environment Security enables e-commerce Computers enable complex solutions The Electronic Paper Trail Beyond Firewalls

3 Exploited Vulnerability 83% of merchants say fraud is a problem 4% of online revenue lost to fraud 50% of credit card fraud is online Verification technology improved Fraud on the decrease Physical controls still greatest need

4 Internal Controls Employee behaviour is first priority Viruses, Illegal purchases,Sale of Data Police checks, Dismissal procedures Planned network, premises security Australian Standard 4444 (March 2000)

5 Tools Public Key Encryption Secure Socket Layer Digital Certification Biometrics/Smartcards Firewalls and upgrades

6 Real Time Fraud Controls IP verification Cookies Velocity checking Pattern anomolies Collateral evidence

7 A trusted environment Privacy Policy Member verification Customer Support Profit and competitive advantage Record keeping and audit trail

8 SGW Forums November 2000 Thank you. Questions?