Download presentation
Presentation is loading. Please wait.
Published byVanessa McCarthy Modified over 9 years ago
1
An Investigation into E-Commerce Frauds and their Security Implications By Kevin Boardman Supervisor: John Ebden 29 July 2004
2
About me Joint Computer Science and Information Systems Honours. Interest in computer security and its implications in e-commerce. Email: g01b0633@campus.ru.ac.za
3
Definition of project in one sentence An investigation into e-commerce frauds, and how they are best avoided by internet merchants.
4
The Problem and Background
5
What is E-commerce ? “E-commerce focuses on the electronic exchange of information using information and telecommunications infrastructures to perform a wide range of commercial activities that can be divided into business-to- consumer and business-to-business sectors” - Hutchinson and Warren [2003] Project focuses on business-to-consumer
6
Importance of E-Commerce Electronic commerce is a “strategic imperative for most competitive organisations today as it is a key to finding new sources of revenue, expanding into new markets, reducing costs, and creating breakaway business strategies” - VeriSign [2004]
7
E-Commerce statistics - Burrows [2004] General increase in the use of e-commerce around the world. The number of online banking accounts in South Africa grew by 28% to 1.04 million in the last year. These figures are expected to increase to 30% in 2004. 17 percent of Americans used online banking services by the end of 2002 and this figure will continue to grow by 14 percent up to the end of 2007. US Online Retail revenue is projected to increase from $ 47.8 Billion in 2002 to 130.3 billion in 2005
8
Fraud statistics Fraud complaints rose by around two-thirds in the US according to the Federal Trade Commission (FTC) from 2001 to 2002. Identity theft accounting for 43% of complaints. The cost of fraud in 2002 more than doubled that in 2001.
9
Fraud statistics (Continued)
10
Result of combination of statistics “Hacker cleans out bank accounts.” “Hundreds of thousands of rands stolen via Internet from Absa clients.” – Who covers the costs? Irreversible damage to Absa’s image. “New security fears for web banking” “Major online credit card theft exposed”
11
Threats Vandalism and sabotage – defacing web site Denial of service – flooding of service Breach of privacy or confidentiality – disclosure of personal info Theft and fraud – theft and use of credit card number Violations of data integrity – changing of an orders delivery address Repudiation – denying a transaction took place
12
Securing E-Commerce 3 Fronts 1.Merchant - System offering service - Web server and OS - Firewalls, encrypted data stores 2. Transport - Channel between the client and merchant - Protocols (SSL, SET) 3.Client - System accessing the service - Difficult to secure and control
13
Data Transport Security Four basic security requirements of e- commerce transactions : 1. Authentication – proof of identity 2. Confidentiality – keeping data “secret” 3. Data integrity – Ensuring data doesn’t change while transported by unauthorised entity 4. Non-repudiation - prevents a denial of actions by a person or entity
14
Security Mechanisms User IDs and passwords – Concerned with authentication – Insecure : poor passwords, password written down, shared – Increase security by using in conjunction with tokens and biometrics
15
Public Key Infrastructure (PKI), Digital Certificates and Digital signatures Confidentiality through encryption Virtual Keys used to encrypt/decrypt data Symmetrical – 1 private key to encrypt and decrypt, key is shared (less secure) Asymmetrical – private and public key which are inversely related
16
Public Key Infrastructure (PKI), Digital Certificates and Digital signatures Data integrity and non repudiation through digital signatures Digital Certificates provide authentication Used by other protocols
17
Secure Socket Layer (SSL) Provides confidentiality, authentication, and data integrity through the use of PKI. Resides above the transport layer and below the application layer at the socket layer in the protocol stack. Most prominent e-commerce protocol
18
SSL (Cont) Does not provide non-repudiation or facilitate transferring of payments. Leaves payment details up to merchant. Credit Card details can be read by the merchant and may be vulnerable to theft if the data store is not encrypted.
19
Scenario 1 Insecure Merchant %#@^&$$#@ Secure cc no over SSL
20
Scenario 1 (Cont) Insecure Merchant 1547980452
21
Scenario 2 Illegitimate Merchant SSL Channel %#@^&$$#@ 1254505945
22
Payment Protocols Merchant has no need to read credit card details Guarantee the merchant receives payment Keeps credit card details confidential Eliminates storage of credit card details on merchants system
23
Scenario 3 Payment protocol Payment Protocol %#@^&$$#@ Payment Protocol %#@^&$$#@ 1254505945
24
Secure Electronic Transactions (SET) Technical standard for secure payments focusing on credit cards Developed by MasterCard and VISA. Failed to be adopted. Why? – Merchants are liable for chargebacks, therefore banks resist liability. – Banks generate revenue from chargebacks. – Banks make money selling anti fraud software – Timing – Merchants only worried about market share not losses – Certificate management was cumbersome
25
Where to from here ? Investigate case studies of e-commerce security breaches eg: CD Universe Investigate, critically analyse and compare emerging protocols and techniques that could help secure e-commerce eg: Secure Payment Application (SPA) by Mastercard and Verified by VISA
26
The expected result Evaluation of some of the current security protocols and procedures used in e- commerce. Exposure of security flaws in some of the major e-commercial systems. Establish possible countermeasures to attacks and threats from e-commerce security frauds.
27
Questions
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.