Final Ecomers Assigment
Final Ecomers Assigment
Final Ecomers Assigment
COLLEGE OF SCIENCE
TOPIC
BY
EBENEZER AMANKWAA
PG NUMBER 4723815
APRIL 2016
Abstract
E-commerce applications are becoming popular day by day as they are working like a virtual
shop. Writing good E-commerce application is tedious task and complex also. The applications if
made complex are very difficult to maintain. Usability is a very basic concept in the E-commerce
application. User has to get the information at one click and with proper feedback. As these are
web based applications efficiency matters a lot for this application. As transaction in e-commerce
faces the problems such as database exploits, log data mining and sniffing attacks which can be
application
CHAPTER ONE
INTRODUCTION AND BACKGROUND
Electronic commerce lets companies integrate internal and external business processes through
information and communication technologies. Companies conduct these business processes over
intranets, extranets, and the Internet. E-commerce lets businesses reduce costs, attain greater
market reach, and develop closer partner relationships. However, using the Internet as the
Often, industry analysts cite trust and security as the main hurdles in growing e-commerce. A
number of factors have hampered the growth of e-commerce in developing countries. Yet, the
Internet usage is very similar in companies from both developed and developing countries. Firms
already using the Internet consider the lack of network security to be the primary problem,
followed by slow and unstable connections. This litany of evolutionary phases masks a number
of growing technical challenges, including the following according to Vijay (2000).
security and authentication;
content management and publication;
reliable systems, messaging, and data;
complex interactions and transactions;
business model implementation and business process enactment; and
distributed processing and distributed data.
E-commerce applications are categories into different types
B2B – Business to Business E-commerce
B2C – Business to Consumer
C2C-Consumer to Consumer
B2E – Business to Employee
C2B-Consumer to Business
G2G- Government to Government
Clearly, the online transaction requires consumers to disclose a large amount of sensitive
personal information to the vendor, placing themselves at significant risk. Understanding
(indeed, even precisely defining) consumer trust is essential for the continuing development of e-
commerce.
Problem statement
E-commerce is used for a variety of products and services ranging from basic applications such as
electronic marketing to high security electronic payment applications. Electronic payments are now
becoming a widely used medium for carrying out financial transactions. E-commerce application
must provide means for carrying out secure authentication and financial transactions.
Authentication and secure payment is a major security issue when it comes to carrying out E-
commerce transactions remotely. Developers of such applications are always faced with questions
such as; how do we ensure that the person requesting to carry out a financial transaction is who he
claims to be? How to integrate security technologies into trust infrastructure e-commerce
applications?
Goal/ Objective of Thesis
The objective of this thesis is to describe the most common security issues and vulnerabilities
found in e-commerce sites, and to demonstrate whether the vulnerabilities can be exploited in
\real-life" applications and also to integrate security technologies into a trust infrastructure e-
commerce applications.
Organisation of Thesis
Chapter 1: Introduction and background which gives brief ideas about E-commerce applications.
Chapter 2: This chapter focused on security challenges in the E-commerce Applications.
Chapter 3: This discusses security-oriented transaction privacy design model for e-commerce.
Chapter 4: Conclusions and future work for this thesis work are presented in this final chapter.
CHAPTER TWO
According to Donal (2007), the purpose of Web security is to meet the security expectations of
client-side security,
server-side security, and
secure transmission of information
Client-side security is concerned with the techniques and practices that protect a user's privacy
and the integrity of the user's computing system.
Server-side security is concerned with the techniques and practices that protect the Web server
software and its associated hardware from break-ins, Web site vandalism and denial of service
attacks.
Secure transmission is concerned with the techniques and practices that will guarantee protection
from eavesdropping and intentional message modification.
.
Fig 1: Security Areas of E-commerce Application
A. Security issues in e-commerce application
There are following types of security issues in any e-commerce application which needs to be
addressed Jose (2008) and Skalka (2008).
1) Malicious Code
• Viruses: They have ability to replicate and spread to other files; most also deliver a “payload”
of some sort (destructive or benign); include macro viruses, file-infecting viruses, and script
viruses
• Worms: They are designed to spread from computer to computer
• Trojan horse: They appear to be benign, but then does something other than expected
• Bots: It can be covertly installed on computer; responds to external commands sent by the
attacker
2) Unwanted Programs
These are installed without the user’s informed consent. Following are its types.
Browser parasites: It can monitor and change settings of a user’s browser
Adware: It calls for unwanted pop-up ads
Spyware: It can be used to obtain information, such as a user’s keystrokes, e-mail, IMs, etc.
3) Phishing and Identity Theft
Any deceptive, online attempt by a third party to obtain confidential information for financial
gain – Most popular type: e-mail scam letter – It is one of fastest growing forms of e-commerce
crime
4) Hacking and Cyber vandalism
Hacker: Individual who intends to gain unauthorized access to computer systems
• Cracker: Hacker with criminal intent (two terms often used interchangeably)
• Cyber vandalism: Intentionally disrupting, defacing or destroying a Web site
The transaction privacy service protects against loss of privacy with respect to transactions being
service for preventing unauthorized disclosure of transaction contents, parties involved, location
of parties involved, and the exact time of occurrence of the transaction. Transaction privacy,
Data privacy: the contents of the transaction must be protected from disclosure to
unauthorized parties. Source and destination privacy: the parties involved in the
transaction should not be revealed to unauthorized parties.
Location privacy: the location of the parties performing the transaction should not
be disclosed to unauthorized parties.
Time privacy: the exact time when a transaction occurs should not be disclosed to
unauthorized parties.
The specific security attacks related to transaction privacy in e-commerce systems are
- DBMS exploits, or attacks targeted towards exploiting security of Data Base Management
Systems
- Log data mining attacks, also known as log data analysis attacks
- Sniffing attacks, also known as man-in-the-middle attacks (Stuart, 2000).
Fig 4: (a) all security attacks related to authentication in e-commerce systems (b) along with the
attack enablers (c) and prescribed countermeasures
C. DBMS Exploits
As discussed above, relying on Data Base Management System (DBMS) security is considered a
residual vulnerability. This is because malicious users might be able to exploit the EC system by
exploiting the DBMS itself
The attack enabler in this case might be any exploit in DBMS security (b5).
The proper countermeasure is to enforce security at the DBMS level by keeping it up-to-date
with security fixes and patches (c5). This will help prevent malicious users from exploiting our
EC system by exploiting the DBMS system that we rely on for transaction privacy in general,
and sensitive data logging in particular.
CHAPTER FOUR
CONCLUSION
The study points out one of the very important factors that creates security issues within e-
commerce, which is bad technology. One does not need to be a supper hacker in order to break
into a Web server of the companies and cause different kind of security issues, if he/she is facing
a bad technology.
Study explains that a good service and valuable treatment increase consumers’ level of trust. It is
important that the consumers do not feel tricked in order to gain their trust and real, detailed and
Successfully integrating security technologies into a trust infrastructure is the key to ensuring
secure e-commerce: This is the first step in establishing trust. Many of the existing security
measures are used in the E-commerce application in association with other measures.
REFERENCES
1. Vijay Ahuja, “Building Trust in Electronic Commerce”, IEEE/2000, pp:61-63
2. Stuart Feldman, “The Changing Face of E-Commerce: Extending the Boundaries of the
Possible”, IEEE INTERNET COMPUTING, MAY • JUNE 2000, pp:82-83
3. JOSE A. ONIEVA, “Multiparty Nonrepudiation: A Survey”, ACM Computing Surveys,
Vol. 41, No. 1, Article 5, December 2008, pp:5.1-5.42
4. Adam Jolly, “The Secure Online Business”, Great Britain and the United States- Kogan
Page Limited 2003, pp: 93-118
5. PETER C. CHAPIN, CHRISTIAN SKALKA, and X. SEAN WANG, “Authorization in
Trust Management: Features and Foundations”, ACM Computing Surveys, Vol. 40, No.
3, Article 9,August 2008,pp: 9.1-9.48
6. Donal O.Mahony, Michael Peirce Hitesh Tewari, “Electronic Payment Systems for E
Commerce“, Artech House computer security series-Boston 2001, Second Edition, pp:
19-69
7. Thesis by Victor Sawma, “E-commerce Security”, Master of Computer Science,
University of Ottawa, Canada 2002, pp:83-93
8. Yao-Hua Tan and Walter Thoen, “Formal Aspects of a Generic Model of Trust for
Electronic Commerce”, IEEE/2000.
9. Brian Thomas, “RECIPE FOR E-COMMERCE”, IEEE/ DECEMBER 1997,pp:72-74.