Chapter 4
Chapter 4
Chapter 4
Situation
Although there is an increasing attention being devoted to cybercrime, it is difficult to
estimate the actual amount of crimes
Center for strategic international studies examined the difficulties in accurately
estimating the economic impact of cybercrime and cyber espionage, with its study
indicating a range of 375 to 575 billion USD worldwide.
A survey conducted by Ponemon Institute of 58 representative U.S. companies in
various industries in 2015 found that the average annualized cost of cybercrime for the
organizations in the study was $15 million, representing a 20% increase from the
previous year, and an 82% increase since the first survey in 2009. The average cost per
attack was more than $1.9 million, a 22% increase from the previous year. The number
of successful cyberattacks also increased, by over 15%. The most costly cybercrimes
were those caused by denial of service, malicious insiders, and malicious code. The
most prevalent types of attacks were viruses, worms, and Trojans, experienced by 100%
of the companies surveyed, followed by malware (97%), web-based attacks (76%),
botnets (66%), phishing and social engineering attacks (59%), and malicious code (52%)
(Ponemon Institute, 2015a).
According to Symantec, the number of data breaches increased 23% in 2015, over half
a billion personal records were stolen, the number of spear-phishing attacks increased
by 55%, malware increased by 36%, and ransomware attacks grew by 35% (Symantec,
2016).
However, Symantec does not attempt to quantify actual crimes and/or losses related to
these threats. Online credit card fraud is one of the most high-profile forms of e-
commerce crime. The average amount of credit card fraud loss experienced by any one
individual is typically relatively small, the overall amount is substantial. The overall rate
of online credit card fraud is estimated to be about 0.8% of all online card transactions,
including both mobile and web transactions (Cybersource, 2016).
The nature of credit card fraud has changed greatly from the theft of a single credit card
number and efforts to purchase goods at a few sites, to the simultaneous theft of millions
of credit card numbers and their distributions to thousands of criminals operating as
gangs of thieves.
The emergence of identity fraud, described in detail later in this chapter, as a major
online/offline type of fraud may well increase markedly the incidence and amount of
credit card fraud, because identity fraud often includes the use of stolen credit card
information and the creation of phony credit card accounts.
To achieve the highest degree of security possible, new technologies are available and should
be used. But these technologies by themselves do not solve the problem. Organizational
policies and procedures are required to ensure the technologies are not subverted. Finally,
industry standards and government laws are required to enforce payment mechanisms, as well
as to investigate and prosecute violators of laws designed to protect the transfer of property in
commercial transactions.
Good e-commerce security requires a set of laws, procedures, policies, and technologies that,
to the extent feasible, protect individuals and organizations from unexpected behavior in the e-
commerce marketplace
The E-Commerce Security Environment
E-commerce security is designed to protect these six dimensions. When any one of them is
compromised, overall security suffers.
THE TENSION BETWEEN SECURITY AND OTHER VALUES
Ease of Use
There are inevitable tensions between security and ease of use. Security is a technological and
business overhead that can detract from doing business. Too much security can harm
profitability, while not enough security can potentially put you out of business. One solution is to
adjust security settings to the user’s preferences.
In this section, we describe a number of the most common and most damaging forms of security
threats to e-commerce consumers and site operators:
1. Malicious code (“malware”) includes a variety of threats such as viruses, worms, Trojan
horses, ransomware, and bots. Some malicious code, sometimes referred to as an
exploit, is designed to take advantage of software vulnerabilities in a computer’s
operating system, web browser, applications, or other software components.
a. Exploit kits are collections of exploits bundled together and rented or sold as a
commercial product, often with slick user interfaces and in-depth analytics
functionality. Malware is often delivered in the form of a malicious attachment to an
email or embedded as a link in the email. Malicious links can also be placed in
innocent-looking Microsoft Word or Excel documents.
b. Maladverising. One of the latest innovations in malicious code distribution is to
embed it in the online advertising chain,
c. Drive-by download is malware that comes with a downloaded file that a user
intentionally or unintentionally requests.
d. Virus is a computer program that has the ability to replicate or make copies of itself,
and spread to other files. In addition to the ability to replicate, most computer viruses
deliver a “payload.” The payload may be relatively benign, such as the display of a
message or image, or it may be highly destructive—destroying files, reformatting the
computer’s hard drive, or causing programs to run improperly.
e. Worm is designed to spread from computer to computer. A worm does not
necessarily need to be activated by a user or program in order for it to replicate itself.
f. Ransomware (scareware) is a type of malware (often a worm) that locks your
computer or files to stop you from accessing them.
g. A Trojan horse appears to be benign, but then does something other than expected.
The Trojan horse is not itself a virus because it does not replicate, but is often a way
for viruses or other malicious code such as bots or rootkits (a program whose aim is
to subvert control of the computer’s operating system) to be introduced into a
computer system.
h. Backdoor is a feature of viruses, worms, and Trojans that allows an attacker to
remotely access a compromised computer.
i. Bots (short for robots) are a type of malicious code that can be covertly installed on
your computer when attached to the Internet. Once installed, the bot responds to
external commands sent by the attacker; your computer becomes a “zombie” and is
able to be controlled by an external third party (the “bot-herder”).
j. Botnets are collections of captured computers used for malicious activities such as
sending spam, participating in a DDoS attack, stealing information from computers,
and storing network traffic for later analysis.
2. POTENTIALLY UNWANTED PROGRAMS (PUPS)
In addition to malicious code, the e-commerce security environment is further challenged
by potentially unwanted programs (PUPs) such as adware, browser parasites, spyware,
and other applications that install themselves on a computer, such as rogue security
software, toolbars, and PC diagnostic tools, typically without the user’s informed consent.
a. Adware is typically used to call for pop-up ads to display when the user visits certain
sites.
b. Browser parasite is a program that can monitor and change the settings of a user’s
browser, for instance, changing the browser’s home page, or sending information about
the sites visited to a remote computer.
c. Spyware, on the other hand, can be used to obtain information such as a user’s
keystrokes, copies of e-mail and instant messages, and even take screenshots (and
thereby capture passwords or other confidential data).
3. PHISHING
Phishing is any deceptive, online attempt by a third party to obtain confidential
information for financial gain. Phishing attacks typically do not involve malicious code but
instead rely on straightforward misrepresentation and fraud, so-called “social
engineering” techniques.
Spam (junk) websites (also sometimes referred to as link farms) are a little different.
These are sites that promise to offer some product or service, but in fact are just a
collection of advertisements for other sites, some of which contain malicious code.
A man-in-the-middle (MitM) attack also involves eavesdropping but is more active than
a sniffing attack, which typically involves passive monitoring. In a MitM attack, the
attacker is able to intercept communications between two parties who believe they are
directly communicating with one another, when in fact the attacker is controlling the
communications. This allows the attacker to change the contents of the communication.
10. DENIAL OF SERVICE (DOS) AND DISTRIBUTED DENIAL OF SERVICE (DDOS)
ATTACKS
In a Denial of Service (DoS) attack, hackers flood a website with useless pings or page
requests that inundate and overwhelm the site’s web servers. Increasingly, DoS attacks
involve the use of bot networks and so-called “distributed attacks” built from thousands
of compromised client computers.
SQL injection attacks take advantage of vulnerabilities in poorly coded web application
software that fails to properly validate or filter data entered by a user on a web page to
introduce malicious program code into a company’s systems and networks. An attacker
can use this input validation error to send a rogue SQL query to the underlying database
to access the database, plant malicious code, or access other systems on the network.
A zero-day vulnerability is one that has been previously unreported and for which no
patch yet exists. In 2015, 54 zero-day vulnerabilities were reported, up from 24 in 2014
(Symantec, 2016). The very design of the personal computer includes many open
communication ports that can be used, and indeed are designed to be used, by external
computers to send and receive messages. Ports that are frequently attacked include
TCP port 445 (Microsoft-DS), port 80 (WWW/HTTP), and 443 (SSL/HTTPS).
1. Symmetric key cryptography—Both the sender and the receiver use the same key to
encrypt and decrypt a message.
2. Public key cryptography—Two mathematically related digital keys are used: a public key
and a private key. The private key is kept secret by the owner, and the public key is
widely disseminated. Both keys can be used to encrypt and decrypt a message. Once
the keys are used to encrypt a message, the same keys cannot be used to unencrypt
the message.
3. Public key cryptography using digital signatures and hash digests—This method uses a
mathematical algorithm called a hash function to produce a fixed-length number called a
hash digest. The results of applying the hash function are sent by the sender to the
recipient. Upon receipt, the recipient applies the hash function to the received message
and checks to verify that the same result is produced. The sender then encrypts both the
hash result and the original message using the recipient’s public key, producing a single
block of cipher text. To ensure both the authenticity of the message and nonrepudiation,
the sender encrypts the entire block of cipher text one more time using the sender’s
private key. This produces a digital signature or “signed” cipher text that can be sent
over the Internet to ensure the confidentiality of the message and authenticate the
sender.
4. Digital envelope—This method uses symmetric cryptography to encrypt and decrypt the
document, but public key cryptography to encrypt and send the symmetric key.
5. Digital certificates and public key infrastructure—This method relies on certification
authorities who issue, verify, and guarantee digital certificates (a digital document that
contains the name of the subject or company, the subject’s public key, a digital
certificate serial number, an expiration date, an issuance date, the digital signature of the
certification authority, and other identifying information).
In addition to encryption, there are several other tools that are used to secure Internet channels
of communication, including:
1. Secure Sockets Layer (SSL)/Transport Layer Security (TLS),
2. virtual private networks (VPNs), and
3. Wireless security standards such as WPA2.
After communications channels are secured, tools to protect networks, the servers, and clients
should be implemented. These include:
1. firewalls,
2. proxies,
3. intrusion detection and prevention systems (IDS/IDP),
4. operating system controls, and
5. anti-virus software.
2. Public laws and active enforcement of cybercrime statutes also are required to both
raise the costs of illegal behavior on the Internet and guard against corporate abuse of
information.