E-Commerce Chapter 5
E-Commerce Chapter 5
E-Commerce Chapter 5
Course name: E-
commerce
Chapter 5
E-commerce Security
and Payment Systems
Malicious Code
• Exploits and exploit kits
• Maladvertising
• Drive-by downloads
• Viruses
• Worms
• Ransomware
• Trojan horses
• Backdoors
• Bots, botnets
Phishing
• Any deceptive, online attempt by a third party to obtain confidential
information for financial gain
• Tactics
• Social engineering
• E-mail scams and Business Email Compromise (BEC) phishing
• Spear phishing
• Used for identity fraud and theft
Data Breaches
• Organization loses control over corporate information to outsiders
• Over 1,575 breaches in 2017, 45% increase over 2016
• Yahoo and Equifax two of the most notorious; Facebook breach in 2018
exposed personal information of 30 million
• Leading causes
• Hacking
• Unauthorized access
• Employee error/negligence
Hacked
• Class Discussion
• What organizational and technological failures led to the data breach
at Equifax?
• What technical solutions are available to combat data breaches?
• Have you or anyone you know experienced a data breach?
Identity Fraud/Theft
• Unauthorized use of another person’s personal data for illegal financial
benefit
• Social security number
• Driver’s license
• Credit card numbers
• Usernames/passwords
• 2017: Almost 17 million U.S. consumers suffered identity fraud
Insider Attacks
• Largest threat to business institutions come from insider embezzlement
• Employee access to privileged information
• Poor security procedures
• Insiders more likely to be source of cyberattacks than outsiders
Secure?
• Class Discussion
• What types of threats do smartphones face?
• Are there any vulnerabilities specific to mobile
devices?
• What qualities of apps make them a vulnerable
security point in smartphone use?
• Are apps more or less likely to be subject to threats
than traditional PC software programs?
Technology Solutions
• Protecting Internet communications
• Encryption
• Securing channels of communication
• SSL, TLS, VPNs, Wi-Fi
• Protecting networks
• Firewalls, proxy servers, IDS, IPS
• Protecting servers and clients
• OS security, anti-virus software
Encryption
• Encryption
• Transforms data into cipher text readable only by
sender and receiver
• Secures stored information and information
transmission
• Provides 4 of 6 key dimensions of e-commerce
security:
• Message integrity
• Nonrepudiation
• Authentication
• Confidentiality
Case
Signatures
Digital Envelopes
• Address weaknesses of:
• Public key cryptography
• Computationally slow, decreased transmission speed, increased
processing time
• Symmetric key cryptography
• Insecure transmission lines
• Uses symmetric key cryptography to encrypt document
• Uses public key cryptography to encrypt and send symmetric key
(PKI)
• Digital certificate includes:
• Name of subject/company
• Subject’s public key
• Digital certificate serial number
• Expiration date, issuance date
• Digital signature of CA
• Public Key Infrastructure (PKI):
• CAs and digital certificate procedures
• PGP
Authorities
Limitations of PKI
• Doesn’t protect storage of private key
• PKI not effective against insiders, employees
• Protection of private keys by individuals may be haphazard
• No guarantee that verifying computer of merchant is secure
• CAs are unregulated, self-selecting organizations
Using SSL/TLS
Protecting Networks
• Firewall
• Hardware or software that uses security policy to filter
packets
• Packet filters
• Application gateways
• Next-generation firewalls
• Proxy servers (proxies)
• Software servers that handle all communications from or
sent to the Internet
• Intrusion detection systems
• Intrusion prevention systems
Plan
Works
Blockchain
• Blockchain
• Enables organizations to create and verify transactions
nearly instantaneously using a distributed P2P database
(distributed ledger)
• Benefits:
• Reduces costs of verifying users, validating transactions,
and risks of storing and processing transaction
information
• Transactions cannot be altered retroactively and
therefore are more secure
• Foundation technology for cryptocurrencies and supply
chain management, as well as potential applications in
financial services and healthcare industries
Copyright © 2020 Pearson Education Ltd. All Rights Reserved
Chapter 5
E-commerce Security and Payment System
Cryptocurrencies
• Use blockchain technology and cryptography to create a purely digital
medium of exchange
• Bitcoin the most prominent example
• Value of Bitcoins have widely fluctuated
• Major issues with theft and fraud
• Some governments have banned Bitcoin, although it is gaining
acceptance in the U.S.
• Other cryptocurrencies (altcoins) include Ethereum/Ether, Ripple, Litecoin
and Monero
• Initial coin offerings (I C Os) being used by some startups to raise capital
P)
• Online payment systems for monthly bills
• Four EBPP business models:
• Online banking model (most widely used)
• Biller-direct (monthly telephone bill)
• Mobile
• Consolidator (third party)
• All models are supported by EBPP infrastructure providers
Careers in E-commerce
• Position: Cybersecurity Threat Management Team Trainee
• Qualification/Skills
• Preparing for the Interview
• Possible Interview Questions