E Comm Unit 4
E Comm Unit 4
E Comm Unit 4
SEMESTER - 6
UNIT - 4
HICOLLEGE.IN
SECURITY THREATS AND ISSUES
Financial Fraud:
Credit Card Fraud: Hackers steal credit card details through various means
(phishing, skimming, malware) and use them for unauthorized purchases.
Refund Fraud: Fraudsters claim they haven't received items or use stolen
credit cards to purchase goods and then request refunds.
Chargebacks: Customers dispute legitimate transactions due to
misunderstandings or fraudulent activity, leading to financial losses for
businesses.
Data Breaches:
Identity Fraud:
Spoofing:
Data breaches: Social media platforms can be targets for data breaches,
exposing user information that could be used for identity theft or targeted
attacks.
Phishing scams: Social media platforms are often used to spread phishing
attacks that target users within social circles.
Malware: Malicious apps can steal user data, track activity, or even take
control of devices.
TECHNOLOGY SOLUTIONS
Encryption is the cornerstone of safeguarding sensitive information in e-
commerce. It transforms readable data (plaintext) into an unreadable format
(ciphertext) using complex mathematical algorithms. This ciphertext can only
be deciphered with a specific key, ensuring that only authorized individuals can
access the original data.
This method utilizes a single shared secret key for both encryption and
decryption.
Imagine a locked box where the same key opens and closes it.
It's highly efficient for encrypting large amounts of data quickly.
Common examples include AES (Advanced Encryption Standard), DES
(Data Encryption Standard), and 3DES (Triple DES).
Firewalls:
Act as the first line of defense, controlling incoming and outgoing network
traffic based on predefined security rules.
Block unauthorized access attempts and malicious traffic, preventing
cyberattacks like DDoS attacks.
Different types of firewalls exist, including packet-filtering firewalls,
application-level firewalls, and stateful firewalls.
Proxy Servers:
Monitor network traffic and system activity for suspicious behavior that
might indicate a cyberattack.
IDS systems detect potential threats, while IPS systems actively block them.
Help identify and respond to security incidents promptly.
Anti-Virus Software:
Protects devices and systems from malware, viruses, and other malicious
software that can compromise data or disrupt operations.
Regularly scans for and removes threats, preventing infections and potential
damage.