SlideShare a Scribd company logo
1 of 28
To establish the extent of internet
fraud and its operational impact
on ecommerce.
The effectiveness of current fraud
prevention systems.
Finally to identify common
features in the way internet
fraudsters operate.
The effect of cyber fraud on e
commerce: examining various aspects
involved.
 1. Introduction
 2. Ecommerce and its relation to cyber
fraud.
 3. Various aspects of ecommerce.
 4. Technical issues involved.
 5. Legal issues: substantive and procedural.
 6. Conclusion and suggestions
The major issues tackled with in this paper are as
follows:
 1. How ecommerce is affected by cyber fraud.
 2. Adequacy of regulations in the national and
international level.
 3. Technical measures.
 4. Mechanisms and laws to check cyber fraud
Confidentiality
Authentication
Integrity
 Financial accounting : From manual to
computerized
 Information system: From paper based to
digital
 Advertising : Offline to online
 Corporate purchasing : Manual to E-
procurement
 A network of Networks.
 Hardware and Software.
 Building E-Commerce enabled website.
 Client-Server Computing.
 Hosting site on Web Server.
 Finding provider for electronic funds transfer
 Credit card
 Debit card
 E-cheques
 E-wallets
 Crime committed using a computer and the
internet to steal a person's identity or illegal
imports or malicious programs.
 Cybercrime is nothing but where the
computer is used as an object or subject of
crime.
 Online activities are just as vulnerable to crime
and can compromise personal safety just as
effectively as common everyday crimes.
 Lawmakers, law enforcement, and individuals
need to know how to protect themselves and
the persons for which they are responsible.
We can categorize Cyber crime in two ways :
 The Computer as a Target :- using a
computer to attack other computers. e.g.
Hacking, Virus/Worm attacks, DOS attack
etc.
 The computer as a weapon :- using a
computer to commit real world crimes. e.g.
Cyber Terrorism, IPR violations, Credit card
frauds, EFT frauds, Pornography. Cyber
Crime regulated by Cyber Laws or Internet
Laws.
 Hacking
 Software Piracy
 Denial Of Service Attack
 Virus Dissemination
 Computer Vandalism
 Cyber terrorism
Types of Cyber attacks, by percentage
(source- FBI,2007)
 Financial fraud: 11%
 Sabotage of data/networks: 17%
 Theft of proprietary information: 20%
 System penetration from the outside: 25%
 Denial of service: 27%
 Unauthorized access by insiders: 71%
 Employee abuse of internet privileges 79%
 Viruses: 85%
 Manipulate data integrity 6.8%
 Installed a sniffer 6.6%
 Stole password files 5.6%
 Proving/scanning systems 14.6%
 Trojan logons 5.8%
 IP spoofing 4.8%
 Introduced virus 10.6%
 Denied use of services 6.3%
 Downloaded data 8.1%
 Compromised trade secrets 9.8%
 Stole/diverted money 0.3%
 Compromised e-mail/documents
12.6%
 Publicized intrusion 0.5%
 Harassed personnel 4.5%
 Other 3.0%
User community
Network Administration
Introducers/Hackers
MVS mainframe users (5%)
UNIX users (25%)
Desktop users (50%)
Electronic mail can be intercepted and read
Customer’s credit card numbers may be read
 Customers risks :
Stolen credentials or password
Dishonest merchant
 Merchants risk :
Forged or copied instruments
Insufficient funds in customers account
 Authorization , Access Control:
protect intranet from hoarders: Firewalls
 Confidentiality , Data Integrity:
message must not be altered or tampered with :
 Encryption
 Authentication:
both parties prove identity before starting
transaction: Digital Certificates
 Non-repudiation:
proof that the document originated by you and
you only: Digital signature
 The cyber security will defend us from
critical attacks.
 Internet security process all the incoming
and outgoing data on our computer.
 Cyber security will defend from hacks
and virus.
 Held orders
 In-house database
 Shared database/Chain calls
 Telephone database
 Issuing Bank
 Call the customer
 Implementation of existing laws in a stricter
manner.
 Changes in the:1. Information Technology
Act, 2000, Amendment 2008 should be strictly
adhered to.
2. Indian Penal Code, 1908
should be in amended, stricter punishment
should be imposed on violators.
3. The newly added sections
of the Indian Evidence Act should be
considered while giving judgments on cyber
fraud
 The police officers, judges lawyers and the
persons associated with legal profession
should be sensitized on the matter.
 The general public, companies and
corporate houses should be made aware
of the damages cyber fraud can cause
 Advertisements in all forms of media is an
effective tool for creating awareness.
 High fines should be imposed which should
be deterrent in nature.

More Related Content

What's hot (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrime and security
Cybercrime and securityCybercrime and security
Cybercrime and security
 
Cyber Crime - What is Cyber Crime
Cyber Crime - What is Cyber CrimeCyber Crime - What is Cyber Crime
Cyber Crime - What is Cyber Crime
 
Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threat
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in india
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Identity theft ppt
Identity theft pptIdentity theft ppt
Identity theft ppt
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 

Viewers also liked

Security in E-commerce
Security in E-commerceSecurity in E-commerce
Security in E-commercem8817
 
EMEA_UK_Why Invest in Fraud Management_Brochure
EMEA_UK_Why Invest in Fraud Management_BrochureEMEA_UK_Why Invest in Fraud Management_Brochure
EMEA_UK_Why Invest in Fraud Management_BrochureRYAN ORTON
 
eCommerce Summit Atlanta Moneybookers Presentation
eCommerce Summit Atlanta Moneybookers PresentationeCommerce Summit Atlanta Moneybookers Presentation
eCommerce Summit Atlanta Moneybookers PresentationeCommerce Merchants
 
Cyber
CyberCyber
Cybermmgca
 
Analysis of frauds in banks nigeria’s experience
Analysis of frauds in banks nigeria’s experienceAnalysis of frauds in banks nigeria’s experience
Analysis of frauds in banks nigeria’s experienceAlexander Decker
 
E-commerce and fraud
E-commerce and fraudE-commerce and fraud
E-commerce and fraudblogzilla
 
Managing Payment and Fraud - Ecommerce Masterclass
Managing Payment and Fraud - Ecommerce MasterclassManaging Payment and Fraud - Ecommerce Masterclass
Managing Payment and Fraud - Ecommerce MasterclassThe ID Co.
 
Chapter 17 a fraud in e commerce Jen
Chapter 17 a  fraud in e commerce JenChapter 17 a  fraud in e commerce Jen
Chapter 17 a fraud in e commerce JenVidaB
 
Cyber Security Threats and Data Breaches
Cyber Security Threats and Data BreachesCyber Security Threats and Data Breaches
Cyber Security Threats and Data BreachesBijay Senihang
 
Browser Extensions in Mozilla Firefox & Google Chrome
Browser Extensions in Mozilla Firefox & Google ChromeBrowser Extensions in Mozilla Firefox & Google Chrome
Browser Extensions in Mozilla Firefox & Google ChromeKenneth Auchenberg
 
E commerce security(without animation)
E commerce security(without animation)E commerce security(without animation)
E commerce security(without animation)mmousavi
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindSaurabh Kheni
 
Understanding and preventing cyber crime and its impact on your organisation
Understanding and preventing cyber crime and its impact on your organisationUnderstanding and preventing cyber crime and its impact on your organisation
Understanding and preventing cyber crime and its impact on your organisationJacqueline Fick
 
Eamonn O Raghallaigh The Major Security Issues In E Commerce
Eamonn O Raghallaigh   The Major Security Issues In E CommerceEamonn O Raghallaigh   The Major Security Issues In E Commerce
Eamonn O Raghallaigh The Major Security Issues In E CommerceEamonnORagh
 

Viewers also liked (20)

Cyber Crimes
Cyber CrimesCyber Crimes
Cyber Crimes
 
Security in E-commerce
Security in E-commerceSecurity in E-commerce
Security in E-commerce
 
EMEA_UK_Why Invest in Fraud Management_Brochure
EMEA_UK_Why Invest in Fraud Management_BrochureEMEA_UK_Why Invest in Fraud Management_Brochure
EMEA_UK_Why Invest in Fraud Management_Brochure
 
eCommerce Summit Atlanta Moneybookers Presentation
eCommerce Summit Atlanta Moneybookers PresentationeCommerce Summit Atlanta Moneybookers Presentation
eCommerce Summit Atlanta Moneybookers Presentation
 
Cyber
CyberCyber
Cyber
 
Analysis of frauds in banks nigeria’s experience
Analysis of frauds in banks nigeria’s experienceAnalysis of frauds in banks nigeria’s experience
Analysis of frauds in banks nigeria’s experience
 
E-commerce and fraud
E-commerce and fraudE-commerce and fraud
E-commerce and fraud
 
Managing Payment and Fraud - Ecommerce Masterclass
Managing Payment and Fraud - Ecommerce MasterclassManaging Payment and Fraud - Ecommerce Masterclass
Managing Payment and Fraud - Ecommerce Masterclass
 
Chapter 17 a fraud in e commerce Jen
Chapter 17 a  fraud in e commerce JenChapter 17 a  fraud in e commerce Jen
Chapter 17 a fraud in e commerce Jen
 
Cyber Security Threats and Data Breaches
Cyber Security Threats and Data BreachesCyber Security Threats and Data Breaches
Cyber Security Threats and Data Breaches
 
Browser Extensions in Mozilla Firefox & Google Chrome
Browser Extensions in Mozilla Firefox & Google ChromeBrowser Extensions in Mozilla Firefox & Google Chrome
Browser Extensions in Mozilla Firefox & Google Chrome
 
E commerce security(without animation)
E commerce security(without animation)E commerce security(without animation)
E commerce security(without animation)
 
Web Browsers
Web BrowsersWeb Browsers
Web Browsers
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
 
Understanding and preventing cyber crime and its impact on your organisation
Understanding and preventing cyber crime and its impact on your organisationUnderstanding and preventing cyber crime and its impact on your organisation
Understanding and preventing cyber crime and its impact on your organisation
 
Security@ecommerce
Security@ecommerceSecurity@ecommerce
Security@ecommerce
 
Eamonn O Raghallaigh The Major Security Issues In E Commerce
Eamonn O Raghallaigh   The Major Security Issues In E CommerceEamonn O Raghallaigh   The Major Security Issues In E Commerce
Eamonn O Raghallaigh The Major Security Issues In E Commerce
 
Ecommerce Security
Ecommerce SecurityEcommerce Security
Ecommerce Security
 
Cyber fraud in banks
Cyber fraud in banksCyber fraud in banks
Cyber fraud in banks
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 

Similar to Cyber fraud a threat to E commerce

CYBER-CRIME PRESENTATION with real-time examples
CYBER-CRIME PRESENTATION with real-time examplesCYBER-CRIME PRESENTATION with real-time examples
CYBER-CRIME PRESENTATION with real-time examplesVivekanandaGN1
 
CYBER-CRIME PRESENTATION.ppt
CYBER-CRIME PRESENTATION.pptCYBER-CRIME PRESENTATION.ppt
CYBER-CRIME PRESENTATION.pptPraveen362297
 
CYBER CRIME PRESENTATION for Law Students for Semester four
CYBER CRIME PRESENTATION for Law Students for Semester fourCYBER CRIME PRESENTATION for Law Students for Semester four
CYBER CRIME PRESENTATION for Law Students for Semester fourssuser24dae7
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crimehomeworkping4
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Actmaruhope
 
English in written
English in writtenEnglish in written
English in writtenazhar manap
 
Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000V'vek Sharma
 
Introducion cyber crime and cyber law
Introducion cyber crime  and cyber lawIntroducion cyber crime  and cyber law
Introducion cyber crime and cyber lawYagnesh Garud
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptBushra22
 
Ecommerce security
Ecommerce securityEcommerce security
Ecommerce securitypolitegcuf
 

Similar to Cyber fraud a threat to E commerce (20)

UNIT 5.docx
UNIT 5.docxUNIT 5.docx
UNIT 5.docx
 
CYBER-CRIME PRESENTATION with real-time examples
CYBER-CRIME PRESENTATION with real-time examplesCYBER-CRIME PRESENTATION with real-time examples
CYBER-CRIME PRESENTATION with real-time examples
 
CYBER-CRIME PRESENTATION.ppt
CYBER-CRIME PRESENTATION.pptCYBER-CRIME PRESENTATION.ppt
CYBER-CRIME PRESENTATION.ppt
 
CYBER CRIME PRESENTATION for Law Students for Semester four
CYBER CRIME PRESENTATION for Law Students for Semester fourCYBER CRIME PRESENTATION for Law Students for Semester four
CYBER CRIME PRESENTATION for Law Students for Semester four
 
Cyber Laws.ppt
Cyber Laws.pptCyber Laws.ppt
Cyber Laws.ppt
 
cyber crime
cyber crime cyber crime
cyber crime
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime
 
cyber crime.pptx
cyber crime.pptxcyber crime.pptx
cyber crime.pptx
 
It security & crimes
It security & crimesIt security & crimes
It security & crimes
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
CS 1.ppt
CS 1.pptCS 1.ppt
CS 1.ppt
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Act
 
English in written
English in writtenEnglish in written
English in written
 
Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000Cyber Crime & Information technology Act 2000
Cyber Crime & Information technology Act 2000
 
Introducion cyber crime and cyber law
Introducion cyber crime  and cyber lawIntroducion cyber crime  and cyber law
Introducion cyber crime and cyber law
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
12 c business i environment i society mba 2016
12 c business i environment i society mba 201612 c business i environment i society mba 2016
12 c business i environment i society mba 2016
 
Ecommerce security
Ecommerce securityEcommerce security
Ecommerce security
 

Recently uploaded

一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理Airst S
 
Career As Legal Reporters for Law Students
Career As Legal Reporters for Law StudentsCareer As Legal Reporters for Law Students
Career As Legal Reporters for Law StudentsNilendra Kumar
 
judicial remedies against administrative actions.pptx
judicial remedies against administrative actions.pptxjudicial remedies against administrative actions.pptx
judicial remedies against administrative actions.pptxIshikaChauhan30
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理bd2c5966a56d
 
一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理
一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理
一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理ss
 
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理e9733fc35af6
 
5-6-24 David Kennedy Article Law 360.pdf
5-6-24 David Kennedy Article Law 360.pdf5-6-24 David Kennedy Article Law 360.pdf
5-6-24 David Kennedy Article Law 360.pdfTodd Spodek
 
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理Airst S
 
Code_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.pptCode_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.pptJosephCanama
 
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYA SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYJulian Scutts
 
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理A AA
 
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理Airst S
 
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation StrategySmarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation StrategyJong Hyuk Choi
 
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理ss
 
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理Airst S
 
一比一原版(Warwick毕业证书)华威大学毕业证如何办理
一比一原版(Warwick毕业证书)华威大学毕业证如何办理一比一原版(Warwick毕业证书)华威大学毕业证如何办理
一比一原版(Warwick毕业证书)华威大学毕业证如何办理Fir La
 
Cyber Laws : National and International Perspective.
Cyber Laws : National and International Perspective.Cyber Laws : National and International Perspective.
Cyber Laws : National and International Perspective.Nilendra Kumar
 
一比一原版(UWA毕业证书)西澳大学毕业证如何办理
一比一原版(UWA毕业证书)西澳大学毕业证如何办理一比一原版(UWA毕业证书)西澳大学毕业证如何办理
一比一原版(UWA毕业证书)西澳大学毕业证如何办理bd2c5966a56d
 
一比一原版悉尼科技大学毕业证如何办理
一比一原版悉尼科技大学毕业证如何办理一比一原版悉尼科技大学毕业证如何办理
一比一原版悉尼科技大学毕业证如何办理e9733fc35af6
 

Recently uploaded (20)

一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理一比一原版赫尔大学毕业证如何办理
一比一原版赫尔大学毕业证如何办理
 
Career As Legal Reporters for Law Students
Career As Legal Reporters for Law StudentsCareer As Legal Reporters for Law Students
Career As Legal Reporters for Law Students
 
judicial remedies against administrative actions.pptx
judicial remedies against administrative actions.pptxjudicial remedies against administrative actions.pptx
judicial remedies against administrative actions.pptx
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
 
一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理
一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理
一比一原版(UNSW毕业证书)新南威尔士大学毕业证如何办理
 
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
一比一原版(OhioStateU毕业证书)美国俄亥俄州立大学毕业证如何办理
 
5-6-24 David Kennedy Article Law 360.pdf
5-6-24 David Kennedy Article Law 360.pdf5-6-24 David Kennedy Article Law 360.pdf
5-6-24 David Kennedy Article Law 360.pdf
 
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
一比一原版(JCU毕业证书)詹姆斯库克大学毕业证如何办理
 
Code_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.pptCode_Ethics of_Mechanical_Engineering.ppt
Code_Ethics of_Mechanical_Engineering.ppt
 
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURYA SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
A SHORT HISTORY OF LIBERTY'S PROGREE THROUGH HE EIGHTEENTH CENTURY
 
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
一比一原版(UM毕业证书)美国密歇根大学安娜堡分校毕业证如何办理
 
It’s Not Easy Being Green: Ethical Pitfalls for Bankruptcy Novices
It’s Not Easy Being Green: Ethical Pitfalls for Bankruptcy NovicesIt’s Not Easy Being Green: Ethical Pitfalls for Bankruptcy Novices
It’s Not Easy Being Green: Ethical Pitfalls for Bankruptcy Novices
 
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
 
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation StrategySmarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
 
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
 
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
一比一原版(CQU毕业证书)中央昆士兰大学毕业证如何办理
 
一比一原版(Warwick毕业证书)华威大学毕业证如何办理
一比一原版(Warwick毕业证书)华威大学毕业证如何办理一比一原版(Warwick毕业证书)华威大学毕业证如何办理
一比一原版(Warwick毕业证书)华威大学毕业证如何办理
 
Cyber Laws : National and International Perspective.
Cyber Laws : National and International Perspective.Cyber Laws : National and International Perspective.
Cyber Laws : National and International Perspective.
 
一比一原版(UWA毕业证书)西澳大学毕业证如何办理
一比一原版(UWA毕业证书)西澳大学毕业证如何办理一比一原版(UWA毕业证书)西澳大学毕业证如何办理
一比一原版(UWA毕业证书)西澳大学毕业证如何办理
 
一比一原版悉尼科技大学毕业证如何办理
一比一原版悉尼科技大学毕业证如何办理一比一原版悉尼科技大学毕业证如何办理
一比一原版悉尼科技大学毕业证如何办理
 

Cyber fraud a threat to E commerce

  • 1.
  • 2. To establish the extent of internet fraud and its operational impact on ecommerce. The effectiveness of current fraud prevention systems. Finally to identify common features in the way internet fraudsters operate.
  • 3. The effect of cyber fraud on e commerce: examining various aspects involved.
  • 4.  1. Introduction  2. Ecommerce and its relation to cyber fraud.  3. Various aspects of ecommerce.  4. Technical issues involved.  5. Legal issues: substantive and procedural.  6. Conclusion and suggestions
  • 5. The major issues tackled with in this paper are as follows:  1. How ecommerce is affected by cyber fraud.  2. Adequacy of regulations in the national and international level.  3. Technical measures.  4. Mechanisms and laws to check cyber fraud
  • 6.
  • 8.
  • 9.
  • 10.
  • 11.  Financial accounting : From manual to computerized  Information system: From paper based to digital  Advertising : Offline to online  Corporate purchasing : Manual to E- procurement
  • 12.  A network of Networks.  Hardware and Software.  Building E-Commerce enabled website.  Client-Server Computing.  Hosting site on Web Server.  Finding provider for electronic funds transfer
  • 13.  Credit card  Debit card  E-cheques  E-wallets
  • 14.  Crime committed using a computer and the internet to steal a person's identity or illegal imports or malicious programs.  Cybercrime is nothing but where the computer is used as an object or subject of crime.  Online activities are just as vulnerable to crime and can compromise personal safety just as effectively as common everyday crimes.  Lawmakers, law enforcement, and individuals need to know how to protect themselves and the persons for which they are responsible.
  • 15. We can categorize Cyber crime in two ways :  The Computer as a Target :- using a computer to attack other computers. e.g. Hacking, Virus/Worm attacks, DOS attack etc.  The computer as a weapon :- using a computer to commit real world crimes. e.g. Cyber Terrorism, IPR violations, Credit card frauds, EFT frauds, Pornography. Cyber Crime regulated by Cyber Laws or Internet Laws.
  • 16.  Hacking  Software Piracy  Denial Of Service Attack  Virus Dissemination  Computer Vandalism  Cyber terrorism
  • 17. Types of Cyber attacks, by percentage (source- FBI,2007)  Financial fraud: 11%  Sabotage of data/networks: 17%  Theft of proprietary information: 20%  System penetration from the outside: 25%  Denial of service: 27%  Unauthorized access by insiders: 71%  Employee abuse of internet privileges 79%  Viruses: 85%
  • 18.  Manipulate data integrity 6.8%  Installed a sniffer 6.6%  Stole password files 5.6%  Proving/scanning systems 14.6%  Trojan logons 5.8%  IP spoofing 4.8%  Introduced virus 10.6%  Denied use of services 6.3%
  • 19.  Downloaded data 8.1%  Compromised trade secrets 9.8%  Stole/diverted money 0.3%  Compromised e-mail/documents 12.6%  Publicized intrusion 0.5%  Harassed personnel 4.5%  Other 3.0%
  • 20.
  • 21. User community Network Administration Introducers/Hackers MVS mainframe users (5%) UNIX users (25%) Desktop users (50%)
  • 22. Electronic mail can be intercepted and read Customer’s credit card numbers may be read
  • 23.  Customers risks : Stolen credentials or password Dishonest merchant  Merchants risk : Forged or copied instruments Insufficient funds in customers account
  • 24.  Authorization , Access Control: protect intranet from hoarders: Firewalls  Confidentiality , Data Integrity: message must not be altered or tampered with :  Encryption  Authentication: both parties prove identity before starting transaction: Digital Certificates  Non-repudiation: proof that the document originated by you and you only: Digital signature
  • 25.  The cyber security will defend us from critical attacks.  Internet security process all the incoming and outgoing data on our computer.  Cyber security will defend from hacks and virus.
  • 26.  Held orders  In-house database  Shared database/Chain calls  Telephone database  Issuing Bank  Call the customer
  • 27.  Implementation of existing laws in a stricter manner.  Changes in the:1. Information Technology Act, 2000, Amendment 2008 should be strictly adhered to. 2. Indian Penal Code, 1908 should be in amended, stricter punishment should be imposed on violators. 3. The newly added sections of the Indian Evidence Act should be considered while giving judgments on cyber fraud
  • 28.  The police officers, judges lawyers and the persons associated with legal profession should be sensitized on the matter.  The general public, companies and corporate houses should be made aware of the damages cyber fraud can cause  Advertisements in all forms of media is an effective tool for creating awareness.  High fines should be imposed which should be deterrent in nature.