Analyzing securewebsites


Published on

Published in: Education, Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Analyzing securewebsites

  1. 1. EC05.02b Internet Security Issues 1 E-Commerce I Analyzing Secure Websites
  2. 2. EC05.02b Internet Security Issues 2 Secure websites Definition Security confirmation
  3. 3. EC05.02b Internet Security Issues 3 What is a secure website? A secure website is one that uses data encryption to protect all information.
  4. 4. EC05.02b Internet Security Issues 4 How can you tell a site is secure? There are three ways to confirm that a website is secure: Click the VeriSign icon to verify that the certificate is valid. A secure page should include a small padlock symbol displayed on the bottom line of your browser. On a secure page, in the browser address box, the URL will begin with an https: prefix rather than the standard http: prefix. The s means that the page is secure.
  5. 5. EC05.02b Internet Security Issues 5 Identity theft Definition Types of identity theft Examples of identity theft Protect against identity theft
  6. 6. EC05.02b Internet Security Issues 6 Definition  Any instance where a person uses someone else's identification documents or other identifiers in order to impersonate that person.  It intrudes into many areas of people’s daily lives.
  7. 7. EC05.02b Internet Security Issues 7 Types of identity theft Financial fraud - includes bank fraud, credit card fraud, computer and telecommunications fraud, social program fraud, tax refund fraud, mail fraud, and several more.
  8. 8. EC05.02b Internet Security Issues 8 Types of identity theft Criminal activities - involves taking on someone else's identity in order to commit a crime, enter a country, obtain special permits, hide one's own identity, or commit acts of terrorism.
  9. 9. EC05.02b Internet Security Issues 9 Types of identity theft Credit card fraud is identity theft in its most simple and common form. It can be accomplished either by a thief who steals your account number or when your pre- approved credit card offers fall into the wrong hands.
  10. 10. EC05.02b Internet Security Issues 10 Common modes of identity theft: Dumpster diving - Dug out of trash cans and dumpsters Memorized or copied by sales clerks and waiters Removed from mailboxes in the form of tax notices, financial account statements, and other bills Removed from your employer's files, either secretly or with the help of an inside accomplice Removed from hospital records, usually with the help of an inside accomplice Removed from your financial lender's files Examples of identity theft
  11. 11. EC05.02b Internet Security Issues 11 Common modes of identity theft: Removed from your landlord's files Purchased (or found free) in online (or offline) databases Collected from "cloned" Web sites - someone may recreate a legitimate merchant Web site in order to capture your personal information and credit card information when you place an order. Stolen from a merchant database through computer hacking (not as simple as other forms of theft) Snatched using software that mirrors keystrokes to capture credit card account information More Examples of identity theft
  12. 12. EC05.02b Internet Security Issues 12 Ways to protect yourself  DON'T give out your Social Security number unless it’s critical.  DESTROY any unwanted credit card offers.  ONLY include your name and address on checks.  SHRED (cross-cut) any sensitive documents before discarding.  DON'T carry your Social Security card, passport, or birth certificate in your wallet or purse.  REVIEW your credit report annually to verify its accuracy.
  13. 13. EC05.02b Internet Security Issues 13 More Ways to protect yourself  NEVER give out personal information on the phone to someone you don't know and who initiated the call.  REVIEW your credit card statement each month to make sure there are no unauthorized charges.  DON'T mail bills or documents that contain personal data (like tax forms or checks) from your personal mail box.  If you're ever denied credit, FIND OUT WHY.  REACT QUICKLY if a creditor calls about charges you didn't make.  GUARD deposit slips as closely as you do checks.
  14. 14. EC05.02b Internet Security Issues 14 What is Netiquette?  "Netiquette" is network etiquette, the do's and don'ts of online communication.  Netiquette includes both common courtesy online and the informal "rules of the road" of cyberspace.  In other words, Netiquette is a set of rules for behaving properly online.
  15. 15. EC05.02b Internet Security Issues 15 Core Rules of Netiquette Rule 1: Remember the Human Rule 2: Adhere to the same standards of behavior online that you follow in real life Rule 3: Know where you are in cyberspace Rule 4: Respect other people's time and bandwidth Rule 5: Make yourself look good online Rule 6: Share expert knowledge Rule 7: Help keep flame wars under control Rule 8: Respect other people's privacy Rule 9: Don't abuse your power Rule 10: Be forgiving of other people's mistakes
  16. 16. EC05.02b Internet Security Issues 16 Sources  “Electronic Commerce.” 1999. (2 Jan 2006).  Stein, Lincoln D. “WWW Security FAQ: What’s New.” 2000. (2 Jan 2006)  Strom, David. “The Challenge of Electronic Commerce: Selling Lemonade has Never Been This Tough.” 2000. (2 Jan. 2006).  “Bureau of Industry and Security.” US Department of Commerce (2 Jan 2006)  Electronic Commerce NC WiseOwl (2 Jan 2006)  Kennedy, Dennis, An Internet Tool Kit for E-Commerce Law Jan 15, 2001 The John Marshall Law School (2 Jan 2006)