SlideShare a Scribd company logo
1 of 22
E-COMMERCE SECURITY AND PAYMENT SYSTEMS
LEARNING OBJECTIVES
Understand the scope of e-commerce crime and security problems,
Identify the key security threats in the e-commerce environment.
Describe how technology helps secure Internet communications channels and protect networks,
servers, and clients. Identify the major e-commerce payment systems in use today.
Describe the features and functionality of electronic billing presentment and payment systems
THE E-COMMERCE SECURITY ENVIRONMENT
DIMENSIONS OF E-COMMERCE SECURITY
Integrity
Nonrepudiation
Authenticity
Confidentiality
Privacy
Availability
DIMENSIONS OF E-COMMERCE SECURITY
Integrity the ability to ensure that information being displayed on a website or transmitted or received over the Internet
has not been altered in any way by an unauthorized party
Nonrepudiation the ability to ensure that e-commerce participants do not deny (i.e., repudiate) their online actions
Authenticity the ability to identify the identity of a person or entity with whom you are dealing on the Interne
Confidentiality the ability to ensure that messages and data are available only to those who are authorized to view them
Privacy the ability to control the use of information about oneself
Availability the ability to ensure that an e-commerce site continues to function as intended
SECURITY THREATS IN THE E-COMMERCE ENVIRONMENT
SECURITY THREATS
 Malicious code (malware)
 POTENTIALLY UNWANTED PROGRAMS (PUPS)
 PHISHING
 HACKING, CYBERVANDALISM, AND HACKTIVISM
 DATA BREACHES
 CREDIT CARD FRAUD/THEFT
 IDENTITY FRAUD
 SPOOFING, PHARMING, AND SPAM (JUNK) WEBSITES
 SNIFFING AND MAN-IN-THE-MIDDLE ATTACKS
 DENIAL OF SERVICE (DOS) AND DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS
 INSIDER ATTACKS
 POORLY DESIGNED SOFTWARE
MALICIOUS CODE (MALWARE)
Exploit kit collection of exploits bundled together and rented or sold as a commercial product
Maladvertising online advertising that contains malicious code
Virus a computer program that has the ability to replicate or make copies of itself, and spread to
other files
Worm malware that is designed to spread from computer to computer
Trojan horse appears to be benign, but then does something other than expected. Often a way
for viruses or other malicious code to be introduced into a computer system
Backdoor feature of viruses, worms, and Trojans that allows an attacker to remotely access a
compromised computer
Bot type of malicious code that can be covertly installed on a computer when connected to the
Internet. Once installed, the bot responds to external commands sent by the attacker
Botnet collection of captured bot computer
Drive-by download malware that comes with a downloaded file that a user requests
POTENTIALLY UNWANTED PROGRAMS (PUPS
Adware a PUP that serves pop-up ads to your computer
Browser parasite a program that can monitor and change the
settings of a user’s browser
Spyware a program used to obtain information such as a user’s
keystrokes, e-mail, instant messages, and so on
PHISHING
Social engineering exploitation of human fallibility and
gullibility to distribute malware
Phishing any deceptive, online attempt by a third party
to obtain confidential information for financial gain
HACKING, CYBERVANDALISM, AND HACKTIVISM
Hacker an individual who intends to gain unauthorized access to a computer
system
Cracker within the hacking community, a term typically used to denote a hacker
with criminal intent
Cybervandalism intentionally disrupting, defacing, or even destroying a site
Hacktivism cybervandalism and data theft for political purposes
White hats “good” hackers who help organizations locate and fix security flaws
Black hats hackers who act with the intention of causing harm
Grey hats hackers who believe they are pursuing some greater good by
breaking in and revealing system flaws
DATA BREACHES
Data breach occurs when an
organization loses control over
its information to outsiders
CREDIT CARD FRAUD/THEFT
Theft of credit card data is one of the most
feared occurrences on the Internet. Fear
that credit card information will be stolen
prevents users from making online
purchases
IDENTITY FRAUD
Identity fraud involves the
unauthorized use of another
person’s personal data for illegal
financial benefit
SPOOFING, PHARMING, AND SPAM (JUNK) WEBSITES
Spoofing involves attempting to hide a true identity by using someone else’s
e-mail or IP address
Pharming automatically redirecting a web link to an address different from
the intended one, with the site masquerading as the intended destination
Spam (junk) websites also referred to as link farms; promise to offer
products or services, but in fact are just collections of advertisements
SNIFFING AND MAN-IN-THE-MIDDLE ATTACKS
Sniffer a type of eavesdropping program that monitors information traveling
over a network
Man-in-the-middle (MitM) attack attack in which the attacker is able to
intercept communications between two parties who believe they are directly
communicating with one another, when in fact the attacker is controlling the
communications
DENIAL OF SERVICE (DOS) AND DISTRIBUTED DENIAL OF SERVICE
(DDOS) ATTACKS
Denial of Service (DoS) attack flooding a website with useless
traffic to inundate and overwhelm the network
Distributed Denial of Service (DDoS) attack using numerous
computers to attack the target network from numerous
launch point
INSIDER ATTACKS
Indicate that insiders are more likely
to be the source of cyberattacks
than outsiders, and to cause more
damage to an organization
POORLY DESIGNED SOFTWARE
SQL injection attack takes advantage of poorly coded web application software that
fails to properly validate or filter data entered by a user on a web page
Zero-day vulnerability software vulnerability that has been previously unreported
and for which no patch yet exists
Heartbleed bug flaw in OpenSSL encryption system that allowed hackers to decrypt
an SSL session and discover user names, passwords, and other user data
TITLE LOREM IPSUM DOLOR SIT AMET
2017
Lorem ipsum dolor sit amet
2018
Lorem ipsum dolor sit amet
2019
Lorem ipsum dolor sit amet

More Related Content

What's hot

E commerce security
E commerce securityE commerce security
E commerce security
Shakti Singh
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
Aryan Ragu
 

What's hot (20)

E commerce security
E commerce securityE commerce security
E commerce security
 
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanHow to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
 
E commerce ( system analysis ) chapter 4
E commerce ( system analysis ) chapter 4E commerce ( system analysis ) chapter 4
E commerce ( system analysis ) chapter 4
 
E-Commerce Security
E-Commerce SecurityE-Commerce Security
E-Commerce Security
 
Introduction to Electronic Commerce
Introduction to Electronic CommerceIntroduction to Electronic Commerce
Introduction to Electronic Commerce
 
Chapter 12
Chapter 12Chapter 12
Chapter 12
 
E Commerce -Security Threats and Challenges
E Commerce -Security Threats and ChallengesE Commerce -Security Threats and Challenges
E Commerce -Security Threats and Challenges
 
C8-Ethical, Social, & Political Issues in Ecommerce.PPT
C8-Ethical, Social, & Political Issues in Ecommerce.PPTC8-Ethical, Social, & Political Issues in Ecommerce.PPT
C8-Ethical, Social, & Political Issues in Ecommerce.PPT
 
E Marketing Mix
E Marketing MixE Marketing Mix
E Marketing Mix
 
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONSE-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
 
Lecture 3 e-cmmerce , business models and concpets-chapter 2
Lecture 3  e-cmmerce , business models and concpets-chapter 2Lecture 3  e-cmmerce , business models and concpets-chapter 2
Lecture 3 e-cmmerce , business models and concpets-chapter 2
 
Email marketing
Email marketingEmail marketing
Email marketing
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
E-commerce Marketing
E-commerce MarketingE-commerce Marketing
E-commerce Marketing
 
Security issues in e commerce
Security issues in e commerceSecurity issues in e commerce
Security issues in e commerce
 
Spear Phishing Attacks
Spear Phishing AttacksSpear Phishing Attacks
Spear Phishing Attacks
 
E-Commerce
E-CommerceE-Commerce
E-Commerce
 
Ethical, Social, and Political Issues in E-commerce
Ethical, Social, and Political Issues in E-commerceEthical, Social, and Political Issues in E-commerce
Ethical, Social, and Political Issues in E-commerce
 

Similar to E-commerce Security and Payment Systems.pptx

Similar to E-commerce Security and Payment Systems.pptx (20)

Cyber Security.docx
Cyber Security.docxCyber Security.docx
Cyber Security.docx
 
Computer security and
Computer security andComputer security and
Computer security and
 
Untitled presentation.pptx
Untitled presentation.pptxUntitled presentation.pptx
Untitled presentation.pptx
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering students
 
1 understanding cyber threats
1   understanding cyber threats 1   understanding cyber threats
1 understanding cyber threats
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacy
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptx
 
2_2 DangersComputerCrime.pptx
2_2 DangersComputerCrime.pptx2_2 DangersComputerCrime.pptx
2_2 DangersComputerCrime.pptx
 
System-Security-acit-Institute
System-Security-acit-InstituteSystem-Security-acit-Institute
System-Security-acit-Institute
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
INTERNET SECURITY.pptx
INTERNET SECURITY.pptxINTERNET SECURITY.pptx
INTERNET SECURITY.pptx
 
Cyber security
Cyber security Cyber security
Cyber security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Different Types Of Cyber Security Threats
Different Types Of Cyber Security ThreatsDifferent Types Of Cyber Security Threats
Different Types Of Cyber Security Threats
 
8 Different Types of Cybersecurity and Threats Involved
8 Different Types of Cybersecurity and Threats Involved8 Different Types of Cybersecurity and Threats Involved
8 Different Types of Cybersecurity and Threats Involved
 
cyber security
cyber security cyber security
cyber security
 
cyber threats and attacks.pptx
cyber threats and attacks.pptxcyber threats and attacks.pptx
cyber threats and attacks.pptx
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptx
 
Cyber theft !!!
Cyber theft !!!Cyber theft !!!
Cyber theft !!!
 

Recently uploaded

Challenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
Challenges and Opportunities: A Qualitative Study on Tax Compliance in PakistanChallenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
Challenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
vineshkumarsajnani12
 
2024 May - Clearbit Integration with Hubspot - Greenville HUG.pptx
2024 May - Clearbit Integration with Hubspot  - Greenville HUG.pptx2024 May - Clearbit Integration with Hubspot  - Greenville HUG.pptx
2024 May - Clearbit Integration with Hubspot - Greenville HUG.pptx
Boundify
 
Jual obat aborsi Hongkong ( 085657271886 ) Cytote pil telat bulan penggugur k...
Jual obat aborsi Hongkong ( 085657271886 ) Cytote pil telat bulan penggugur k...Jual obat aborsi Hongkong ( 085657271886 ) Cytote pil telat bulan penggugur k...
Jual obat aborsi Hongkong ( 085657271886 ) Cytote pil telat bulan penggugur k...
Klinik kandungan
 
Contact +971581248768 for 100% original and safe abortion pills available for...
Contact +971581248768 for 100% original and safe abortion pills available for...Contact +971581248768 for 100% original and safe abortion pills available for...
Contact +971581248768 for 100% original and safe abortion pills available for...
DUBAI (+971)581248768 BUY ABORTION PILLS IN ABU dhabi...Qatar
 

Recently uploaded (20)

Moradia Isolada com Logradouro; Detached house with patio in Penacova
Moradia Isolada com Logradouro; Detached house with patio in PenacovaMoradia Isolada com Logradouro; Detached house with patio in Penacova
Moradia Isolada com Logradouro; Detached house with patio in Penacova
 
Challenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
Challenges and Opportunities: A Qualitative Study on Tax Compliance in PakistanChallenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
Challenges and Opportunities: A Qualitative Study on Tax Compliance in Pakistan
 
2024 May - Clearbit Integration with Hubspot - Greenville HUG.pptx
2024 May - Clearbit Integration with Hubspot  - Greenville HUG.pptx2024 May - Clearbit Integration with Hubspot  - Greenville HUG.pptx
2024 May - Clearbit Integration with Hubspot - Greenville HUG.pptx
 
How does a bike-share company navigate speedy success? - Cyclistic
How does a bike-share company navigate speedy success? - CyclisticHow does a bike-share company navigate speedy success? - Cyclistic
How does a bike-share company navigate speedy success? - Cyclistic
 
Thompson_Taylor_MBBS_PB1_2024-03 (1)- Project & Portfolio 2.pptx
Thompson_Taylor_MBBS_PB1_2024-03 (1)- Project & Portfolio 2.pptxThompson_Taylor_MBBS_PB1_2024-03 (1)- Project & Portfolio 2.pptx
Thompson_Taylor_MBBS_PB1_2024-03 (1)- Project & Portfolio 2.pptx
 
Jual obat aborsi Hongkong ( 085657271886 ) Cytote pil telat bulan penggugur k...
Jual obat aborsi Hongkong ( 085657271886 ) Cytote pil telat bulan penggugur k...Jual obat aborsi Hongkong ( 085657271886 ) Cytote pil telat bulan penggugur k...
Jual obat aborsi Hongkong ( 085657271886 ) Cytote pil telat bulan penggugur k...
 
PALWAL CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN PALWAL ESCORTS
PALWAL CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN PALWAL ESCORTSPALWAL CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN PALWAL ESCORTS
PALWAL CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN PALWAL ESCORTS
 
PHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation FinalPHX May 2024 Corporate Presentation Final
PHX May 2024 Corporate Presentation Final
 
WheelTug Short Pitch Deck 2024 | Byond Insights
WheelTug Short Pitch Deck 2024 | Byond InsightsWheelTug Short Pitch Deck 2024 | Byond Insights
WheelTug Short Pitch Deck 2024 | Byond Insights
 
A DAY IN THE LIFE OF A SALESPERSON .pptx
A DAY IN THE LIFE OF A SALESPERSON .pptxA DAY IN THE LIFE OF A SALESPERSON .pptx
A DAY IN THE LIFE OF A SALESPERSON .pptx
 
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
 
UJJAIN CALL GIRL ❤ 8272964427❤ CALL GIRLS IN UJJAIN ESCORTS SERVICE PROVIDE
UJJAIN CALL GIRL ❤ 8272964427❤ CALL GIRLS IN UJJAIN ESCORTS SERVICE PROVIDEUJJAIN CALL GIRL ❤ 8272964427❤ CALL GIRLS IN UJJAIN ESCORTS SERVICE PROVIDE
UJJAIN CALL GIRL ❤ 8272964427❤ CALL GIRLS IN UJJAIN ESCORTS SERVICE PROVIDE
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAIGetting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
 
Goal Presentation_NEW EMPLOYEE_NETAPS FOUNDATION.pptx
Goal Presentation_NEW EMPLOYEE_NETAPS FOUNDATION.pptxGoal Presentation_NEW EMPLOYEE_NETAPS FOUNDATION.pptx
Goal Presentation_NEW EMPLOYEE_NETAPS FOUNDATION.pptx
 
Progress Report - Oracle's OCI Analyst Summit 2024
Progress Report - Oracle's OCI Analyst Summit 2024Progress Report - Oracle's OCI Analyst Summit 2024
Progress Report - Oracle's OCI Analyst Summit 2024
 
HomeRoots Pitch Deck | Investor Insights | April 2024
HomeRoots Pitch Deck | Investor Insights | April 2024HomeRoots Pitch Deck | Investor Insights | April 2024
HomeRoots Pitch Deck | Investor Insights | April 2024
 
The Art of Decision-Making: Navigating Complexity and Uncertainty
The Art of Decision-Making: Navigating Complexity and UncertaintyThe Art of Decision-Making: Navigating Complexity and Uncertainty
The Art of Decision-Making: Navigating Complexity and Uncertainty
 
Contact +971581248768 for 100% original and safe abortion pills available for...
Contact +971581248768 for 100% original and safe abortion pills available for...Contact +971581248768 for 100% original and safe abortion pills available for...
Contact +971581248768 for 100% original and safe abortion pills available for...
 
GURGAON CALL GIRL ❤ 8272964427❤ CALL GIRLS IN GURGAON ESCORTS SERVICE PROVIDE
GURGAON CALL GIRL ❤ 8272964427❤ CALL GIRLS IN GURGAON  ESCORTS SERVICE PROVIDEGURGAON CALL GIRL ❤ 8272964427❤ CALL GIRLS IN GURGAON  ESCORTS SERVICE PROVIDE
GURGAON CALL GIRL ❤ 8272964427❤ CALL GIRLS IN GURGAON ESCORTS SERVICE PROVIDE
 

E-commerce Security and Payment Systems.pptx

  • 1. E-COMMERCE SECURITY AND PAYMENT SYSTEMS
  • 2. LEARNING OBJECTIVES Understand the scope of e-commerce crime and security problems, Identify the key security threats in the e-commerce environment. Describe how technology helps secure Internet communications channels and protect networks, servers, and clients. Identify the major e-commerce payment systems in use today. Describe the features and functionality of electronic billing presentment and payment systems
  • 4. DIMENSIONS OF E-COMMERCE SECURITY Integrity Nonrepudiation Authenticity Confidentiality Privacy Availability
  • 5. DIMENSIONS OF E-COMMERCE SECURITY Integrity the ability to ensure that information being displayed on a website or transmitted or received over the Internet has not been altered in any way by an unauthorized party Nonrepudiation the ability to ensure that e-commerce participants do not deny (i.e., repudiate) their online actions Authenticity the ability to identify the identity of a person or entity with whom you are dealing on the Interne Confidentiality the ability to ensure that messages and data are available only to those who are authorized to view them Privacy the ability to control the use of information about oneself Availability the ability to ensure that an e-commerce site continues to function as intended
  • 6.
  • 7. SECURITY THREATS IN THE E-COMMERCE ENVIRONMENT
  • 8.
  • 9. SECURITY THREATS  Malicious code (malware)  POTENTIALLY UNWANTED PROGRAMS (PUPS)  PHISHING  HACKING, CYBERVANDALISM, AND HACKTIVISM  DATA BREACHES  CREDIT CARD FRAUD/THEFT  IDENTITY FRAUD  SPOOFING, PHARMING, AND SPAM (JUNK) WEBSITES  SNIFFING AND MAN-IN-THE-MIDDLE ATTACKS  DENIAL OF SERVICE (DOS) AND DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS  INSIDER ATTACKS  POORLY DESIGNED SOFTWARE
  • 10. MALICIOUS CODE (MALWARE) Exploit kit collection of exploits bundled together and rented or sold as a commercial product Maladvertising online advertising that contains malicious code Virus a computer program that has the ability to replicate or make copies of itself, and spread to other files Worm malware that is designed to spread from computer to computer Trojan horse appears to be benign, but then does something other than expected. Often a way for viruses or other malicious code to be introduced into a computer system Backdoor feature of viruses, worms, and Trojans that allows an attacker to remotely access a compromised computer Bot type of malicious code that can be covertly installed on a computer when connected to the Internet. Once installed, the bot responds to external commands sent by the attacker Botnet collection of captured bot computer Drive-by download malware that comes with a downloaded file that a user requests
  • 11. POTENTIALLY UNWANTED PROGRAMS (PUPS Adware a PUP that serves pop-up ads to your computer Browser parasite a program that can monitor and change the settings of a user’s browser Spyware a program used to obtain information such as a user’s keystrokes, e-mail, instant messages, and so on
  • 12. PHISHING Social engineering exploitation of human fallibility and gullibility to distribute malware Phishing any deceptive, online attempt by a third party to obtain confidential information for financial gain
  • 13. HACKING, CYBERVANDALISM, AND HACKTIVISM Hacker an individual who intends to gain unauthorized access to a computer system Cracker within the hacking community, a term typically used to denote a hacker with criminal intent Cybervandalism intentionally disrupting, defacing, or even destroying a site Hacktivism cybervandalism and data theft for political purposes White hats “good” hackers who help organizations locate and fix security flaws Black hats hackers who act with the intention of causing harm Grey hats hackers who believe they are pursuing some greater good by breaking in and revealing system flaws
  • 14. DATA BREACHES Data breach occurs when an organization loses control over its information to outsiders
  • 15. CREDIT CARD FRAUD/THEFT Theft of credit card data is one of the most feared occurrences on the Internet. Fear that credit card information will be stolen prevents users from making online purchases
  • 16. IDENTITY FRAUD Identity fraud involves the unauthorized use of another person’s personal data for illegal financial benefit
  • 17. SPOOFING, PHARMING, AND SPAM (JUNK) WEBSITES Spoofing involves attempting to hide a true identity by using someone else’s e-mail or IP address Pharming automatically redirecting a web link to an address different from the intended one, with the site masquerading as the intended destination Spam (junk) websites also referred to as link farms; promise to offer products or services, but in fact are just collections of advertisements
  • 18. SNIFFING AND MAN-IN-THE-MIDDLE ATTACKS Sniffer a type of eavesdropping program that monitors information traveling over a network Man-in-the-middle (MitM) attack attack in which the attacker is able to intercept communications between two parties who believe they are directly communicating with one another, when in fact the attacker is controlling the communications
  • 19. DENIAL OF SERVICE (DOS) AND DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS Denial of Service (DoS) attack flooding a website with useless traffic to inundate and overwhelm the network Distributed Denial of Service (DDoS) attack using numerous computers to attack the target network from numerous launch point
  • 20. INSIDER ATTACKS Indicate that insiders are more likely to be the source of cyberattacks than outsiders, and to cause more damage to an organization
  • 21. POORLY DESIGNED SOFTWARE SQL injection attack takes advantage of poorly coded web application software that fails to properly validate or filter data entered by a user on a web page Zero-day vulnerability software vulnerability that has been previously unreported and for which no patch yet exists Heartbleed bug flaw in OpenSSL encryption system that allowed hackers to decrypt an SSL session and discover user names, passwords, and other user data
  • 22. TITLE LOREM IPSUM DOLOR SIT AMET 2017 Lorem ipsum dolor sit amet 2018 Lorem ipsum dolor sit amet 2019 Lorem ipsum dolor sit amet