SlideShare a Scribd company logo
1 of 29
Download to read offline
1 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
1 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Securing Online Transactions
Simplifying Security.
Module 8
2 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
2 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Hide your bank account details, as two new pieces of banking malware are making the rounds: the 
OddJob Trojan, which keeps banking sessions open after users log out, as well as a variant of Zeus 
Mitmo that targets Symbian and BlackBerry smartphones.
On Tuesday, browser security firm Trusteer warned that the OddJob malware could keep banking Web 
site sessions open even after users thought they'd logged off. "By tapping the session ID token ‐‐ which 
banks use to identify a user's online banking session ‐‐ the fraudsters can electronically impersonate the 
legitimate user and complete a range of banking operations," according to a blog post from Amit Klein, 
CTO of security firm Trusteer. 
Trusteer discovered OddJob several months ago, 
but withheld disclosing details until law enforcement
agencies concluded related investigations. It said that
the malware has targeted customers in the
United States, Poland, and Denmark, and appeared to be the work of criminals based in eastern Europe. 
OddJob, Zeus Mitmo Trojans Target Financial Data
http://www.informationweek.com
3 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
3 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Module Objectives
Online Shopping
How Online Shopping Works?
Online Banking
Securing Online Transactions
Choosing a Secure Online 
Payment Service
SSL and the Padlock Symbol
Identifying a Trustworthy Website
Identifying an Untrustworthy 
Website
McAfee’s SiteAdvisor
Online Transactions Security 
Checklist
4 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
4 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Online 
Shopping
Online 
Banking
Securing 
Online 
Transactions
SSL and the 
Padlock 
Symbol
Identifying a 
Trustworthy 
Website
Choosing a 
Secure Online 
Payment 
Service
Identifying an 
Untrustworthy 
Website
Online 
Transactions 
Security 
Checklist
How Online 
Shopping 
Works?
Module Flow
5 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
5 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Online Shopping
Online shopping is the 
process of buying 
goods and services 
directly from the seller
over the Internet
The benefits of online shopping are:
Usually available 24 hours a day
Describe products with text, photos, and multimedia files
Quickly seek out deals for items/services with several vendors
Purchase a product without actually travelling to the store using a  
credit/debit card
The ease of shopping and
facility to compare the 
products and prices online
has made online shopping 
an attractive option for 
consumers
6 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
6 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
How Online
Shopping Works?
1
Users visit the e‐commerce site where 
they wish to buy goods/products from
Users browse for the required product 
through the online catalogue2
7 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
7 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
How Online ShoppingWorks?
They add the product/service to the shopping cart
The shopping cart shows:
The products being purchased
The number of units of the product
The price of the product, taxes 
(inclusive/exclusive)
Shipping costs, etc.
3
They fill in the online order form with:
Shipping information
Shipping address
Consumer name
Billing address and its details
Credit card details
Any other information the merchant requires
4
8 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
8 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
5
The user’s credit card information 
is encrypted and sent to the 
merchant
The user receives an on‐screen 
confirmation or/and a 
confirmation e‐mail
How Online ShoppingWorks?
9 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
9 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Online Banking
Online banking is the method of making bank transactions or 
paying bills over the Internet
It allows the user to make deposits, withdrawals, and pay bills 
with a single click of the mouse
Advantages Disadvantages
Online banking allows you 
to perform transactions, pay 
bills, and check balances 
24x7
Online banking is fast, 
efficient, and effective
Online banking sites can take a 
while to start up and can be 
tricky for the beginner 
The customer may have a 
doubt that his/her transaction 
was successful
10 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
10 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Online 
Shopping
Online 
Banking
Securing 
Online 
Transactions
SSL and the 
Padlock 
Symbol
Identifying a 
Trustworthy 
Website
Choosing a 
Secure Online 
Payment 
Service
Identifying an 
Untrustworthy 
Website
How Online 
Shopping 
Works?
Module Flow
Online 
Transactions 
Security 
Checklist
11 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
11 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Credit Card Payments
Credit cards are still the preferred 
means for online purchases
because of ease of use and the 
ability to pay the bills at a later 
date
Credit cards are issued by a credit 
card issuing bank or credit union 
after verifying the user’s 
credentials
The card user agrees to pay 
the card issuer the amount 
used for making the purchase 
The cardholder indicates 
consent to pay by signing a 
receipt with a record of the 
card details and indicating the 
amount to be paid or by 
entering a personal 
identification number (PIN) 
or Card Verification Value 
(CVV or CVV2)
12 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
12 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Types of Credit Card Frauds
Credit card mail order fraud
Skimming/counterfeit credit card
Chargeback fraud
Lost and stolen card fraud
Card‐not‐present (CNP) fraud
Cash machine fraud
Shoulder‐surfing
Identity theft
The offender gathers information about a card holder 
and sends a request to the bank for a new or 
replacement card
Electronically copying authentic data on a card's 
magnetic stripe to another card without the genuine 
card holder’s knowledge
Genuine credit card holder uses the card to purchase 
goods or services, and when bank statements are issued, 
they call the bank and claim that they never authorized 
the transaction
Card is physically stolen or lost and then used by the 
offender
An offender obtains credit card details and then 
purchases goods and services over the Internet or by 
telephone, fax, or email
The offender tampers with the cash machine and 
then tricks the user into entering the pin in their 
presence
The offender oversees the user entering PIN at 
the machine
The offender uses fraudulently obtained personal 
information of a credit card holder to access credit 
card accounts
Credit card frauds refer to the acts of making purchases using someone else's credit card information
13 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
13 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Guidelines for Ensuring Credit Card Safety
Before You Shop While You Shop
1. Check if the site is of a known business 
entity (e.g., GAP)
2. Check for a third‐party seal of trust 
(e.g., VeriSign, eTrust)
3. Check reviews of other shoppers (e.g., 
www.epinions.com)
4. Review the privacy statement
5. Use only one credit card for all your 
online purchases
6. Keep records of your online 
transactions
7. Do not share your credit card 
information with anyone
1. Disclose only required personal 
information. Be discreet.
2. Ensure that you are using a secure 
computer and using a secure site
3. Adopt a strong password
4. Use one‐click shopping cautiously
5. Check for a confirmation email after an 
online purchase/transaction/payment
14 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
14 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Stored Value Cards
Stored‐value cards are plastic cards 
with a monetary value encoded in the 
magnetic strip
They are an effective replacement for 
cash and can be used for low‐value 
retail purchases
They are not associated with the name 
of the user, hence they do not reveal 
any information about the customer
Even if lost, the consumer tends to lose 
only the value that is still unused
Smart Cards 
Smart cards are the same size as a 
credit card
They have a microprocessor in them, 
which differentiates them from a credit 
card (which has a magnetic strip)
The data on the magnetic stripe can be 
read, deleted, or even changed
Smart cards can be used with smart‐
card reader attached to a personal 
computer to authenticate a user
Online transactions can be secured by using the alternatives to credit cards
Securing Online Transactions
15 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
15 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Digital Cash E‐Wallets
Securing Online Transactions
Digital cash is a method of purchasing cash 
credits in small amounts
Cash credits can be stored in your computer 
and spent when making electronic 
purchases on the Internet
The consumer can buy the credits from a 
financial institution 
Digital cash is associated with a serial 
number that can be used for online 
transactions
Sending the serial number does not give out 
any personal information 
E‐Wallet is a software program used for 
online transactions
Once the software is installed, personal 
information can be filled out in the E‐wallet 
and stored
When the user orders something, the order 
form can be automatically completed using 
the wallet
This helps prevent the theft of personal 
information
By default, most of the electronic wallet 
software requests users to enter a 
password before completing the form
16 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
16 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Securing Online Transactions
Online Payment Services
Third‐party payment services can be used to 
make online payments to avoid giving away 
credit card information to the merchant directly
When using an online payment service, the 
user should transfer money to an account 
associated with the online payment service
All the purchases and transactions can be 
carried out through this account
 This way the customer does not have to reveal 
credit card information or other personal details to 
the merchants
17 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
17 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
1
2
3
4
Choosing a Secure Online
Payment Service
Make sure that the payment service 
is legitimate/registered
Check the reviews of these services 
at websites such as Epinions.com 
or BizRate.com
Look at the payment service's website for 
seals of approval from TRUSTe, VeriSign, or 
Better Business Bureau Online (BBBOnline)
Ensure that the website uses encryption 
technology to help protect your 
information
18 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
18 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Online Payment Services
https://www.paypal.com http://www.amazon.com
http://www.worldpay.com http://www.2checkout.com
19 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
19 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
SSL and the Padlock Symbol
Secure Sockets 
Layer (SSL) is the 
standard security
technology for creating 
an encrypted link
between a web 
server and a 
browser
This link ensures 
that all information 
transmitted between 
the web server and the 
browser is secured
The Padlock symbol is 
an indicator that the 
session is protected by 
the SSL encryption
Padlock Symbol
20 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
20 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
What Does the SSL Show?
If the browser encounters an untrustworthy certificate authority, a site warning is displayed
Details of the 
certification 
authority that 
issued the 
certificate
Expiration 
date of the 
certificate
Name and 
address of the 
company
Domain name 
of the 
company
21 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
21 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Online 
Shopping
Online 
Banking
Securing 
Online 
Transactions
SSL and the 
Padlock 
Symbol
Identifying a 
Trustworthy 
Website
Choosing a 
Secure Online 
Payment 
Service
Identifying an 
Untrustworthy 
Website
How Online 
Shopping 
Works?
Module Flow
Online 
Transactions 
Security 
Checklist
22 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
22 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Identifying a TrustworthyWebsite
A secure site usually begins with the prefix https
The Padlock symbol appears either at the bottom right in the browser or beside 
the URL
The user can click the lock to view the identity of the website
The certificate used to encrypt the connection also contains information about 
the identity of the website owner or organization
https
Padlock 
symbol
23 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
23 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Identifying a TrustworthyWebsite
Clicking the Padlock symbol reveals the website 
information
Click View Certificate to view the authenticity
of the certificate
Certification authority
24 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
24 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Identifying an Untrustworthy Website
Untrustworthy websites  are generally referred to the user 
through an email message from someone unknown
The website presents objectionable content, such as 
pornography or illegal materials
The website offers schemes that seem too good to be true, 
indicating a possible scam
When the user is asked for a credit card to verify his/her 
identity or for personal information when it's not necessary
When the user is asked for credit card information without any 
proof that the transaction has been secured
25 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
25 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
McAfee’s SiteAdvisor
McAfee’s SiteAdvisor software is a 
free browser plug‐in that gives safety 
advice about websites before the 
user clicks a risky site
Once the software is installed, small 
site‐rating icons are added to the 
user’s search results
These site ratings are based on tests 
conducted by McAfee using an array 
of computers that look for  various 
threats
The icons alert the user of the 
potential risky sites and help 
him/her find safer alternatives http://www.siteadvisor.com
26 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
26 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Rating Icons
McAfee SECURE: Tested daily for hacker 
vulnerabilities
WARNING: Serious risk issues
SAFE: Very low or no risk issues
CAUTION: Minor risk issues
UNKNOWN: Not yet rated. Use caution
27 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
27 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Module Summary
 The ease of shopping and comparing the products and prices online has made 
online shopping an attractive option for consumers 
 Online banking allows the user to make deposits, withdrawals, and pay bills with a 
single click of the mouse
 The consumer has to take all the necessary steps to ensure that the credit card 
information is not compromised
 Using third‐party payment services avoids giving your credit card information to 
the merchant directly
 The Padlock symbol is an indicator that the session is protected by the SSL 
encryption
28 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
28 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Ensure that you have the latest web browser installed in the system
Ensure that you are connected to a secured network when using a 
wireless network
Regularly scan your system for viruses, worms, Trojans, spyware, key 
loggers and other malware using updated anti‐virus
Regularly update your operating system and other installed applications
Use strong passwords for all online transactions and keep them changing 
at regular interval
Use Virtual Keyboard to enter sensitive information
Do not perform online transactions from public systems
Always completely log off after online transactions
Online Transactions Security Checklist
29 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
29 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Online Transactions Security Checklist
Use browser filters that warn about reported phishing sites and block access 
to the addresses
Register for the bank's mobile alert service to get alerts whenever there 
is a significant transaction
Protect yourself from identity theft
Never respond to unsolicited email offers or requests for information
Always check the address bar for the correct URL
Always check for the website certificate, SSL padlocks, and HTTPs

More Related Content

What's hot

Secure E-Banking Using Bioinformatics
Secure E-Banking Using BioinformaticsSecure E-Banking Using Bioinformatics
Secure E-Banking Using Bioinformaticsijtsrd
 
Ssp fraud risk vulnerablity in ebanking
Ssp fraud risk vulnerablity in ebanking Ssp fraud risk vulnerablity in ebanking
Ssp fraud risk vulnerablity in ebanking sathyananda prabhu
 
Fingereye: improvising security and optimizing ATM transaction time based on ...
Fingereye: improvising security and optimizing ATM transaction time based on ...Fingereye: improvising security and optimizing ATM transaction time based on ...
Fingereye: improvising security and optimizing ATM transaction time based on ...IJECEIAES
 
08 notable-security-incidents-in-the-finance-sector
08 notable-security-incidents-in-the-finance-sector08 notable-security-incidents-in-the-finance-sector
08 notable-security-incidents-in-the-finance-sectorinnov-acts-ltd
 
Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018Ronak Jain
 
Cybercriminals target online banking
Cybercriminals target online bankingCybercriminals target online banking
Cybercriminals target online bankingScientia Groups
 
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...Syeful Islam
 
Credit card hackers are here
Credit card hackers are hereCredit card hackers are here
Credit card hackers are hereAbhay pal
 
cybercrime survival guide
cybercrime survival guidecybercrime survival guide
cybercrime survival guideGary Gray, MCSE
 
Overcome Security Threats Affecting Mobile Financial Solutions 2020
Overcome Security Threats Affecting Mobile Financial Solutions 2020Overcome Security Threats Affecting Mobile Financial Solutions 2020
Overcome Security Threats Affecting Mobile Financial Solutions 2020Fusion Informatics
 
micro payments using coin
micro payments using coinmicro payments using coin
micro payments using coinNaga Dinesh
 
A Review of Information Security from Consumer’s Perspective Especially in On...
A Review of Information Security from Consumer’s Perspective Especially in On...A Review of Information Security from Consumer’s Perspective Especially in On...
A Review of Information Security from Consumer’s Perspective Especially in On...Dr. Amarjeet Singh
 
An overview study on cyber crimes in internet
An overview study on cyber crimes in internetAn overview study on cyber crimes in internet
An overview study on cyber crimes in internetAlexander Decker
 
Mobile security issues & frauds in India
Mobile security issues & frauds in IndiaMobile security issues & frauds in India
Mobile security issues & frauds in IndiaYogesh Lolge
 

What's hot (18)

Secure E-Banking Using Bioinformatics
Secure E-Banking Using BioinformaticsSecure E-Banking Using Bioinformatics
Secure E-Banking Using Bioinformatics
 
Protecting Data Privacy
Protecting Data PrivacyProtecting Data Privacy
Protecting Data Privacy
 
Ssp fraud risk vulnerablity in ebanking
Ssp fraud risk vulnerablity in ebanking Ssp fraud risk vulnerablity in ebanking
Ssp fraud risk vulnerablity in ebanking
 
Fingereye: improvising security and optimizing ATM transaction time based on ...
Fingereye: improvising security and optimizing ATM transaction time based on ...Fingereye: improvising security and optimizing ATM transaction time based on ...
Fingereye: improvising security and optimizing ATM transaction time based on ...
 
08 notable-security-incidents-in-the-finance-sector
08 notable-security-incidents-in-the-finance-sector08 notable-security-incidents-in-the-finance-sector
08 notable-security-incidents-in-the-finance-sector
 
Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018
 
Cybercriminals target online banking
Cybercriminals target online bankingCybercriminals target online banking
Cybercriminals target online banking
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Secure Online Banking
Secure Online BankingSecure Online Banking
Secure Online Banking
 
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
 
Credit card hackers are here
Credit card hackers are hereCredit card hackers are here
Credit card hackers are here
 
cybercrime survival guide
cybercrime survival guidecybercrime survival guide
cybercrime survival guide
 
Overcome Security Threats Affecting Mobile Financial Solutions 2020
Overcome Security Threats Affecting Mobile Financial Solutions 2020Overcome Security Threats Affecting Mobile Financial Solutions 2020
Overcome Security Threats Affecting Mobile Financial Solutions 2020
 
micro payments using coin
micro payments using coinmicro payments using coin
micro payments using coin
 
A Review of Information Security from Consumer’s Perspective Especially in On...
A Review of Information Security from Consumer’s Perspective Especially in On...A Review of Information Security from Consumer’s Perspective Especially in On...
A Review of Information Security from Consumer’s Perspective Especially in On...
 
An overview study on cyber crimes in internet
An overview study on cyber crimes in internetAn overview study on cyber crimes in internet
An overview study on cyber crimes in internet
 
Cyber fraud in banks
Cyber fraud in banksCyber fraud in banks
Cyber fraud in banks
 
Mobile security issues & frauds in India
Mobile security issues & frauds in IndiaMobile security issues & frauds in India
Mobile security issues & frauds in India
 

Viewers also liked

Affif cara membuat form login pada php
Affif cara membuat form login pada phpAffif cara membuat form login pada php
Affif cara membuat form login pada phpSejahtera Affif
 
Pp4 2014-penyelenggaraan-pendidikan-tinggi-pengelolaan-perguruan-tinggi
Pp4 2014-penyelenggaraan-pendidikan-tinggi-pengelolaan-perguruan-tinggiPp4 2014-penyelenggaraan-pendidikan-tinggi-pengelolaan-perguruan-tinggi
Pp4 2014-penyelenggaraan-pendidikan-tinggi-pengelolaan-perguruan-tinggiSejahtera Affif
 
Test presentationwithsound
Test presentationwithsoundTest presentationwithsound
Test presentationwithsoundayshahsheikh
 
Helping dad
Helping dadHelping dad
Helping dadClarivon
 
Is it time_to_own_your_network2
Is it time_to_own_your_network2Is it time_to_own_your_network2
Is it time_to_own_your_network2Clarivon
 
Cara ternak belut di rumah
Cara ternak belut di rumahCara ternak belut di rumah
Cara ternak belut di rumahSejahtera Affif
 
Cscu module 01 foundations of security
Cscu module 01 foundations of securityCscu module 01 foundations of security
Cscu module 01 foundations of securitySejahtera Affif
 

Viewers also liked (15)

Affif soal lct sd
Affif soal lct sdAffif soal lct sd
Affif soal lct sd
 
Affif cara membuat form login pada php
Affif cara membuat form login pada phpAffif cara membuat form login pada php
Affif cara membuat form login pada php
 
S jkr 0704960_chapter1
S jkr 0704960_chapter1S jkr 0704960_chapter1
S jkr 0704960_chapter1
 
Affif bab2
Affif bab2Affif bab2
Affif bab2
 
Pp4 2014-penyelenggaraan-pendidikan-tinggi-pengelolaan-perguruan-tinggi
Pp4 2014-penyelenggaraan-pendidikan-tinggi-pengelolaan-perguruan-tinggiPp4 2014-penyelenggaraan-pendidikan-tinggi-pengelolaan-perguruan-tinggi
Pp4 2014-penyelenggaraan-pendidikan-tinggi-pengelolaan-perguruan-tinggi
 
Ap m2 ak sumber dana
Ap m2 ak sumber danaAp m2 ak sumber dana
Ap m2 ak sumber dana
 
09 e02819
09 e0281909 e02819
09 e02819
 
Test presentationwithsound
Test presentationwithsoundTest presentationwithsound
Test presentationwithsound
 
Helping dad
Helping dadHelping dad
Helping dad
 
Is it time_to_own_your_network2
Is it time_to_own_your_network2Is it time_to_own_your_network2
Is it time_to_own_your_network2
 
Rpp bhs-arab-xii-smt-2
Rpp bhs-arab-xii-smt-2Rpp bhs-arab-xii-smt-2
Rpp bhs-arab-xii-smt-2
 
Affif bahasa arab
Affif bahasa arabAffif bahasa arab
Affif bahasa arab
 
Cara ternak belut di rumah
Cara ternak belut di rumahCara ternak belut di rumah
Cara ternak belut di rumah
 
B7 flexi budget
B7 flexi budgetB7 flexi budget
B7 flexi budget
 
Cscu module 01 foundations of security
Cscu module 01 foundations of securityCscu module 01 foundations of security
Cscu module 01 foundations of security
 

Similar to Cscu module 08 securing online transactions

Crypto phishing attack
Crypto phishing attackCrypto phishing attack
Crypto phishing attackizoologic
 
Top 5 Cryptocurrency Scam Risk Factors
Top 5 Cryptocurrency Scam Risk FactorsTop 5 Cryptocurrency Scam Risk Factors
Top 5 Cryptocurrency Scam Risk FactorsMaxim Kozlovsky
 
How to Secure Your Mac Based Law Practice
How to Secure Your Mac Based Law PracticeHow to Secure Your Mac Based Law Practice
How to Secure Your Mac Based Law PracticeRocket Matter, LLC
 
How might cryptocurrencies impact
How might cryptocurrencies impactHow might cryptocurrencies impact
How might cryptocurrencies impactOliviaJune1
 
Cyber security and current trends
Cyber security and current trendsCyber security and current trends
Cyber security and current trendsShreedeep Rayamajhi
 
INSECURE Magazine - 33
INSECURE Magazine - 33INSECURE Magazine - 33
INSECURE Magazine - 33Felipe Prado
 
E-commerce Security and Threats
E-commerce Security and ThreatsE-commerce Security and Threats
E-commerce Security and ThreatsBPalmer13
 
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber securityKeshab Nath
 
Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Hai Nguyen
 
The financial sector under siege from vicious banking malware @ReveeliumBlog
The financial sector under siege from vicious banking malware @ReveeliumBlogThe financial sector under siege from vicious banking malware @ReveeliumBlog
The financial sector under siege from vicious banking malware @ReveeliumBlogITrust - Cybersecurity as a Service
 
bitcoin technology report
bitcoin technology reportbitcoin technology report
bitcoin technology reportShivani Darshan
 
A Review Paper on Cyber-Security
A Review Paper on Cyber-SecurityA Review Paper on Cyber-Security
A Review Paper on Cyber-SecurityIRJET Journal
 

Similar to Cscu module 08 securing online transactions (20)

Worldcoin.pdf
Worldcoin.pdfWorldcoin.pdf
Worldcoin.pdf
 
Crypto phishing attack
Crypto phishing attackCrypto phishing attack
Crypto phishing attack
 
Top 5 Cryptocurrency Scam Risk Factors
Top 5 Cryptocurrency Scam Risk FactorsTop 5 Cryptocurrency Scam Risk Factors
Top 5 Cryptocurrency Scam Risk Factors
 
How to Secure Your Mac Based Law Practice
How to Secure Your Mac Based Law PracticeHow to Secure Your Mac Based Law Practice
How to Secure Your Mac Based Law Practice
 
How might cryptocurrencies impact
How might cryptocurrencies impactHow might cryptocurrencies impact
How might cryptocurrencies impact
 
9 3
9 39 3
9 3
 
Cyber security and current trends
Cyber security and current trendsCyber security and current trends
Cyber security and current trends
 
INSECURE Magazine - 33
INSECURE Magazine - 33INSECURE Magazine - 33
INSECURE Magazine - 33
 
Enhancing security features
Enhancing security featuresEnhancing security features
Enhancing security features
 
Compilation of phishing and keylogger attacks
Compilation of phishing and keylogger attacksCompilation of phishing and keylogger attacks
Compilation of phishing and keylogger attacks
 
E-commerce Security and Threats
E-commerce Security and ThreatsE-commerce Security and Threats
E-commerce Security and Threats
 
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber security
 
Atm theft
Atm theftAtm theft
Atm theft
 
Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462
 
The financial sector under siege from vicious banking malware @ReveeliumBlog
The financial sector under siege from vicious banking malware @ReveeliumBlogThe financial sector under siege from vicious banking malware @ReveeliumBlog
The financial sector under siege from vicious banking malware @ReveeliumBlog
 
Crypto currency1
Crypto currency1Crypto currency1
Crypto currency1
 
5 ways
5 ways5 ways
5 ways
 
bitcoin technology report
bitcoin technology reportbitcoin technology report
bitcoin technology report
 
A Review Paper on Cyber-Security
A Review Paper on Cyber-SecurityA Review Paper on Cyber-Security
A Review Paper on Cyber-Security
 
Antikeylogger
AntikeyloggerAntikeylogger
Antikeylogger
 

Recently uploaded

‏‏VIRUS - 123455555555555555555555555555555555555555
‏‏VIRUS -  123455555555555555555555555555555555555555‏‏VIRUS -  123455555555555555555555555555555555555555
‏‏VIRUS - 123455555555555555555555555555555555555555kikilily0909
 
Grafana in space: Monitoring Japan's SLIM moon lander in real time
Grafana in space: Monitoring Japan's SLIM moon lander  in real timeGrafana in space: Monitoring Japan's SLIM moon lander  in real time
Grafana in space: Monitoring Japan's SLIM moon lander in real timeSatoshi NAKAHIRA
 
RESPIRATORY ADAPTATIONS TO HYPOXIA IN HUMNAS.pptx
RESPIRATORY ADAPTATIONS TO HYPOXIA IN HUMNAS.pptxRESPIRATORY ADAPTATIONS TO HYPOXIA IN HUMNAS.pptx
RESPIRATORY ADAPTATIONS TO HYPOXIA IN HUMNAS.pptxFarihaAbdulRasheed
 
BUMI DAN ANTARIKSA PROJEK IPAS SMK KELAS X.pdf
BUMI DAN ANTARIKSA PROJEK IPAS SMK KELAS X.pdfBUMI DAN ANTARIKSA PROJEK IPAS SMK KELAS X.pdf
BUMI DAN ANTARIKSA PROJEK IPAS SMK KELAS X.pdfWildaNurAmalia2
 
Twin's paradox experiment is a meassurement of the extra dimensions.pptx
Twin's paradox experiment is a meassurement of the extra dimensions.pptxTwin's paradox experiment is a meassurement of the extra dimensions.pptx
Twin's paradox experiment is a meassurement of the extra dimensions.pptxEran Akiva Sinbar
 
STOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptx
STOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptxSTOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptx
STOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptxMurugaveni B
 
Call Us ≽ 9953322196 ≼ Call Girls In Lajpat Nagar (Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Lajpat Nagar (Delhi) |Call Us ≽ 9953322196 ≼ Call Girls In Lajpat Nagar (Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Lajpat Nagar (Delhi) |aasikanpl
 
Manassas R - Parkside Middle School 🌎🏫
Manassas R - Parkside Middle School 🌎🏫Manassas R - Parkside Middle School 🌎🏫
Manassas R - Parkside Middle School 🌎🏫qfactory1
 
Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...
Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...
Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...lizamodels9
 
Pests of jatropha_Bionomics_identification_Dr.UPR.pdf
Pests of jatropha_Bionomics_identification_Dr.UPR.pdfPests of jatropha_Bionomics_identification_Dr.UPR.pdf
Pests of jatropha_Bionomics_identification_Dr.UPR.pdfPirithiRaju
 
Analytical Profile of Coleus Forskohlii | Forskolin .pptx
Analytical Profile of Coleus Forskohlii | Forskolin .pptxAnalytical Profile of Coleus Forskohlii | Forskolin .pptx
Analytical Profile of Coleus Forskohlii | Forskolin .pptxSwapnil Therkar
 
BREEDING FOR RESISTANCE TO BIOTIC STRESS.pptx
BREEDING FOR RESISTANCE TO BIOTIC STRESS.pptxBREEDING FOR RESISTANCE TO BIOTIC STRESS.pptx
BREEDING FOR RESISTANCE TO BIOTIC STRESS.pptxPABOLU TEJASREE
 
Harmful and Useful Microorganisms Presentation
Harmful and Useful Microorganisms PresentationHarmful and Useful Microorganisms Presentation
Harmful and Useful Microorganisms Presentationtahreemzahra82
 
Call Girls In Nihal Vihar Delhi ❤️8860477959 Looking Escorts In 24/7 Delhi NCR
Call Girls In Nihal Vihar Delhi ❤️8860477959 Looking Escorts In 24/7 Delhi NCRCall Girls In Nihal Vihar Delhi ❤️8860477959 Looking Escorts In 24/7 Delhi NCR
Call Girls In Nihal Vihar Delhi ❤️8860477959 Looking Escorts In 24/7 Delhi NCRlizamodels9
 
Artificial Intelligence In Microbiology by Dr. Prince C P
Artificial Intelligence In Microbiology by Dr. Prince C PArtificial Intelligence In Microbiology by Dr. Prince C P
Artificial Intelligence In Microbiology by Dr. Prince C PPRINCE C P
 
Forest laws, Indian forest laws, why they are important
Forest laws, Indian forest laws, why they are importantForest laws, Indian forest laws, why they are important
Forest laws, Indian forest laws, why they are importantadityabhardwaj282
 
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Solution chemistry, Moral and Normal solutions
Solution chemistry, Moral and Normal solutionsSolution chemistry, Moral and Normal solutions
Solution chemistry, Moral and Normal solutionsHajira Mahmood
 
Transposable elements in prokaryotes.ppt
Transposable elements in prokaryotes.pptTransposable elements in prokaryotes.ppt
Transposable elements in prokaryotes.pptArshadWarsi13
 

Recently uploaded (20)

Hot Sexy call girls in Moti Nagar,🔝 9953056974 🔝 escort Service
Hot Sexy call girls in  Moti Nagar,🔝 9953056974 🔝 escort ServiceHot Sexy call girls in  Moti Nagar,🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Moti Nagar,🔝 9953056974 🔝 escort Service
 
‏‏VIRUS - 123455555555555555555555555555555555555555
‏‏VIRUS -  123455555555555555555555555555555555555555‏‏VIRUS -  123455555555555555555555555555555555555555
‏‏VIRUS - 123455555555555555555555555555555555555555
 
Grafana in space: Monitoring Japan's SLIM moon lander in real time
Grafana in space: Monitoring Japan's SLIM moon lander  in real timeGrafana in space: Monitoring Japan's SLIM moon lander  in real time
Grafana in space: Monitoring Japan's SLIM moon lander in real time
 
RESPIRATORY ADAPTATIONS TO HYPOXIA IN HUMNAS.pptx
RESPIRATORY ADAPTATIONS TO HYPOXIA IN HUMNAS.pptxRESPIRATORY ADAPTATIONS TO HYPOXIA IN HUMNAS.pptx
RESPIRATORY ADAPTATIONS TO HYPOXIA IN HUMNAS.pptx
 
BUMI DAN ANTARIKSA PROJEK IPAS SMK KELAS X.pdf
BUMI DAN ANTARIKSA PROJEK IPAS SMK KELAS X.pdfBUMI DAN ANTARIKSA PROJEK IPAS SMK KELAS X.pdf
BUMI DAN ANTARIKSA PROJEK IPAS SMK KELAS X.pdf
 
Twin's paradox experiment is a meassurement of the extra dimensions.pptx
Twin's paradox experiment is a meassurement of the extra dimensions.pptxTwin's paradox experiment is a meassurement of the extra dimensions.pptx
Twin's paradox experiment is a meassurement of the extra dimensions.pptx
 
STOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptx
STOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptxSTOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptx
STOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptx
 
Call Us ≽ 9953322196 ≼ Call Girls In Lajpat Nagar (Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Lajpat Nagar (Delhi) |Call Us ≽ 9953322196 ≼ Call Girls In Lajpat Nagar (Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Lajpat Nagar (Delhi) |
 
Manassas R - Parkside Middle School 🌎🏫
Manassas R - Parkside Middle School 🌎🏫Manassas R - Parkside Middle School 🌎🏫
Manassas R - Parkside Middle School 🌎🏫
 
Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...
Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...
Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...
 
Pests of jatropha_Bionomics_identification_Dr.UPR.pdf
Pests of jatropha_Bionomics_identification_Dr.UPR.pdfPests of jatropha_Bionomics_identification_Dr.UPR.pdf
Pests of jatropha_Bionomics_identification_Dr.UPR.pdf
 
Analytical Profile of Coleus Forskohlii | Forskolin .pptx
Analytical Profile of Coleus Forskohlii | Forskolin .pptxAnalytical Profile of Coleus Forskohlii | Forskolin .pptx
Analytical Profile of Coleus Forskohlii | Forskolin .pptx
 
BREEDING FOR RESISTANCE TO BIOTIC STRESS.pptx
BREEDING FOR RESISTANCE TO BIOTIC STRESS.pptxBREEDING FOR RESISTANCE TO BIOTIC STRESS.pptx
BREEDING FOR RESISTANCE TO BIOTIC STRESS.pptx
 
Harmful and Useful Microorganisms Presentation
Harmful and Useful Microorganisms PresentationHarmful and Useful Microorganisms Presentation
Harmful and Useful Microorganisms Presentation
 
Call Girls In Nihal Vihar Delhi ❤️8860477959 Looking Escorts In 24/7 Delhi NCR
Call Girls In Nihal Vihar Delhi ❤️8860477959 Looking Escorts In 24/7 Delhi NCRCall Girls In Nihal Vihar Delhi ❤️8860477959 Looking Escorts In 24/7 Delhi NCR
Call Girls In Nihal Vihar Delhi ❤️8860477959 Looking Escorts In 24/7 Delhi NCR
 
Artificial Intelligence In Microbiology by Dr. Prince C P
Artificial Intelligence In Microbiology by Dr. Prince C PArtificial Intelligence In Microbiology by Dr. Prince C P
Artificial Intelligence In Microbiology by Dr. Prince C P
 
Forest laws, Indian forest laws, why they are important
Forest laws, Indian forest laws, why they are importantForest laws, Indian forest laws, why they are important
Forest laws, Indian forest laws, why they are important
 
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
 
Solution chemistry, Moral and Normal solutions
Solution chemistry, Moral and Normal solutionsSolution chemistry, Moral and Normal solutions
Solution chemistry, Moral and Normal solutions
 
Transposable elements in prokaryotes.ppt
Transposable elements in prokaryotes.pptTransposable elements in prokaryotes.ppt
Transposable elements in prokaryotes.ppt
 

Cscu module 08 securing online transactions