Submit Search
Upload
Cscu module 08 securing online transactions
•
0 likes
•
113 views
Sejahtera Affif
Follow
semoga menambah wawasan serta bermanfaat untuk Anda
Read less
Read more
Science
Slideshow view
Report
Share
Slideshow view
Report
Share
1 of 29
Download now
Download to read offline
Recommended
Internet Banking Attacks (Karel Miko)
Internet Banking Attacks (Karel Miko)
DCIT, a.s.
INTERNET BANKING & SECURITY ANALYSIS
INTERNET BANKING & SECURITY ANALYSIS
RAHUL KUMAR
Zsun
Zsun
Hai Nguyen
H029044050
H029044050
researchinventy
Credit Card Duplication and Crime Prevention Using Biometrics
Credit Card Duplication and Crime Prevention Using Biometrics
IOSR Journals
Man in-the-browser tectia-whitepaper
Man in-the-browser tectia-whitepaper
Hai Nguyen
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
IJCSEA Journal
Preventing Internet Fraud By Preventing Identity Theft
Preventing Internet Fraud By Preventing Identity Theft
Diane M. Metcalf
Recommended
Internet Banking Attacks (Karel Miko)
Internet Banking Attacks (Karel Miko)
DCIT, a.s.
INTERNET BANKING & SECURITY ANALYSIS
INTERNET BANKING & SECURITY ANALYSIS
RAHUL KUMAR
Zsun
Zsun
Hai Nguyen
H029044050
H029044050
researchinventy
Credit Card Duplication and Crime Prevention Using Biometrics
Credit Card Duplication and Crime Prevention Using Biometrics
IOSR Journals
Man in-the-browser tectia-whitepaper
Man in-the-browser tectia-whitepaper
Hai Nguyen
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
COUNTER CHALLENGE AUTHENTICATION METHOD: A DEFEATING SOLUTION TO PHISHING ATT...
IJCSEA Journal
Preventing Internet Fraud By Preventing Identity Theft
Preventing Internet Fraud By Preventing Identity Theft
Diane M. Metcalf
Secure E-Banking Using Bioinformatics
Secure E-Banking Using Bioinformatics
ijtsrd
Protecting Data Privacy
Protecting Data Privacy
Directorate of Information Security | Ditjen Aptika
Ssp fraud risk vulnerablity in ebanking
Ssp fraud risk vulnerablity in ebanking
sathyananda prabhu
Fingereye: improvising security and optimizing ATM transaction time based on ...
Fingereye: improvising security and optimizing ATM transaction time based on ...
IJECEIAES
08 notable-security-incidents-in-the-finance-sector
08 notable-security-incidents-in-the-finance-sector
innov-acts-ltd
Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018
Ronak Jain
Cybercriminals target online banking
Cybercriminals target online banking
Scientia Groups
Cyber Security
Cyber Security
Deepak Shrivastava
Secure Online Banking
Secure Online Banking
VASCO Data Security
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
Syeful Islam
Credit card hackers are here
Credit card hackers are here
Abhay pal
cybercrime survival guide
cybercrime survival guide
Gary Gray, MCSE
Overcome Security Threats Affecting Mobile Financial Solutions 2020
Overcome Security Threats Affecting Mobile Financial Solutions 2020
Fusion Informatics
micro payments using coin
micro payments using coin
Naga Dinesh
A Review of Information Security from Consumer’s Perspective Especially in On...
A Review of Information Security from Consumer’s Perspective Especially in On...
Dr. Amarjeet Singh
An overview study on cyber crimes in internet
An overview study on cyber crimes in internet
Alexander Decker
Cyber fraud in banks
Cyber fraud in banks
Network Intelligence India
Mobile security issues & frauds in India
Mobile security issues & frauds in India
Yogesh Lolge
Affif soal lct sd
Affif soal lct sd
Sejahtera Affif
Affif cara membuat form login pada php
Affif cara membuat form login pada php
Sejahtera Affif
S jkr 0704960_chapter1
S jkr 0704960_chapter1
Sejahtera Affif
Affif bab2
Affif bab2
Sejahtera Affif
More Related Content
What's hot
Secure E-Banking Using Bioinformatics
Secure E-Banking Using Bioinformatics
ijtsrd
Protecting Data Privacy
Protecting Data Privacy
Directorate of Information Security | Ditjen Aptika
Ssp fraud risk vulnerablity in ebanking
Ssp fraud risk vulnerablity in ebanking
sathyananda prabhu
Fingereye: improvising security and optimizing ATM transaction time based on ...
Fingereye: improvising security and optimizing ATM transaction time based on ...
IJECEIAES
08 notable-security-incidents-in-the-finance-sector
08 notable-security-incidents-in-the-finance-sector
innov-acts-ltd
Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018
Ronak Jain
Cybercriminals target online banking
Cybercriminals target online banking
Scientia Groups
Cyber Security
Cyber Security
Deepak Shrivastava
Secure Online Banking
Secure Online Banking
VASCO Data Security
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
Syeful Islam
Credit card hackers are here
Credit card hackers are here
Abhay pal
cybercrime survival guide
cybercrime survival guide
Gary Gray, MCSE
Overcome Security Threats Affecting Mobile Financial Solutions 2020
Overcome Security Threats Affecting Mobile Financial Solutions 2020
Fusion Informatics
micro payments using coin
micro payments using coin
Naga Dinesh
A Review of Information Security from Consumer’s Perspective Especially in On...
A Review of Information Security from Consumer’s Perspective Especially in On...
Dr. Amarjeet Singh
An overview study on cyber crimes in internet
An overview study on cyber crimes in internet
Alexander Decker
Cyber fraud in banks
Cyber fraud in banks
Network Intelligence India
Mobile security issues & frauds in India
Mobile security issues & frauds in India
Yogesh Lolge
What's hot
(18)
Secure E-Banking Using Bioinformatics
Secure E-Banking Using Bioinformatics
Protecting Data Privacy
Protecting Data Privacy
Ssp fraud risk vulnerablity in ebanking
Ssp fraud risk vulnerablity in ebanking
Fingereye: improvising security and optimizing ATM transaction time based on ...
Fingereye: improvising security and optimizing ATM transaction time based on ...
08 notable-security-incidents-in-the-finance-sector
08 notable-security-incidents-in-the-finance-sector
Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018
Cybercriminals target online banking
Cybercriminals target online banking
Cyber Security
Cyber Security
Secure Online Banking
Secure Online Banking
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
Credit card hackers are here
Credit card hackers are here
cybercrime survival guide
cybercrime survival guide
Overcome Security Threats Affecting Mobile Financial Solutions 2020
Overcome Security Threats Affecting Mobile Financial Solutions 2020
micro payments using coin
micro payments using coin
A Review of Information Security from Consumer’s Perspective Especially in On...
A Review of Information Security from Consumer’s Perspective Especially in On...
An overview study on cyber crimes in internet
An overview study on cyber crimes in internet
Cyber fraud in banks
Cyber fraud in banks
Mobile security issues & frauds in India
Mobile security issues & frauds in India
Viewers also liked
Affif soal lct sd
Affif soal lct sd
Sejahtera Affif
Affif cara membuat form login pada php
Affif cara membuat form login pada php
Sejahtera Affif
S jkr 0704960_chapter1
S jkr 0704960_chapter1
Sejahtera Affif
Affif bab2
Affif bab2
Sejahtera Affif
Pp4 2014-penyelenggaraan-pendidikan-tinggi-pengelolaan-perguruan-tinggi
Pp4 2014-penyelenggaraan-pendidikan-tinggi-pengelolaan-perguruan-tinggi
Sejahtera Affif
Ap m2 ak sumber dana
Ap m2 ak sumber dana
Sejahtera Affif
09 e02819
09 e02819
Sejahtera Affif
Test presentationwithsound
Test presentationwithsound
ayshahsheikh
Helping dad
Helping dad
Clarivon
Is it time_to_own_your_network2
Is it time_to_own_your_network2
Clarivon
Rpp bhs-arab-xii-smt-2
Rpp bhs-arab-xii-smt-2
Sejahtera Affif
Affif bahasa arab
Affif bahasa arab
Sejahtera Affif
Cara ternak belut di rumah
Cara ternak belut di rumah
Sejahtera Affif
B7 flexi budget
B7 flexi budget
Sejahtera Affif
Cscu module 01 foundations of security
Cscu module 01 foundations of security
Sejahtera Affif
Viewers also liked
(15)
Affif soal lct sd
Affif soal lct sd
Affif cara membuat form login pada php
Affif cara membuat form login pada php
S jkr 0704960_chapter1
S jkr 0704960_chapter1
Affif bab2
Affif bab2
Pp4 2014-penyelenggaraan-pendidikan-tinggi-pengelolaan-perguruan-tinggi
Pp4 2014-penyelenggaraan-pendidikan-tinggi-pengelolaan-perguruan-tinggi
Ap m2 ak sumber dana
Ap m2 ak sumber dana
09 e02819
09 e02819
Test presentationwithsound
Test presentationwithsound
Helping dad
Helping dad
Is it time_to_own_your_network2
Is it time_to_own_your_network2
Rpp bhs-arab-xii-smt-2
Rpp bhs-arab-xii-smt-2
Affif bahasa arab
Affif bahasa arab
Cara ternak belut di rumah
Cara ternak belut di rumah
B7 flexi budget
B7 flexi budget
Cscu module 01 foundations of security
Cscu module 01 foundations of security
Similar to Cscu module 08 securing online transactions
Worldcoin.pdf
Worldcoin.pdf
ka81112359
Crypto phishing attack
Crypto phishing attack
izoologic
Top 5 Cryptocurrency Scam Risk Factors
Top 5 Cryptocurrency Scam Risk Factors
Maxim Kozlovsky
How to Secure Your Mac Based Law Practice
How to Secure Your Mac Based Law Practice
Rocket Matter, LLC
How might cryptocurrencies impact
How might cryptocurrencies impact
OliviaJune1
9 3
9 3
Hai Nguyen
Cyber security and current trends
Cyber security and current trends
Shreedeep Rayamajhi
INSECURE Magazine - 33
INSECURE Magazine - 33
Felipe Prado
Enhancing security features
Enhancing security features
Nana Kwame(Emeritus) Gyamfi
Compilation of phishing and keylogger attacks
Compilation of phishing and keylogger attacks
ArrayShield Technologies Private Limited
E-commerce Security and Threats
E-commerce Security and Threats
BPalmer13
Cyber crime and cyber security
Cyber crime and cyber security
Keshab Nath
Atm theft
Atm theft
Apurva Sharma
Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462
Hai Nguyen
The financial sector under siege from vicious banking malware @ReveeliumBlog
The financial sector under siege from vicious banking malware @ReveeliumBlog
ITrust - Cybersecurity as a Service
Crypto currency1
Crypto currency1
Ankit Rastogi
5 ways
5 ways
OliviaJune1
bitcoin technology report
bitcoin technology report
Shivani Darshan
A Review Paper on Cyber-Security
A Review Paper on Cyber-Security
IRJET Journal
Antikeylogger
Antikeylogger
Kartikey Mishra
Similar to Cscu module 08 securing online transactions
(20)
Worldcoin.pdf
Worldcoin.pdf
Crypto phishing attack
Crypto phishing attack
Top 5 Cryptocurrency Scam Risk Factors
Top 5 Cryptocurrency Scam Risk Factors
How to Secure Your Mac Based Law Practice
How to Secure Your Mac Based Law Practice
How might cryptocurrencies impact
How might cryptocurrencies impact
9 3
9 3
Cyber security and current trends
Cyber security and current trends
INSECURE Magazine - 33
INSECURE Magazine - 33
Enhancing security features
Enhancing security features
Compilation of phishing and keylogger attacks
Compilation of phishing and keylogger attacks
E-commerce Security and Threats
E-commerce Security and Threats
Cyber crime and cyber security
Cyber crime and cyber security
Atm theft
Atm theft
Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462
The financial sector under siege from vicious banking malware @ReveeliumBlog
The financial sector under siege from vicious banking malware @ReveeliumBlog
Crypto currency1
Crypto currency1
5 ways
5 ways
bitcoin technology report
bitcoin technology report
A Review Paper on Cyber-Security
A Review Paper on Cyber-Security
Antikeylogger
Antikeylogger
Recently uploaded
Hot Sexy call girls in Moti Nagar,🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Moti Nagar,🔝 9953056974 🔝 escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
VIRUS - 123455555555555555555555555555555555555555
VIRUS - 123455555555555555555555555555555555555555
kikilily0909
Grafana in space: Monitoring Japan's SLIM moon lander in real time
Grafana in space: Monitoring Japan's SLIM moon lander in real time
Satoshi NAKAHIRA
RESPIRATORY ADAPTATIONS TO HYPOXIA IN HUMNAS.pptx
RESPIRATORY ADAPTATIONS TO HYPOXIA IN HUMNAS.pptx
FarihaAbdulRasheed
BUMI DAN ANTARIKSA PROJEK IPAS SMK KELAS X.pdf
BUMI DAN ANTARIKSA PROJEK IPAS SMK KELAS X.pdf
WildaNurAmalia2
Twin's paradox experiment is a meassurement of the extra dimensions.pptx
Twin's paradox experiment is a meassurement of the extra dimensions.pptx
Eran Akiva Sinbar
STOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptx
STOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptx
Murugaveni B
Call Us ≽ 9953322196 ≼ Call Girls In Lajpat Nagar (Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Lajpat Nagar (Delhi) |
aasikanpl
Manassas R - Parkside Middle School 🌎🏫
Manassas R - Parkside Middle School 🌎🏫
qfactory1
Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...
Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...
lizamodels9
Pests of jatropha_Bionomics_identification_Dr.UPR.pdf
Pests of jatropha_Bionomics_identification_Dr.UPR.pdf
PirithiRaju
Analytical Profile of Coleus Forskohlii | Forskolin .pptx
Analytical Profile of Coleus Forskohlii | Forskolin .pptx
Swapnil Therkar
BREEDING FOR RESISTANCE TO BIOTIC STRESS.pptx
BREEDING FOR RESISTANCE TO BIOTIC STRESS.pptx
PABOLU TEJASREE
Harmful and Useful Microorganisms Presentation
Harmful and Useful Microorganisms Presentation
tahreemzahra82
Call Girls In Nihal Vihar Delhi ❤️8860477959 Looking Escorts In 24/7 Delhi NCR
Call Girls In Nihal Vihar Delhi ❤️8860477959 Looking Escorts In 24/7 Delhi NCR
lizamodels9
Artificial Intelligence In Microbiology by Dr. Prince C P
Artificial Intelligence In Microbiology by Dr. Prince C P
PRINCE C P
Forest laws, Indian forest laws, why they are important
Forest laws, Indian forest laws, why they are important
adityabhardwaj282
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
soniya singh
Solution chemistry, Moral and Normal solutions
Solution chemistry, Moral and Normal solutions
Hajira Mahmood
Transposable elements in prokaryotes.ppt
Transposable elements in prokaryotes.ppt
ArshadWarsi13
Recently uploaded
(20)
Hot Sexy call girls in Moti Nagar,🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Moti Nagar,🔝 9953056974 🔝 escort Service
VIRUS - 123455555555555555555555555555555555555555
VIRUS - 123455555555555555555555555555555555555555
Grafana in space: Monitoring Japan's SLIM moon lander in real time
Grafana in space: Monitoring Japan's SLIM moon lander in real time
RESPIRATORY ADAPTATIONS TO HYPOXIA IN HUMNAS.pptx
RESPIRATORY ADAPTATIONS TO HYPOXIA IN HUMNAS.pptx
BUMI DAN ANTARIKSA PROJEK IPAS SMK KELAS X.pdf
BUMI DAN ANTARIKSA PROJEK IPAS SMK KELAS X.pdf
Twin's paradox experiment is a meassurement of the extra dimensions.pptx
Twin's paradox experiment is a meassurement of the extra dimensions.pptx
STOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptx
STOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptx
Call Us ≽ 9953322196 ≼ Call Girls In Lajpat Nagar (Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Lajpat Nagar (Delhi) |
Manassas R - Parkside Middle School 🌎🏫
Manassas R - Parkside Middle School 🌎🏫
Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...
Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...
Pests of jatropha_Bionomics_identification_Dr.UPR.pdf
Pests of jatropha_Bionomics_identification_Dr.UPR.pdf
Analytical Profile of Coleus Forskohlii | Forskolin .pptx
Analytical Profile of Coleus Forskohlii | Forskolin .pptx
BREEDING FOR RESISTANCE TO BIOTIC STRESS.pptx
BREEDING FOR RESISTANCE TO BIOTIC STRESS.pptx
Harmful and Useful Microorganisms Presentation
Harmful and Useful Microorganisms Presentation
Call Girls In Nihal Vihar Delhi ❤️8860477959 Looking Escorts In 24/7 Delhi NCR
Call Girls In Nihal Vihar Delhi ❤️8860477959 Looking Escorts In 24/7 Delhi NCR
Artificial Intelligence In Microbiology by Dr. Prince C P
Artificial Intelligence In Microbiology by Dr. Prince C P
Forest laws, Indian forest laws, why they are important
Forest laws, Indian forest laws, why they are important
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Solution chemistry, Moral and Normal solutions
Solution chemistry, Moral and Normal solutions
Transposable elements in prokaryotes.ppt
Transposable elements in prokaryotes.ppt
Cscu module 08 securing online transactions
1.
1 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 1 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Securing
Online Transactions Simplifying Security. Module 8
2.
2 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 2 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Hide your bank account details, as two new pieces of banking malware are making the rounds: the OddJob Trojan, which keeps banking sessions open after users log out, as well as a variant of Zeus Mitmo that targets Symbian and BlackBerry smartphones. On Tuesday, browser security firm Trusteer warned that the OddJob malware could keep banking Web site sessions open even after users thought they'd logged off. "By tapping the session ID token ‐‐
which banks use to identify a user's online banking session ‐‐ the fraudsters can electronically impersonate the legitimate user and complete a range of banking operations," according to a blog post from Amit Klein, CTO of security firm Trusteer. Trusteer discovered OddJob several months ago, but withheld disclosing details until law enforcement agencies concluded related investigations. It said that the malware has targeted customers in the United States, Poland, and Denmark, and appeared to be the work of criminals based in eastern Europe. OddJob, Zeus Mitmo Trojans Target Financial Data http://www.informationweek.com
3.
3 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 3 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Module
Objectives Online Shopping How Online Shopping Works? Online Banking Securing Online Transactions Choosing a Secure Online Payment Service SSL and the Padlock Symbol Identifying a Trustworthy Website Identifying an Untrustworthy Website McAfee’s SiteAdvisor Online Transactions Security Checklist
4.
4 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 4 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Online Shopping Online Banking Securing Online Transactions SSL and the Padlock Symbol Identifying a Trustworthy Website Choosing a Secure Online Payment Service Identifying an Untrustworthy Website Online Transactions Security Checklist How Online Shopping Works? Module
Flow
5.
5 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 5 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Online
Shopping Online shopping is the process of buying goods and services directly from the seller over the Internet The benefits of online shopping are: Usually available 24 hours a day Describe products with text, photos, and multimedia files Quickly seek out deals for items/services with several vendors Purchase a product without actually travelling to the store using a credit/debit card The ease of shopping and facility to compare the products and prices online has made online shopping an attractive option for consumers
6.
6 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 6 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. How
Online Shopping Works? 1 Users visit the e‐commerce site where they wish to buy goods/products from Users browse for the required product through the online catalogue2
7.
7 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 7 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. How
Online ShoppingWorks? They add the product/service to the shopping cart The shopping cart shows: The products being purchased The number of units of the product The price of the product, taxes (inclusive/exclusive) Shipping costs, etc. 3 They fill in the online order form with: Shipping information Shipping address Consumer name Billing address and its details Credit card details Any other information the merchant requires 4
8.
8 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 8 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 5 The user’s credit card information is encrypted
and sent to the merchant The user receives an on‐screen confirmation or/and a confirmation e‐mail How Online ShoppingWorks?
9.
9 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 9 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Online
Banking Online banking is the method of making bank transactions or paying bills over the Internet It allows the user to make deposits, withdrawals, and pay bills with a single click of the mouse Advantages Disadvantages Online banking allows you to perform transactions, pay bills, and check balances 24x7 Online banking is fast, efficient, and effective Online banking sites can take a while to start up and can be tricky for the beginner The customer may have a doubt that his/her transaction was successful
10.
10 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 10 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Online Shopping Online Banking Securing Online Transactions SSL and the Padlock Symbol Identifying a Trustworthy Website Choosing a Secure Online Payment Service Identifying an Untrustworthy Website How Online Shopping Works? Module
Flow Online Transactions Security Checklist
11.
11 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 11 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Credit
Card Payments Credit cards are still the preferred means for online purchases because of ease of use and the ability to pay the bills at a later date Credit cards are issued by a credit card issuing bank or credit union after verifying the user’s credentials The card user agrees to pay the card issuer the amount used for making the purchase The cardholder indicates consent to pay by signing a receipt with a record of the card details and indicating the amount to be paid or by entering a personal identification number (PIN) or Card Verification Value (CVV or CVV2)
12.
12 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 12 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Types
of Credit Card Frauds Credit card mail order fraud Skimming/counterfeit credit card Chargeback fraud Lost and stolen card fraud Card‐not‐present (CNP) fraud Cash machine fraud Shoulder‐surfing Identity theft The offender gathers information about a card holder and sends a request to the bank for a new or replacement card Electronically copying authentic data on a card's magnetic stripe to another card without the genuine card holder’s knowledge Genuine credit card holder uses the card to purchase goods or services, and when bank statements are issued, they call the bank and claim that they never authorized the transaction Card is physically stolen or lost and then used by the offender An offender obtains credit card details and then purchases goods and services over the Internet or by telephone, fax, or email The offender tampers with the cash machine and then tricks the user into entering the pin in their presence The offender oversees the user entering PIN at the machine The offender uses fraudulently obtained personal information of a credit card holder to access credit card accounts Credit card frauds refer to the acts of making purchases using someone else's credit card information
13.
13 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 13 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Guidelines
for Ensuring Credit Card Safety Before You Shop While You Shop 1. Check if the site is of a known business entity (e.g., GAP) 2. Check for a third‐party seal of trust (e.g., VeriSign, eTrust) 3. Check reviews of other shoppers (e.g., www.epinions.com) 4. Review the privacy statement 5. Use only one credit card for all your online purchases 6. Keep records of your online transactions 7. Do not share your credit card information with anyone 1. Disclose only required personal information. Be discreet. 2. Ensure that you are using a secure computer and using a secure site 3. Adopt a strong password 4. Use one‐click shopping cautiously 5. Check for a confirmation email after an online purchase/transaction/payment
14.
14 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 14 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Stored Value Cards Stored‐value cards are plastic cards with a monetary value
encoded in the magnetic strip They are an effective replacement for cash and can be used for low‐value retail purchases They are not associated with the name of the user, hence they do not reveal any information about the customer Even if lost, the consumer tends to lose only the value that is still unused Smart Cards Smart cards are the same size as a credit card They have a microprocessor in them, which differentiates them from a credit card (which has a magnetic strip) The data on the magnetic stripe can be read, deleted, or even changed Smart cards can be used with smart‐ card reader attached to a personal computer to authenticate a user Online transactions can be secured by using the alternatives to credit cards Securing Online Transactions
15.
15 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 15 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Digital Cash
E‐Wallets Securing Online Transactions Digital cash is a method of purchasing cash credits in small amounts Cash credits can be stored in your computer and spent when making electronic purchases on the Internet The consumer can buy the credits from a financial institution Digital cash is associated with a serial number that can be used for online transactions Sending the serial number does not give out any personal information E‐Wallet is a software program used for online transactions Once the software is installed, personal information can be filled out in the E‐wallet and stored When the user orders something, the order form can be automatically completed using the wallet This helps prevent the theft of personal information By default, most of the electronic wallet software requests users to enter a password before completing the form
16.
16 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 16 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Securing
Online Transactions Online Payment Services Third‐party payment services can be used to make online payments to avoid giving away credit card information to the merchant directly When using an online payment service, the user should transfer money to an account associated with the online payment service All the purchases and transactions can be carried out through this account This way the customer does not have to reveal credit card information or other personal details to the merchants
17.
17 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 17 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 1 2 3 4 Choosing
a Secure Online Payment Service Make sure that the payment service is legitimate/registered Check the reviews of these services at websites such as Epinions.com or BizRate.com Look at the payment service's website for seals of approval from TRUSTe, VeriSign, or Better Business Bureau Online (BBBOnline) Ensure that the website uses encryption technology to help protect your information
18.
18 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 18 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Online
Payment Services https://www.paypal.com http://www.amazon.com http://www.worldpay.com http://www.2checkout.com
19.
19 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 19 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. SSL
and the Padlock Symbol Secure Sockets Layer (SSL) is the standard security technology for creating an encrypted link between a web server and a browser This link ensures that all information transmitted between the web server and the browser is secured The Padlock symbol is an indicator that the session is protected by the SSL encryption Padlock Symbol
20.
20 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 20 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. What
Does the SSL Show? If the browser encounters an untrustworthy certificate authority, a site warning is displayed Details of the certification authority that issued the certificate Expiration date of the certificate Name and address of the company Domain name of the company
21.
21 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 21 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Online Shopping Online Banking Securing Online Transactions SSL and the Padlock Symbol Identifying a Trustworthy Website Choosing a Secure Online Payment Service Identifying an Untrustworthy Website How Online Shopping Works? Module
Flow Online Transactions Security Checklist
22.
22 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 22 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Identifying
a TrustworthyWebsite A secure site usually begins with the prefix https The Padlock symbol appears either at the bottom right in the browser or beside the URL The user can click the lock to view the identity of the website The certificate used to encrypt the connection also contains information about the identity of the website owner or organization https Padlock symbol
23.
23 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 23 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Identifying
a TrustworthyWebsite Clicking the Padlock symbol reveals the website information Click View Certificate to view the authenticity of the certificate Certification authority
24.
24 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 24 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Identifying
an Untrustworthy Website Untrustworthy websites are generally referred to the user through an email message from someone unknown The website presents objectionable content, such as pornography or illegal materials The website offers schemes that seem too good to be true, indicating a possible scam When the user is asked for a credit card to verify his/her identity or for personal information when it's not necessary When the user is asked for credit card information without any proof that the transaction has been secured
25.
25 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 25 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. McAfee’s
SiteAdvisor McAfee’s SiteAdvisor software is a free browser plug‐in that gives safety advice about websites before the user clicks a risky site Once the software is installed, small site‐rating icons are added to the user’s search results These site ratings are based on tests conducted by McAfee using an array of computers that look for various threats The icons alert the user of the potential risky sites and help him/her find safer alternatives http://www.siteadvisor.com
26.
26 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 26 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Rating
Icons McAfee SECURE: Tested daily for hacker vulnerabilities WARNING: Serious risk issues SAFE: Very low or no risk issues CAUTION: Minor risk issues UNKNOWN: Not yet rated. Use caution
27.
27 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 27 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Module
Summary The ease of shopping and comparing the products and prices online has made online shopping an attractive option for consumers Online banking allows the user to make deposits, withdrawals, and pay bills with a single click of the mouse The consumer has to take all the necessary steps to ensure that the credit card information is not compromised Using third‐party payment services avoids giving your credit card information to the merchant directly The Padlock symbol is an indicator that the session is protected by the SSL encryption
28.
28 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 28 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Ensure that you have the latest web browser installed
in the system Ensure that you are connected to a secured network when using a wireless network Regularly scan your system for viruses, worms, Trojans, spyware, key loggers and other malware using updated anti‐virus Regularly update your operating system and other installed applications Use strong passwords for all online transactions and keep them changing at regular interval Use Virtual Keyboard to enter sensitive information Do not perform online transactions from public systems Always completely log off after online transactions Online Transactions Security Checklist
29.
29 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. 29 Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited. Online
Transactions Security Checklist Use browser filters that warn about reported phishing sites and block access to the addresses Register for the bank's mobile alert service to get alerts whenever there is a significant transaction Protect yourself from identity theft Never respond to unsolicited email offers or requests for information Always check the address bar for the correct URL Always check for the website certificate, SSL padlocks, and HTTPs
Download now