SlideShare a Scribd company logo
1 of 49
E-commerce
Kenneth C. Laudon
Carol Guercio Traver
business. technology. society.
Fifth Edition
Copyright
Copyright ©
© 2009
2009 Pearson
Pearson Education,
Education, Inc.
Inc. Publishing as Prentice Hall Slide 5-2
Chapter 5
Online Security and Payment
Systems
The E-commerce Security Environment:
The Scope of the Problem
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-3
■ Overall size of cybercrime unclear; amount of
losses significant but stable; individuals face new
risks of fraud that may involve substantial
uninsured losses
■ Symantec: Cybercrime on the rise from 2007
■ IC3: Processed 200,000+ Internet crime complaints
■ 2007 CSI survey: 46% respondent firms detected
security breach in last year
■ Underground economy marketplace that offers sales
of stolen information growing
Categories of Internet Crime Complaints
Reported to IC3
Figure 5.1, Page 262
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-4
Types of
Attacks
Against
Computer
Systems
Figure 5.3, Page 264
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-5
What Is Good E-commerce Security?
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-6
■ To achieve highest degree of security
■ New technologies
■ Organizational policies and procedures
■ Industry standards and government laws
The E-commerce Security Environment
Figure 5.4, Page 267
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-7
Customer and Merchant Perspectives on the
Different Dimensions of E-commerce Security
Table 5.2, Page 268
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-8
The Tension Between Security and
Other Values
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-9
■ Security vs. ease of use:
■ The more security measures added, the more
difficult a site is to use, and the slower it becomes
Security Threats in the E-commerce
Environment
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-10
■ Three key points of vulnerability:
■ Client
■ Server
■ Communications pipeline
A Typical
E-commerce
Transaction
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-11
Figure 5.5, Page 270
SOURCE: Boncella, 2000.
Most Common Security Threats in
the E-commerce Environment
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-12
■ Malicious code (viruses, worms, Trojans)
■ Unwanted programs (spyware, browser parasites)
■ Phishing/identity theft
■ Hacking and cybervandalism
■ Credit card fraud/theft
■ Spoofing (pharming)/spam (junk) Web sites
■ DoS and DDoS attacks
■ Sniffing
■ Insider attacks
■ Poorly designed server and client software
Malicious Code
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-13
■ Viruses:
■ Replicate and spread to other files; most deliver
“payload” (destructive or benign)
■ Macro viruses, file-infecting viruses, script viruses
■ Worms:
■ Designed to spread from computer to computer
■ Trojan horse:
■ Appears benign, but does something other than
expected
■ Bots:
■ Covertly installed on computer; respond to external
commands sent by attacker
Unwanted Programs
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-14
■ Installed without user’s informed consent
■ Browser parasites
■ Can monitor and change settings of a user’s browser
■ Adware
■ Calls for unwanted pop-up ads
■ Spyware
■ Can be used to obtain information, such as a user’s,
e-mail, IMs, etc.
Phishing and Identity Theft
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-15
■ Any deceptive, online attempt by a third party
to obtain confidential information for financial
gain, e.g.
■ E-mail scam letter – most popular phishing attack
■ Spoofing legitimate financial institution’s Web site
■ Use information to commit fraudulent acts
(access checking accounts), steal identity
■ One of fastest growing forms of e-commerce
crime
Hacking and Cybervandalism
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-16
■ Hacker:
■ Individual who intends to gain unauthorized access to
computer systems
■ Cracker:
■ Hacker with criminal intent
■ Cybervandalism:
■ Intentionally disrupting, defacing, destroying Web site
Credit Card Fraud
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-17
■ Fear of stolen credit card information deters
online purchases
■ Hackers target credit card files and other
customer information files on merchant servers;
use stolen data to establish credit under false
identity
■ Online companies at higher risk than offline
■ In development: New identity verification
mechanisms
Spoofing (Pharming) and Spam (Junk)
Web Sites
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-18
■ Spoofing (Pharming)
■ Misrepresenting oneself by using fake e-mail
addresses or masquerading as someone else
■ Threatens integrity of site; authenticity
■ Spam (Junk) Web sites
■ Use domain names similar to legitimate one, redirect
traffic to spammer-redirection domains
DoS and DDoS Attacks
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-19
■ Denial of service (DoS) attack
■ Hackers flood Web site with useless traffic to
inundate and overwhelm network
■ Distributed denial of service (DDoS) attack
■ Hackers use multiple computers to attack target
network from numerous launch points
Other Security Threats
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-20
■ Poorly designed server and client software
■ Increase in complexity of software programs has
contributed to increase in vulnerabilities that hackers
can exploit
Technology Solutions
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-21
■ Protecting Internet communications
(encryption)
■ Securing channels of communication (SSL,
S-HTTP, VPNs)
■ Protecting networks (firewalls)
■ Protecting servers and clients
Tools
Available to
Achieve Site
Security
Figure 5.9, Page 284
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-22
Protecting Internet Communications:
Encryption
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-23
■ Encryption
■ Transforming plain text, data into cipher text that can’t
be read by anyone other than sender and receiver
■ Secures stored information and information
transmission
■ Provides:
■ Message integrity
■ Nonrepudiation
■ Authentication
■ Confidentiality
Symmetric Key Encryption
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-24
■ Also known as secret key encryption
■ Both sender and receiver use same digital
key to encrypt and decrypt message
■ Requires different set of keys for each
transaction
■ Advanced Encryption Standard (AES)
■ Most widely used symmetric key encryption
■ Uses 128-, 192-, and 256-bit encryption keys
■ Other standards use keys with up to 2,048
bits
Public Key Encryption
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-25
■ Uses two mathematically related digital keys
■ Public key (widely disseminated)
■ Private key (kept secret by owner)
■ Both keys used to encrypt and decrypt message
■ Once key used to encrypt message, same key
cannot be used to decrypt message
■ Sender uses recipient’s public key to encrypt
message; recipient uses his/her private key to
decrypt it
Public Key Cryptography – A Simple Case
Figure 5.10, Page 283
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-26
Public Key Cryptography with Digital Signatures
Figure 5.11, Page 288
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-27
Securing Channels of Communication
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-28
■ Secure Sockets Layer (SSL):
■ Establishes a secure, negotiated client-server
session in which URL of requested document,
along with contents, is encrypted
■ S-HTTP:
■ Provides a secure message-oriented
communications protocol designed for use in
conjunction with HTTP
■ Virtual Private Network (VPN):
■ Allows remote users to securely access internal
network via the Internet, using Point-to-Point
Tunneling Protocol (PPTP)
Protecting Networks
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-29
■ Firewall
■ Hardware or software that filters packets
■ Prevents some packets from entering the network
based on security policy
■ Two main methods:
■ Packet filters
■ Application gateways
■ Proxy servers (proxies)
■ Software servers that handle all communications
originating from or being sent to the Internet
Protecting Servers and Clients
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-30
■ Operating system controls:
■ Authentication and access control mechanisms
■ Anti-virus software:
■ Easiest and least expensive way to prevent
threats to system integrity
■ Requires daily updates
Management Policies, Business
Procedures, and Public Laws
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-31
■ U.S. firms and organizations spend 10% of IT
budget on security hardware, software, services
■ Attacks against organizational computers down
■ Attacks against Web sites, individual records up
■ Technology a foundation of security
■ Effective management policies also required
A Security Plan: Management Policies
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-32
■ Risk assessment
■ Security policy
■ Implementation plan
■ Security organization
■ Access controls
■ Authentication procedures
■ Biometrics
■ Authorization policies
■ Authorization management systems
■ Security audit
Developing an E-commerce Security Plan
Figure 5.16, Page 300
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-33
The Role of Laws and Public Policy
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-34
■ New laws have given authorities tools and
mechanisms for identifying, tracing, prosecuting
cybercriminals
■ National Information Infrastructure Protection Act of
1996: created National Infrastructure Protection Center
■ USA Patriot Act
■ Homeland Security Act
■ CERT Coordination Center – private group
■ Government policies and controls on encryption
software
■ OECD guidelines
Types of Payment Systems
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-35
■ Cash
■ Checking Transfer
■ Credit Card
■ Stored Value
■ Accumulating Balance
Cash
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-36
■ Most common form of payment in terms of
number of transactions
■ Instantly convertible into other forms of value
without intermediation
■ Portable, requires no authentication
■ “Free” (no transaction fee),
■ Limitations: easily stolen, limited to smaller
transaction, does not provide any float
Checking Transfer
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-37
■ Funds transferred directly via signed draft/check from a
consumer’s checking account to merchant/ other
individual
■ Most common form of payment in terms of amount spent
■ Can be used for small and large transactions
■ requires third-party intervention (banks)
■ Introduces security risks for merchants, so authentication
typically required
Credit Card
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-38
■ Represents account that extends credit to
consumers; allows consumers to make
payments to multiple vendors at one time
■ Issuing banks:
■ Issue cards and process transactions
■ Processing centers (clearinghouses):
■ Handle verification of accounts and balances
Stored Value
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-39
■ Accounts created by depositing funds into an
account and from which funds are paid out or
withdrawn as needed
■ Examples: Debit cards, gift certificates, prepaid
cards, smart cards
■ Peer-to-peer payment systems
■ e.g. PayPal
Accumulating Balance
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-40
■ Accounts that accumulate expenditures and
to which consumers make period payments
■ Examples: Utility, phone, American Express
accounts
■ Evaluating payment systems:
■ Different stakeholders (consumers, merchants,
financial intermediaries, government regulators)
have different priorities in payment system
dimensions (refutability, risk, anonymity, etc.)
E-commerce Payment Systems
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-41
■ Credit cards are dominant form of online
payment, accounting for around 60% of online
payments in 2008
■ Other e-commerce payment systems:
■ Digital wallets
■ Digital cash
■ Online stored value payment systems
■ Digital accumulating balance systems
■ Digital checking
How an Online Credit Transaction Works
Figure 5.18, Page 312
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-42
Limitations of Online Credit Card
Payment Systems
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-43
■ Security:
■ Neither merchant nor consumer can be fully
authenticated
■ Cost:
■ For merchants, around 3.5% of purchase price
plus transaction fee of 20 – 30 cents per
transaction
■ Social equity:
■ Many people do not have access to credit cards
Digital Wallets
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-44
■ Seeks to emulate the functionality of
traditional wallet
■ Most important functions:
■ Authenticate consumer through use of digital
certificates or other encryption methods
■ Store and transfer value
■ Secure payment process from consumer to
merchant
Online Stored Value Systems
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-45
■ Permit consumers to make instant, online
payments to merchants and other individuals
■ Based on value stored in a consumer’s bank,
checking, or credit card account
■ PayPal most successful system
■ Smart cards
■ Contact smart cards: Require physical reader
■ Mondex
■ Contactless smart cards: Use RFID
Digital Accumulating Balance
Payment Systems
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-46
■ Allows users to make micropayments and
purchases on the Web
■ Users accumulate a debit balance for which
they are billed at the end of the month
■ Clickshare
Digital Checking Payment Systems
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-47
■ Extends functionality of existing checking
accounts for use as online shopping payment
tool
■ Example: PayByCheck
Insight on Business
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-48
Mobile Payment’s Future:
Wavepayme, Textpayme
Group Discussion
■ What technologies make mobile payment more
feasible now than in the past?
■ Describe some new experiments that are
helping to develop mobile payment systems.
■ How has PayPal responded?
■ Why haven’t mobile payment systems grown
faster? What factors will spur their growth?
All rights reserved. No part of this publication may be reproduced, stored in a
retrieval system, or transmitted, in any form or by any means, electronic,
mechanical, photocopying, recording, or otherwise, without the prior written
permission of the publisher. Printed in the United States of America.
Copyright © 2009 Pearson Education, Inc.
Publishing as Prentice Hall
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-49

More Related Content

Similar to Chapter 5 E marketing.pptx

Similar to Chapter 5 E marketing.pptx (20)

Security tools
Security toolsSecurity tools
Security tools
 
MIS-CH08: Securing Information Systems
MIS-CH08: Securing Information SystemsMIS-CH08: Securing Information Systems
MIS-CH08: Securing Information Systems
 
Chapter 8 securing information systems
Chapter 8 securing information systemsChapter 8 securing information systems
Chapter 8 securing information systems
 
106 Threat defense and information security development trends
106 Threat defense and information security development trends106 Threat defense and information security development trends
106 Threat defense and information security development trends
 
E-commerce security.ppt
E-commerce security.pptE-commerce security.ppt
E-commerce security.ppt
 
IDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITY
IDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITYIDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITY
IDENTITY IS THE FIRST STEP TO TRUE NETWORK SECURITY
 
Important Notes
Important NotesImportant Notes
Important Notes
 
Breakfast Briefings - February 2018
Breakfast Briefings - February 2018Breakfast Briefings - February 2018
Breakfast Briefings - February 2018
 
Guard Era Security Overview Preso (Draft)
Guard Era Security Overview Preso (Draft)Guard Era Security Overview Preso (Draft)
Guard Era Security Overview Preso (Draft)
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
 
Anatomy of an Advanced Retail Breach
Anatomy of an Advanced Retail BreachAnatomy of an Advanced Retail Breach
Anatomy of an Advanced Retail Breach
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
 
Bordless Breaches and Migrating Malware
Bordless Breaches and Migrating MalwareBordless Breaches and Migrating Malware
Bordless Breaches and Migrating Malware
 
Internet Use, Privacy and security
Internet Use, Privacy and securityInternet Use, Privacy and security
Internet Use, Privacy and security
 
Protecting your IP and Data Trustee Responsibilities by Brian Miller (Solici...
Protecting your IP and Data  Trustee Responsibilities by Brian Miller (Solici...Protecting your IP and Data  Trustee Responsibilities by Brian Miller (Solici...
Protecting your IP and Data Trustee Responsibilities by Brian Miller (Solici...
 
Digital Self Defense (RRLC version)
Digital Self Defense (RRLC version)Digital Self Defense (RRLC version)
Digital Self Defense (RRLC version)
 
Information Security and Compliance Follow-up Cource 2019
Information Security and Compliance Follow-up Cource 2019Information Security and Compliance Follow-up Cource 2019
Information Security and Compliance Follow-up Cource 2019
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 

More from amitshaha3

Power-Seekers-FreshMen.pptx
Power-Seekers-FreshMen.pptxPower-Seekers-FreshMen.pptx
Power-Seekers-FreshMen.pptx
amitshaha3
 
Hotel-Pan-pacific-Sonargaon.pptx
Hotel-Pan-pacific-Sonargaon.pptxHotel-Pan-pacific-Sonargaon.pptx
Hotel-Pan-pacific-Sonargaon.pptx
amitshaha3
 
marketing research ch 9.ppt
marketing research ch 9.pptmarketing research ch 9.ppt
marketing research ch 9.ppt
amitshaha3
 
marketing research ch 3.ppt
marketing research ch 3.pptmarketing research ch 3.ppt
marketing research ch 3.ppt
amitshaha3
 
schiffman_cb09_ppt_02.ppt
schiffman_cb09_ppt_02.pptschiffman_cb09_ppt_02.ppt
schiffman_cb09_ppt_02.ppt
amitshaha3
 
Impact of Russia Ukraine war on Bangladesh economy.pptx
Impact of Russia Ukraine war on Bangladesh economy.pptxImpact of Russia Ukraine war on Bangladesh economy.pptx
Impact of Russia Ukraine war on Bangladesh economy.pptx
amitshaha3
 
Ultrasonicsensor 170828140914
Ultrasonicsensor 170828140914Ultrasonicsensor 170828140914
Ultrasonicsensor 170828140914
amitshaha3
 

More from amitshaha3 (7)

Power-Seekers-FreshMen.pptx
Power-Seekers-FreshMen.pptxPower-Seekers-FreshMen.pptx
Power-Seekers-FreshMen.pptx
 
Hotel-Pan-pacific-Sonargaon.pptx
Hotel-Pan-pacific-Sonargaon.pptxHotel-Pan-pacific-Sonargaon.pptx
Hotel-Pan-pacific-Sonargaon.pptx
 
marketing research ch 9.ppt
marketing research ch 9.pptmarketing research ch 9.ppt
marketing research ch 9.ppt
 
marketing research ch 3.ppt
marketing research ch 3.pptmarketing research ch 3.ppt
marketing research ch 3.ppt
 
schiffman_cb09_ppt_02.ppt
schiffman_cb09_ppt_02.pptschiffman_cb09_ppt_02.ppt
schiffman_cb09_ppt_02.ppt
 
Impact of Russia Ukraine war on Bangladesh economy.pptx
Impact of Russia Ukraine war on Bangladesh economy.pptxImpact of Russia Ukraine war on Bangladesh economy.pptx
Impact of Russia Ukraine war on Bangladesh economy.pptx
 
Ultrasonicsensor 170828140914
Ultrasonicsensor 170828140914Ultrasonicsensor 170828140914
Ultrasonicsensor 170828140914
 

Recently uploaded

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Recently uploaded (20)

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 

Chapter 5 E marketing.pptx

  • 1. E-commerce Kenneth C. Laudon Carol Guercio Traver business. technology. society. Fifth Edition
  • 2. Copyright Copyright © © 2009 2009 Pearson Pearson Education, Education, Inc. Inc. Publishing as Prentice Hall Slide 5-2 Chapter 5 Online Security and Payment Systems
  • 3. The E-commerce Security Environment: The Scope of the Problem Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-3 ■ Overall size of cybercrime unclear; amount of losses significant but stable; individuals face new risks of fraud that may involve substantial uninsured losses ■ Symantec: Cybercrime on the rise from 2007 ■ IC3: Processed 200,000+ Internet crime complaints ■ 2007 CSI survey: 46% respondent firms detected security breach in last year ■ Underground economy marketplace that offers sales of stolen information growing
  • 4. Categories of Internet Crime Complaints Reported to IC3 Figure 5.1, Page 262 Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-4
  • 5. Types of Attacks Against Computer Systems Figure 5.3, Page 264 Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-5
  • 6. What Is Good E-commerce Security? Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-6 ■ To achieve highest degree of security ■ New technologies ■ Organizational policies and procedures ■ Industry standards and government laws
  • 7. The E-commerce Security Environment Figure 5.4, Page 267 Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-7
  • 8. Customer and Merchant Perspectives on the Different Dimensions of E-commerce Security Table 5.2, Page 268 Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-8
  • 9. The Tension Between Security and Other Values Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-9 ■ Security vs. ease of use: ■ The more security measures added, the more difficult a site is to use, and the slower it becomes
  • 10. Security Threats in the E-commerce Environment Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-10 ■ Three key points of vulnerability: ■ Client ■ Server ■ Communications pipeline
  • 11. A Typical E-commerce Transaction Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-11 Figure 5.5, Page 270 SOURCE: Boncella, 2000.
  • 12. Most Common Security Threats in the E-commerce Environment Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-12 ■ Malicious code (viruses, worms, Trojans) ■ Unwanted programs (spyware, browser parasites) ■ Phishing/identity theft ■ Hacking and cybervandalism ■ Credit card fraud/theft ■ Spoofing (pharming)/spam (junk) Web sites ■ DoS and DDoS attacks ■ Sniffing ■ Insider attacks ■ Poorly designed server and client software
  • 13. Malicious Code Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-13 ■ Viruses: ■ Replicate and spread to other files; most deliver “payload” (destructive or benign) ■ Macro viruses, file-infecting viruses, script viruses ■ Worms: ■ Designed to spread from computer to computer ■ Trojan horse: ■ Appears benign, but does something other than expected ■ Bots: ■ Covertly installed on computer; respond to external commands sent by attacker
  • 14. Unwanted Programs Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-14 ■ Installed without user’s informed consent ■ Browser parasites ■ Can monitor and change settings of a user’s browser ■ Adware ■ Calls for unwanted pop-up ads ■ Spyware ■ Can be used to obtain information, such as a user’s, e-mail, IMs, etc.
  • 15. Phishing and Identity Theft Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-15 ■ Any deceptive, online attempt by a third party to obtain confidential information for financial gain, e.g. ■ E-mail scam letter – most popular phishing attack ■ Spoofing legitimate financial institution’s Web site ■ Use information to commit fraudulent acts (access checking accounts), steal identity ■ One of fastest growing forms of e-commerce crime
  • 16. Hacking and Cybervandalism Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-16 ■ Hacker: ■ Individual who intends to gain unauthorized access to computer systems ■ Cracker: ■ Hacker with criminal intent ■ Cybervandalism: ■ Intentionally disrupting, defacing, destroying Web site
  • 17. Credit Card Fraud Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-17 ■ Fear of stolen credit card information deters online purchases ■ Hackers target credit card files and other customer information files on merchant servers; use stolen data to establish credit under false identity ■ Online companies at higher risk than offline ■ In development: New identity verification mechanisms
  • 18. Spoofing (Pharming) and Spam (Junk) Web Sites Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-18 ■ Spoofing (Pharming) ■ Misrepresenting oneself by using fake e-mail addresses or masquerading as someone else ■ Threatens integrity of site; authenticity ■ Spam (Junk) Web sites ■ Use domain names similar to legitimate one, redirect traffic to spammer-redirection domains
  • 19. DoS and DDoS Attacks Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-19 ■ Denial of service (DoS) attack ■ Hackers flood Web site with useless traffic to inundate and overwhelm network ■ Distributed denial of service (DDoS) attack ■ Hackers use multiple computers to attack target network from numerous launch points
  • 20. Other Security Threats Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-20 ■ Poorly designed server and client software ■ Increase in complexity of software programs has contributed to increase in vulnerabilities that hackers can exploit
  • 21. Technology Solutions Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-21 ■ Protecting Internet communications (encryption) ■ Securing channels of communication (SSL, S-HTTP, VPNs) ■ Protecting networks (firewalls) ■ Protecting servers and clients
  • 22. Tools Available to Achieve Site Security Figure 5.9, Page 284 Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-22
  • 23. Protecting Internet Communications: Encryption Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-23 ■ Encryption ■ Transforming plain text, data into cipher text that can’t be read by anyone other than sender and receiver ■ Secures stored information and information transmission ■ Provides: ■ Message integrity ■ Nonrepudiation ■ Authentication ■ Confidentiality
  • 24. Symmetric Key Encryption Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-24 ■ Also known as secret key encryption ■ Both sender and receiver use same digital key to encrypt and decrypt message ■ Requires different set of keys for each transaction ■ Advanced Encryption Standard (AES) ■ Most widely used symmetric key encryption ■ Uses 128-, 192-, and 256-bit encryption keys ■ Other standards use keys with up to 2,048 bits
  • 25. Public Key Encryption Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-25 ■ Uses two mathematically related digital keys ■ Public key (widely disseminated) ■ Private key (kept secret by owner) ■ Both keys used to encrypt and decrypt message ■ Once key used to encrypt message, same key cannot be used to decrypt message ■ Sender uses recipient’s public key to encrypt message; recipient uses his/her private key to decrypt it
  • 26. Public Key Cryptography – A Simple Case Figure 5.10, Page 283 Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-26
  • 27. Public Key Cryptography with Digital Signatures Figure 5.11, Page 288 Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-27
  • 28. Securing Channels of Communication Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-28 ■ Secure Sockets Layer (SSL): ■ Establishes a secure, negotiated client-server session in which URL of requested document, along with contents, is encrypted ■ S-HTTP: ■ Provides a secure message-oriented communications protocol designed for use in conjunction with HTTP ■ Virtual Private Network (VPN): ■ Allows remote users to securely access internal network via the Internet, using Point-to-Point Tunneling Protocol (PPTP)
  • 29. Protecting Networks Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-29 ■ Firewall ■ Hardware or software that filters packets ■ Prevents some packets from entering the network based on security policy ■ Two main methods: ■ Packet filters ■ Application gateways ■ Proxy servers (proxies) ■ Software servers that handle all communications originating from or being sent to the Internet
  • 30. Protecting Servers and Clients Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-30 ■ Operating system controls: ■ Authentication and access control mechanisms ■ Anti-virus software: ■ Easiest and least expensive way to prevent threats to system integrity ■ Requires daily updates
  • 31. Management Policies, Business Procedures, and Public Laws Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-31 ■ U.S. firms and organizations spend 10% of IT budget on security hardware, software, services ■ Attacks against organizational computers down ■ Attacks against Web sites, individual records up ■ Technology a foundation of security ■ Effective management policies also required
  • 32. A Security Plan: Management Policies Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-32 ■ Risk assessment ■ Security policy ■ Implementation plan ■ Security organization ■ Access controls ■ Authentication procedures ■ Biometrics ■ Authorization policies ■ Authorization management systems ■ Security audit
  • 33. Developing an E-commerce Security Plan Figure 5.16, Page 300 Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-33
  • 34. The Role of Laws and Public Policy Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-34 ■ New laws have given authorities tools and mechanisms for identifying, tracing, prosecuting cybercriminals ■ National Information Infrastructure Protection Act of 1996: created National Infrastructure Protection Center ■ USA Patriot Act ■ Homeland Security Act ■ CERT Coordination Center – private group ■ Government policies and controls on encryption software ■ OECD guidelines
  • 35. Types of Payment Systems Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-35 ■ Cash ■ Checking Transfer ■ Credit Card ■ Stored Value ■ Accumulating Balance
  • 36. Cash Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-36 ■ Most common form of payment in terms of number of transactions ■ Instantly convertible into other forms of value without intermediation ■ Portable, requires no authentication ■ “Free” (no transaction fee), ■ Limitations: easily stolen, limited to smaller transaction, does not provide any float
  • 37. Checking Transfer Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-37 ■ Funds transferred directly via signed draft/check from a consumer’s checking account to merchant/ other individual ■ Most common form of payment in terms of amount spent ■ Can be used for small and large transactions ■ requires third-party intervention (banks) ■ Introduces security risks for merchants, so authentication typically required
  • 38. Credit Card Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-38 ■ Represents account that extends credit to consumers; allows consumers to make payments to multiple vendors at one time ■ Issuing banks: ■ Issue cards and process transactions ■ Processing centers (clearinghouses): ■ Handle verification of accounts and balances
  • 39. Stored Value Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-39 ■ Accounts created by depositing funds into an account and from which funds are paid out or withdrawn as needed ■ Examples: Debit cards, gift certificates, prepaid cards, smart cards ■ Peer-to-peer payment systems ■ e.g. PayPal
  • 40. Accumulating Balance Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-40 ■ Accounts that accumulate expenditures and to which consumers make period payments ■ Examples: Utility, phone, American Express accounts ■ Evaluating payment systems: ■ Different stakeholders (consumers, merchants, financial intermediaries, government regulators) have different priorities in payment system dimensions (refutability, risk, anonymity, etc.)
  • 41. E-commerce Payment Systems Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-41 ■ Credit cards are dominant form of online payment, accounting for around 60% of online payments in 2008 ■ Other e-commerce payment systems: ■ Digital wallets ■ Digital cash ■ Online stored value payment systems ■ Digital accumulating balance systems ■ Digital checking
  • 42. How an Online Credit Transaction Works Figure 5.18, Page 312 Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-42
  • 43. Limitations of Online Credit Card Payment Systems Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-43 ■ Security: ■ Neither merchant nor consumer can be fully authenticated ■ Cost: ■ For merchants, around 3.5% of purchase price plus transaction fee of 20 – 30 cents per transaction ■ Social equity: ■ Many people do not have access to credit cards
  • 44. Digital Wallets Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-44 ■ Seeks to emulate the functionality of traditional wallet ■ Most important functions: ■ Authenticate consumer through use of digital certificates or other encryption methods ■ Store and transfer value ■ Secure payment process from consumer to merchant
  • 45. Online Stored Value Systems Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-45 ■ Permit consumers to make instant, online payments to merchants and other individuals ■ Based on value stored in a consumer’s bank, checking, or credit card account ■ PayPal most successful system ■ Smart cards ■ Contact smart cards: Require physical reader ■ Mondex ■ Contactless smart cards: Use RFID
  • 46. Digital Accumulating Balance Payment Systems Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-46 ■ Allows users to make micropayments and purchases on the Web ■ Users accumulate a debit balance for which they are billed at the end of the month ■ Clickshare
  • 47. Digital Checking Payment Systems Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-47 ■ Extends functionality of existing checking accounts for use as online shopping payment tool ■ Example: PayByCheck
  • 48. Insight on Business Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-48 Mobile Payment’s Future: Wavepayme, Textpayme Group Discussion ■ What technologies make mobile payment more feasible now than in the past? ■ Describe some new experiments that are helping to develop mobile payment systems. ■ How has PayPal responded? ■ Why haven’t mobile payment systems grown faster? What factors will spur their growth?
  • 49. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the publisher. Printed in the United States of America. Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-49