SlideShare a Scribd company logo
1 of 35
v
Chapter 5
E-commerce Security and
Payment Systems
Member :
Annisa salwa (1702518001)
Arenda Lolyta (1702518038)
D3 Manajemen Pemasaran B 2018
The E-commerce Security Environment
• Overall size and losses of cybercrime unclear
• Reporting issues
• 2012 survey: Average annualized cost of cybercrime was $8.9
million/year
• Underground economy marketplace:
• Stolen information stored on underground economy servers
What Is Good E-commerce Security?
• To achieve highest degree of security
• New technologies
• Organizational policies and procedures
• Industry standards and government laws
• Other factors
• Time value of money
• Cost of security vs. potential loss
• Security often breaks at weakest link
The E-commerce Security Environment
The Tension Between Security
andOther Values
• Ease of use
• The more security measures added, the more difficult a site is to use, and the
slower it becomes
• Public safety and criminal uses of the Internet
• Use of technology by criminals to plan crimes or threaten nation-state
Security Threats in the E-commerce
Environment
• Three key points of vulnerability in e-commerce environment:
1. Client
2. Server
3. Communications pipeline (Internet communications channels)
A Typical E-commerce Transaction
Vulnerable Points in an E-commerce Transaction
Most Common Security Threats in the
E-commerce Environment
• Malicious code (malware, exploits)
• Drive-by downloads
• Viruses
• Worms
• Ransomware
• Trojan horses
• Backdoors
• Bots, botnets
• Threats at both client and server levels
Most Common Security Threats (cont.)
• Potentially unwanted programs (PUPs)
• Browser parasites
• Adware
• Spyware
• Phishing
• Social engineering
• E-mail scams
• Spear-phishing
• Identity fraud/theft
Most Common Security Threats (cont.)
•Credit card fraud/theft
•Spoofing and pharming
•Spam (junk) Web sites (link farms)
•Identity fraud/theft
•Denial of service (DoS) attack
• Hackers flood site with useless traffic to overwhelm
network
•Distributed denial of service (DDoS) attack
Technology Solutions
• Protecting Internet communications
• Encryption
• Securing channels of communication
• SSL, VPNs
• Protecting networks
• Firewalls
• Protecting servers and clients
Encryption
• Transforms data into cipher text readable only by sender
and receiver
• Secures stored information and information transmission
• Provides 4 of 6 key dimensions of e-commerce security:
• Message integrity
• Nonrepudiation
• Authentication
• Confidentiality
Public Key Encryption
•Uses two mathematically related digital keys
• Public key (widely disseminated)
• Private key (kept secret by owner)
•Both keys used to encrypt and decrypt message
•Once key used to encrypt message, same key
cannot be used to decrypt message
•Sender uses recipient’s public key to encrypt
message; recipient uses private key to decrypt it
Public Key Cryptography: A Simple Case
Figure 5.6, Page 279
PubliSignatures and Hash Digestsc Key
Encryption using Digital
•Hash function:
• Mathematical algorithm that produces fixed-length number called
message or hash digest
•Hash digest of message sent to recipient along with
message to verify integrity
•Hash digest and message encrypted with recipient’s
public key
•Entire cipher text then encrypted with recipient’s
private key—creating digital signature—for
authenticity, nonrepudiation
Digital Envelopes
•Address weaknesses of:
• Public key encryption
• Computationally slow, decreased transmission speed, increased
processing time
• Symmetric key encryption
• Insecure transmission lines
•Uses symmetric key encryption to encrypt
document
•Uses public key encryption to encrypt and
send symmetric key
Creating a Digital Envelope
Digital Certificates and Certification Authorities
Securing Channels of Communication
• Secure Sockets Layer (SSL)/Transport Layer Security (TLS)
• Establishes secure, negotiated client–server session
• Virtual Private Network (VPN)
• Allows remote users to securely access internal network via the Internet
• Wireless (Wi-Fi) networks
• WPA2
Secure Negotiated Sessions Using SSL/TLS
Protecting Networks
•Firewall
• Hardware or software
• Uses security policy to filter packets
• Two main methods:
• Packet filters
• Application gateways
•Proxy servers (proxies)
• Software servers that handle all communications from or
sent to the Internet
•Intrusion detection systems
•Intrusion prevention systems
Firewalls and Proxy Servers
Protecting Servers and Clients
• Operating system security enhancements
• Upgrades, patches
• Anti-virus software
• Easiest and least expensive way to prevent threats to system integrity
• Requires daily updates
A Security Plan: Management Policies
• Risk assessment
• Security policy
• Implementation plan
• Security organization
• Access controls
• Authentication procedures, including biometrics
• Authorization policies, authorization management
systems
• Security audit
Developing an E-commerce Security
Plan
Types of Payment Systems
•Cash
• Most common form of payment
• Instantly convertible into other forms of value
• No float
•Checking transfer
• Second most common payment form in United States
•Credit card
• Credit card associations
• Issuing banks
• Processing centers
Payment System Stakeholders
•Consumers
• Low-risk, low-cost, refutable, convenience, reliability
•Merchants
• Low-risk, low-cost, irrefutable, secure, reliable
•Financial intermediaries
• Secure, low-risk, maximizing profit
•Government regulators
• Security, trust, protecting participants and enforcing reporting
E-commerce Payment Systems
• Credit cards
• 42% of online payments in 2013 (United States)
• Debit cards
• 29% online payments in 2013 (United States)
• Limitations of online credit card payment
• Security, merchant risk
• Cost
• Social equity
How an Online Credit Transaction
Works
Mobile Payment Systems
•Use of mobile phones as payment devices
established in Europe, Japan, South Korea
•Near field communication (NFC)
• Short-range (2”) wireless for sharing data between
devices
•Expanding in United States
• Google Wallet
• Mobile app designed to work with NFC chips
• PayPal
• Square
Digital Cash and Virtual Currencies
• Digital cash
• Based on algorithm that generates unique tokens that can be used in “real”
world
• Example: Bitcoin
• Virtual currencies
• Circulate within internal virtual world
• Example: Linden Dollars in Second Life, Facebook Credits
Electronic Billing Presentment and Payment
(EBPP)
•Online payment systems for monthly bills
•50% of all bill payments
•Two competing EBPP business models:
• Biller-direct (dominant model)
• Consolidator
•Both models are supported by EBPP infrastructure
providers
THANK YOU
35

More Related Content

What's hot

Ecommerce security
Ecommerce securityEcommerce security
Ecommerce securityelmira282
 
Security in E-commerce
Security in E-commerceSecurity in E-commerce
Security in E-commercem8817
 
Security environment
Security environmentSecurity environment
Security environmentJay Choudhary
 
Eamonn O Raghallaigh The Major Security Issues In E Commerce
Eamonn O Raghallaigh   The Major Security Issues In E CommerceEamonn O Raghallaigh   The Major Security Issues In E Commerce
Eamonn O Raghallaigh The Major Security Issues In E CommerceEamonnORagh
 
Security issues in e business
Security issues in e businessSecurity issues in e business
Security issues in e businessRahul Kumar
 
Privacy and Security Issues in E-Commerce
Privacy and Security Issues in E-Commerce  Privacy and Security Issues in E-Commerce
Privacy and Security Issues in E-Commerce Titas Ahmed
 
Security issues in e commerce
Security issues in e commerceSecurity issues in e commerce
Security issues in e commercesadaf tst
 
E-Commerce security
E-Commerce security E-Commerce security
E-Commerce security Tawhid Rahman
 
Security consideration with e commerce
Security consideration with e commerceSecurity consideration with e commerce
Security consideration with e commerceStudsPlanet.com
 
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONSE-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONSrausdeen anfas
 
E commerce security
E commerce securityE commerce security
E commerce securitymmousavi
 

What's hot (20)

Security issue in e commerce
Security issue in e commerceSecurity issue in e commerce
Security issue in e commerce
 
E commerce
E commerceE commerce
E commerce
 
E business security
E business securityE business security
E business security
 
Ecommerce security
Ecommerce securityEcommerce security
Ecommerce security
 
Security in E-commerce
Security in E-commerceSecurity in E-commerce
Security in E-commerce
 
E-commerce Security and Payment
E-commerce Security and PaymentE-commerce Security and Payment
E-commerce Security and Payment
 
Security environment
Security environmentSecurity environment
Security environment
 
E-Commerce Security
E-Commerce SecurityE-Commerce Security
E-Commerce Security
 
Eamonn O Raghallaigh The Major Security Issues In E Commerce
Eamonn O Raghallaigh   The Major Security Issues In E CommerceEamonn O Raghallaigh   The Major Security Issues In E Commerce
Eamonn O Raghallaigh The Major Security Issues In E Commerce
 
Security@ecommerce
Security@ecommerceSecurity@ecommerce
Security@ecommerce
 
Security issues in e business
Security issues in e businessSecurity issues in e business
Security issues in e business
 
Privacy and Security Issues in E-Commerce
Privacy and Security Issues in E-Commerce  Privacy and Security Issues in E-Commerce
Privacy and Security Issues in E-Commerce
 
Security issues in e commerce
Security issues in e commerceSecurity issues in e commerce
Security issues in e commerce
 
E-Commerce security
E-Commerce security E-Commerce security
E-Commerce security
 
Security consideration with e commerce
Security consideration with e commerceSecurity consideration with e commerce
Security consideration with e commerce
 
Security in e commerce
Security in e commerceSecurity in e commerce
Security in e commerce
 
E commerce Security
E commerce Security E commerce Security
E commerce Security
 
Security Threats in E-Commerce
Security Threats in E-CommerceSecurity Threats in E-Commerce
Security Threats in E-Commerce
 
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONSE-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
 
E commerce security
E commerce securityE commerce security
E commerce security
 

Similar to E-commerce Security and Payment Systems Chapter

SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008
SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008
SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008Denny Lee
 
SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...
SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...
SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...Prasanna Hegde
 
Security and Authentication at a Low Cost
Security and Authentication at a Low CostSecurity and Authentication at a Low Cost
Security and Authentication at a Low CostDonald Malloy
 
E banking & security
E banking & securityE banking & security
E banking & securitySumeer Sharma
 
IWMW 2000: Trusted e-Commerce: What Does it Mean?
IWMW 2000: Trusted e-Commerce: What Does it Mean?IWMW 2000: Trusted e-Commerce: What Does it Mean?
IWMW 2000: Trusted e-Commerce: What Does it Mean?IWMW
 
ELECTRONIC PAYMENT METHOD.pptx
ELECTRONIC PAYMENT METHOD.pptxELECTRONIC PAYMENT METHOD.pptx
ELECTRONIC PAYMENT METHOD.pptxAnupmaMunshi
 
Public Digital Identity as a Service
Public Digital Identity as a ServicePublic Digital Identity as a Service
Public Digital Identity as a ServicePT Datacomm Diangraha
 
Unit 1 Introduction to E-Commerce -Basic Concepts
Unit 1 Introduction to E-Commerce -Basic ConceptsUnit 1 Introduction to E-Commerce -Basic Concepts
Unit 1 Introduction to E-Commerce -Basic Conceptsjanapriyacampus
 
IBM i Security: Identifying the Events That Matter Most
IBM i Security: Identifying the Events That Matter MostIBM i Security: Identifying the Events That Matter Most
IBM i Security: Identifying the Events That Matter MostPrecisely
 
Relying on Data for Strategic Decision-Making--Financial Services Experience
Relying on Data for Strategic Decision-Making--Financial Services ExperienceRelying on Data for Strategic Decision-Making--Financial Services Experience
Relying on Data for Strategic Decision-Making--Financial Services ExperienceCloudera, Inc.
 
Hadoop and Financial Services
Hadoop and Financial ServicesHadoop and Financial Services
Hadoop and Financial ServicesCloudera, Inc.
 
Ch 1: Web Application (In)security & Ch 2: Core Defense Mechanisms
Ch 1: Web Application (In)security & Ch 2: Core Defense Mechanisms Ch 1: Web Application (In)security & Ch 2: Core Defense Mechanisms
Ch 1: Web Application (In)security & Ch 2: Core Defense Mechanisms Sam Bowne
 

Similar to E-commerce Security and Payment Systems Chapter (20)

SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008
SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008
SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008
 
SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...
SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...
SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...
 
E-Business security
E-Business security E-Business security
E-Business security
 
Chapter7
Chapter7Chapter7
Chapter7
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Security and Authentication at a Low Cost
Security and Authentication at a Low CostSecurity and Authentication at a Low Cost
Security and Authentication at a Low Cost
 
E banking & security
E banking & securityE banking & security
E banking & security
 
IWMW 2000: Trusted e-Commerce: What Does it Mean?
IWMW 2000: Trusted e-Commerce: What Does it Mean?IWMW 2000: Trusted e-Commerce: What Does it Mean?
IWMW 2000: Trusted e-Commerce: What Does it Mean?
 
ELECTRONIC PAYMENT METHOD.pptx
ELECTRONIC PAYMENT METHOD.pptxELECTRONIC PAYMENT METHOD.pptx
ELECTRONIC PAYMENT METHOD.pptx
 
Public Digital Identity as a Service
Public Digital Identity as a ServicePublic Digital Identity as a Service
Public Digital Identity as a Service
 
Karunia Wijaya - Proactive Incident Handling
Karunia Wijaya - Proactive Incident HandlingKarunia Wijaya - Proactive Incident Handling
Karunia Wijaya - Proactive Incident Handling
 
Unit 1 Introduction to E-Commerce -Basic Concepts
Unit 1 Introduction to E-Commerce -Basic ConceptsUnit 1 Introduction to E-Commerce -Basic Concepts
Unit 1 Introduction to E-Commerce -Basic Concepts
 
U nit 4
U nit 4U nit 4
U nit 4
 
IBM i Security: Identifying the Events That Matter Most
IBM i Security: Identifying the Events That Matter MostIBM i Security: Identifying the Events That Matter Most
IBM i Security: Identifying the Events That Matter Most
 
Relying on Data for Strategic Decision-Making--Financial Services Experience
Relying on Data for Strategic Decision-Making--Financial Services ExperienceRelying on Data for Strategic Decision-Making--Financial Services Experience
Relying on Data for Strategic Decision-Making--Financial Services Experience
 
Pci dss-for-it-providers
Pci dss-for-it-providersPci dss-for-it-providers
Pci dss-for-it-providers
 
Hadoop and Financial Services
Hadoop and Financial ServicesHadoop and Financial Services
Hadoop and Financial Services
 
Ch 1: Web Application (In)security & Ch 2: Core Defense Mechanisms
Ch 1: Web Application (In)security & Ch 2: Core Defense Mechanisms Ch 1: Web Application (In)security & Ch 2: Core Defense Mechanisms
Ch 1: Web Application (In)security & Ch 2: Core Defense Mechanisms
 
Electronic Security
Electronic SecurityElectronic Security
Electronic Security
 
Threats
ThreatsThreats
Threats
 

More from Shandy Aditya

Digital marketing hack: panduan digitalisasi bisnis UMKM by @pakdosenshandy 1
Digital marketing hack: panduan digitalisasi bisnis UMKM by @pakdosenshandy 1Digital marketing hack: panduan digitalisasi bisnis UMKM by @pakdosenshandy 1
Digital marketing hack: panduan digitalisasi bisnis UMKM by @pakdosenshandy 1Shandy Aditya
 
E-Commerce Chap 12: B2B e-CoMMeRCe: sUPPLY CHain ManaGeMenT and CoLLaBoRaTiVe...
E-Commerce Chap 12: B2B e-CoMMeRCe: sUPPLY CHain ManaGeMenT and CoLLaBoRaTiVe...E-Commerce Chap 12: B2B e-CoMMeRCe: sUPPLY CHain ManaGeMenT and CoLLaBoRaTiVe...
E-Commerce Chap 12: B2B e-CoMMeRCe: sUPPLY CHain ManaGeMenT and CoLLaBoRaTiVe...Shandy Aditya
 
E-Commerce Chap 11: soCiaL neTwoRKs, aUCTions, and PoRTaLs (D3 A 2018)
E-Commerce Chap 11: soCiaL neTwoRKs, aUCTions, and PoRTaLs (D3 A 2018)E-Commerce Chap 11: soCiaL neTwoRKs, aUCTions, and PoRTaLs (D3 A 2018)
E-Commerce Chap 11: soCiaL neTwoRKs, aUCTions, and PoRTaLs (D3 A 2018)Shandy Aditya
 
E-Commerce Chap 11: soCiaL neTwoRKs, aUCTions, and PoRTaLs (D3 A 2019)
E-Commerce Chap 11: soCiaL neTwoRKs, aUCTions, and PoRTaLs (D3 A 2019)E-Commerce Chap 11: soCiaL neTwoRKs, aUCTions, and PoRTaLs (D3 A 2019)
E-Commerce Chap 11: soCiaL neTwoRKs, aUCTions, and PoRTaLs (D3 A 2019)Shandy Aditya
 
Business Ethic Chap 10: DECISION MAKING CORPORATE GOVERNANCE ACCOUNTING AND F...
Business Ethic Chap 10: DECISION MAKING CORPORATE GOVERNANCE ACCOUNTING AND F...Business Ethic Chap 10: DECISION MAKING CORPORATE GOVERNANCE ACCOUNTING AND F...
Business Ethic Chap 10: DECISION MAKING CORPORATE GOVERNANCE ACCOUNTING AND F...Shandy Aditya
 
Business Ethic Chap 9: Business Environmental Sustainability
Business Ethic Chap 9: Business Environmental SustainabilityBusiness Ethic Chap 9: Business Environmental Sustainability
Business Ethic Chap 9: Business Environmental SustainabilityShandy Aditya
 
E-Commerce Chap 9: onLine ReTaiL and seRViCes (D3 A 2019)
E-Commerce Chap 9: onLine ReTaiL and seRViCes (D3 A 2019)E-Commerce Chap 9: onLine ReTaiL and seRViCes (D3 A 2019)
E-Commerce Chap 9: onLine ReTaiL and seRViCes (D3 A 2019)Shandy Aditya
 
E-Commerce Chap 8: eTHiCaL, soCiaL, and PoLiTiCaL issUes in e-CoMMeRCe (D3 A ...
E-Commerce Chap 8: eTHiCaL, soCiaL, and PoLiTiCaL issUes in e-CoMMeRCe (D3 A ...E-Commerce Chap 8: eTHiCaL, soCiaL, and PoLiTiCaL issUes in e-CoMMeRCe (D3 A ...
E-Commerce Chap 8: eTHiCaL, soCiaL, and PoLiTiCaL issUes in e-CoMMeRCe (D3 A ...Shandy Aditya
 
E-Commerce Chap 7: soCiaL, MoBiLe, and LoCaL MaRKeTinG (D3 A 2019)
E-Commerce Chap 7: soCiaL, MoBiLe, and LoCaL MaRKeTinG (D3 A 2019)E-Commerce Chap 7: soCiaL, MoBiLe, and LoCaL MaRKeTinG (D3 A 2019)
E-Commerce Chap 7: soCiaL, MoBiLe, and LoCaL MaRKeTinG (D3 A 2019)Shandy Aditya
 
E-Commerce Chap 7: soCiaL, MoBiLe, and LoCaL MaRKeTinG (D3 A 2018)
E-Commerce Chap 7: soCiaL, MoBiLe, and LoCaL MaRKeTinG (D3 A 2018)E-Commerce Chap 7: soCiaL, MoBiLe, and LoCaL MaRKeTinG (D3 A 2018)
E-Commerce Chap 7: soCiaL, MoBiLe, and LoCaL MaRKeTinG (D3 A 2018)Shandy Aditya
 
Business Ethic Chap 8: Ethics and Marketing
Business Ethic Chap 8: Ethics and MarketingBusiness Ethic Chap 8: Ethics and Marketing
Business Ethic Chap 8: Ethics and MarketingShandy Aditya
 
Business Ethic Chap 7: Ethical Decision Making - Technology and Privacy in th...
Business Ethic Chap 7: Ethical Decision Making - Technology and Privacy in th...Business Ethic Chap 7: Ethical Decision Making - Technology and Privacy in th...
Business Ethic Chap 7: Ethical Decision Making - Technology and Privacy in th...Shandy Aditya
 
Business Ethic Chap 6: Ethical Decision Making - Employer Responsibilities an...
Business Ethic Chap 6: Ethical Decision Making - Employer Responsibilities an...Business Ethic Chap 6: Ethical Decision Making - Employer Responsibilities an...
Business Ethic Chap 6: Ethical Decision Making - Employer Responsibilities an...Shandy Aditya
 
Business Ethic Chap 5: Corporate Social Responsibility
Business Ethic Chap 5: Corporate Social ResponsibilityBusiness Ethic Chap 5: Corporate Social Responsibility
Business Ethic Chap 5: Corporate Social ResponsibilityShandy Aditya
 
E-Commerce Chap 6 : E-COMMERCE MARKETING AND ADVERTISING CONCEPTS (D3 A 2019)
E-Commerce Chap 6 : E-COMMERCE MARKETING AND ADVERTISING CONCEPTS (D3 A 2019)E-Commerce Chap 6 : E-COMMERCE MARKETING AND ADVERTISING CONCEPTS (D3 A 2019)
E-Commerce Chap 6 : E-COMMERCE MARKETING AND ADVERTISING CONCEPTS (D3 A 2019)Shandy Aditya
 
E-Commerce Chap 6 : E-COMMERCE MARKETING AND ADVERTISING CONCEPTS (D3 A 2018)
E-Commerce Chap 6 : E-COMMERCE MARKETING AND ADVERTISING CONCEPTS (D3 A 2018)E-Commerce Chap 6 : E-COMMERCE MARKETING AND ADVERTISING CONCEPTS (D3 A 2018)
E-Commerce Chap 6 : E-COMMERCE MARKETING AND ADVERTISING CONCEPTS (D3 A 2018)Shandy Aditya
 
E-Commerce Chap 5: E-COMMERCE SECURITY AND PAYMENT SYSTEMS (D3 A 2018)
E-Commerce Chap 5: E-COMMERCE SECURITY AND PAYMENT SYSTEMS (D3 A 2018)E-Commerce Chap 5: E-COMMERCE SECURITY AND PAYMENT SYSTEMS (D3 A 2018)
E-Commerce Chap 5: E-COMMERCE SECURITY AND PAYMENT SYSTEMS (D3 A 2018)Shandy Aditya
 
E-Commerce Chap 4: BUILDING AN E-COMMERCE PRESENCE: WEB SITES, MOBILE SITES, ...
E-Commerce Chap 4: BUILDING AN E-COMMERCE PRESENCE: WEB SITES, MOBILE SITES, ...E-Commerce Chap 4: BUILDING AN E-COMMERCE PRESENCE: WEB SITES, MOBILE SITES, ...
E-Commerce Chap 4: BUILDING AN E-COMMERCE PRESENCE: WEB SITES, MOBILE SITES, ...Shandy Aditya
 
E-Commerce Chap 3: E-COMMERCE INFRASTRUCTURE: THE INTERNET, WEB, AND MOBILE P...
E-Commerce Chap 3: E-COMMERCE INFRASTRUCTURE: THE INTERNET, WEB, AND MOBILE P...E-Commerce Chap 3: E-COMMERCE INFRASTRUCTURE: THE INTERNET, WEB, AND MOBILE P...
E-Commerce Chap 3: E-COMMERCE INFRASTRUCTURE: THE INTERNET, WEB, AND MOBILE P...Shandy Aditya
 
Business Ethic Chap 4: the corporate culture impact and implication
Business Ethic Chap 4: the corporate culture impact and implicationBusiness Ethic Chap 4: the corporate culture impact and implication
Business Ethic Chap 4: the corporate culture impact and implicationShandy Aditya
 

More from Shandy Aditya (20)

Digital marketing hack: panduan digitalisasi bisnis UMKM by @pakdosenshandy 1
Digital marketing hack: panduan digitalisasi bisnis UMKM by @pakdosenshandy 1Digital marketing hack: panduan digitalisasi bisnis UMKM by @pakdosenshandy 1
Digital marketing hack: panduan digitalisasi bisnis UMKM by @pakdosenshandy 1
 
E-Commerce Chap 12: B2B e-CoMMeRCe: sUPPLY CHain ManaGeMenT and CoLLaBoRaTiVe...
E-Commerce Chap 12: B2B e-CoMMeRCe: sUPPLY CHain ManaGeMenT and CoLLaBoRaTiVe...E-Commerce Chap 12: B2B e-CoMMeRCe: sUPPLY CHain ManaGeMenT and CoLLaBoRaTiVe...
E-Commerce Chap 12: B2B e-CoMMeRCe: sUPPLY CHain ManaGeMenT and CoLLaBoRaTiVe...
 
E-Commerce Chap 11: soCiaL neTwoRKs, aUCTions, and PoRTaLs (D3 A 2018)
E-Commerce Chap 11: soCiaL neTwoRKs, aUCTions, and PoRTaLs (D3 A 2018)E-Commerce Chap 11: soCiaL neTwoRKs, aUCTions, and PoRTaLs (D3 A 2018)
E-Commerce Chap 11: soCiaL neTwoRKs, aUCTions, and PoRTaLs (D3 A 2018)
 
E-Commerce Chap 11: soCiaL neTwoRKs, aUCTions, and PoRTaLs (D3 A 2019)
E-Commerce Chap 11: soCiaL neTwoRKs, aUCTions, and PoRTaLs (D3 A 2019)E-Commerce Chap 11: soCiaL neTwoRKs, aUCTions, and PoRTaLs (D3 A 2019)
E-Commerce Chap 11: soCiaL neTwoRKs, aUCTions, and PoRTaLs (D3 A 2019)
 
Business Ethic Chap 10: DECISION MAKING CORPORATE GOVERNANCE ACCOUNTING AND F...
Business Ethic Chap 10: DECISION MAKING CORPORATE GOVERNANCE ACCOUNTING AND F...Business Ethic Chap 10: DECISION MAKING CORPORATE GOVERNANCE ACCOUNTING AND F...
Business Ethic Chap 10: DECISION MAKING CORPORATE GOVERNANCE ACCOUNTING AND F...
 
Business Ethic Chap 9: Business Environmental Sustainability
Business Ethic Chap 9: Business Environmental SustainabilityBusiness Ethic Chap 9: Business Environmental Sustainability
Business Ethic Chap 9: Business Environmental Sustainability
 
E-Commerce Chap 9: onLine ReTaiL and seRViCes (D3 A 2019)
E-Commerce Chap 9: onLine ReTaiL and seRViCes (D3 A 2019)E-Commerce Chap 9: onLine ReTaiL and seRViCes (D3 A 2019)
E-Commerce Chap 9: onLine ReTaiL and seRViCes (D3 A 2019)
 
E-Commerce Chap 8: eTHiCaL, soCiaL, and PoLiTiCaL issUes in e-CoMMeRCe (D3 A ...
E-Commerce Chap 8: eTHiCaL, soCiaL, and PoLiTiCaL issUes in e-CoMMeRCe (D3 A ...E-Commerce Chap 8: eTHiCaL, soCiaL, and PoLiTiCaL issUes in e-CoMMeRCe (D3 A ...
E-Commerce Chap 8: eTHiCaL, soCiaL, and PoLiTiCaL issUes in e-CoMMeRCe (D3 A ...
 
E-Commerce Chap 7: soCiaL, MoBiLe, and LoCaL MaRKeTinG (D3 A 2019)
E-Commerce Chap 7: soCiaL, MoBiLe, and LoCaL MaRKeTinG (D3 A 2019)E-Commerce Chap 7: soCiaL, MoBiLe, and LoCaL MaRKeTinG (D3 A 2019)
E-Commerce Chap 7: soCiaL, MoBiLe, and LoCaL MaRKeTinG (D3 A 2019)
 
E-Commerce Chap 7: soCiaL, MoBiLe, and LoCaL MaRKeTinG (D3 A 2018)
E-Commerce Chap 7: soCiaL, MoBiLe, and LoCaL MaRKeTinG (D3 A 2018)E-Commerce Chap 7: soCiaL, MoBiLe, and LoCaL MaRKeTinG (D3 A 2018)
E-Commerce Chap 7: soCiaL, MoBiLe, and LoCaL MaRKeTinG (D3 A 2018)
 
Business Ethic Chap 8: Ethics and Marketing
Business Ethic Chap 8: Ethics and MarketingBusiness Ethic Chap 8: Ethics and Marketing
Business Ethic Chap 8: Ethics and Marketing
 
Business Ethic Chap 7: Ethical Decision Making - Technology and Privacy in th...
Business Ethic Chap 7: Ethical Decision Making - Technology and Privacy in th...Business Ethic Chap 7: Ethical Decision Making - Technology and Privacy in th...
Business Ethic Chap 7: Ethical Decision Making - Technology and Privacy in th...
 
Business Ethic Chap 6: Ethical Decision Making - Employer Responsibilities an...
Business Ethic Chap 6: Ethical Decision Making - Employer Responsibilities an...Business Ethic Chap 6: Ethical Decision Making - Employer Responsibilities an...
Business Ethic Chap 6: Ethical Decision Making - Employer Responsibilities an...
 
Business Ethic Chap 5: Corporate Social Responsibility
Business Ethic Chap 5: Corporate Social ResponsibilityBusiness Ethic Chap 5: Corporate Social Responsibility
Business Ethic Chap 5: Corporate Social Responsibility
 
E-Commerce Chap 6 : E-COMMERCE MARKETING AND ADVERTISING CONCEPTS (D3 A 2019)
E-Commerce Chap 6 : E-COMMERCE MARKETING AND ADVERTISING CONCEPTS (D3 A 2019)E-Commerce Chap 6 : E-COMMERCE MARKETING AND ADVERTISING CONCEPTS (D3 A 2019)
E-Commerce Chap 6 : E-COMMERCE MARKETING AND ADVERTISING CONCEPTS (D3 A 2019)
 
E-Commerce Chap 6 : E-COMMERCE MARKETING AND ADVERTISING CONCEPTS (D3 A 2018)
E-Commerce Chap 6 : E-COMMERCE MARKETING AND ADVERTISING CONCEPTS (D3 A 2018)E-Commerce Chap 6 : E-COMMERCE MARKETING AND ADVERTISING CONCEPTS (D3 A 2018)
E-Commerce Chap 6 : E-COMMERCE MARKETING AND ADVERTISING CONCEPTS (D3 A 2018)
 
E-Commerce Chap 5: E-COMMERCE SECURITY AND PAYMENT SYSTEMS (D3 A 2018)
E-Commerce Chap 5: E-COMMERCE SECURITY AND PAYMENT SYSTEMS (D3 A 2018)E-Commerce Chap 5: E-COMMERCE SECURITY AND PAYMENT SYSTEMS (D3 A 2018)
E-Commerce Chap 5: E-COMMERCE SECURITY AND PAYMENT SYSTEMS (D3 A 2018)
 
E-Commerce Chap 4: BUILDING AN E-COMMERCE PRESENCE: WEB SITES, MOBILE SITES, ...
E-Commerce Chap 4: BUILDING AN E-COMMERCE PRESENCE: WEB SITES, MOBILE SITES, ...E-Commerce Chap 4: BUILDING AN E-COMMERCE PRESENCE: WEB SITES, MOBILE SITES, ...
E-Commerce Chap 4: BUILDING AN E-COMMERCE PRESENCE: WEB SITES, MOBILE SITES, ...
 
E-Commerce Chap 3: E-COMMERCE INFRASTRUCTURE: THE INTERNET, WEB, AND MOBILE P...
E-Commerce Chap 3: E-COMMERCE INFRASTRUCTURE: THE INTERNET, WEB, AND MOBILE P...E-Commerce Chap 3: E-COMMERCE INFRASTRUCTURE: THE INTERNET, WEB, AND MOBILE P...
E-Commerce Chap 3: E-COMMERCE INFRASTRUCTURE: THE INTERNET, WEB, AND MOBILE P...
 
Business Ethic Chap 4: the corporate culture impact and implication
Business Ethic Chap 4: the corporate culture impact and implicationBusiness Ethic Chap 4: the corporate culture impact and implication
Business Ethic Chap 4: the corporate culture impact and implication
 

Recently uploaded

BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024christinemoorman
 
Banana Powder Manufacturing Plant Project Report 2024 Edition.pptx
Banana Powder Manufacturing Plant Project Report 2024 Edition.pptxBanana Powder Manufacturing Plant Project Report 2024 Edition.pptx
Banana Powder Manufacturing Plant Project Report 2024 Edition.pptxgeorgebrinton95
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechNewman George Leech
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in managementchhavia330
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
Pitch Deck Teardown: NOQX's $200k Pre-seed deck
Pitch Deck Teardown: NOQX's $200k Pre-seed deckPitch Deck Teardown: NOQX's $200k Pre-seed deck
Pitch Deck Teardown: NOQX's $200k Pre-seed deckHajeJanKamps
 
Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni
 
(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCRsoniya singh
 
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In.../:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...lizamodels9
 
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… AbridgedLean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… AbridgedKaiNexus
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...lizamodels9
 
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts ServiceVip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Serviceankitnayak356677
 
rishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdfrishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdfmuskan1121w
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCRsoniya singh
 

Recently uploaded (20)

BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024
 
Banana Powder Manufacturing Plant Project Report 2024 Edition.pptx
Banana Powder Manufacturing Plant Project Report 2024 Edition.pptxBanana Powder Manufacturing Plant Project Report 2024 Edition.pptx
Banana Powder Manufacturing Plant Project Report 2024 Edition.pptx
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman Leech
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Mehrauli Delhi 💯Call Us 🔝8264348440🔝
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in management
 
KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
Pitch Deck Teardown: NOQX's $200k Pre-seed deck
Pitch Deck Teardown: NOQX's $200k Pre-seed deckPitch Deck Teardown: NOQX's $200k Pre-seed deck
Pitch Deck Teardown: NOQX's $200k Pre-seed deck
 
Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.
 
(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Keshav Puram 🔝 Delhi NCR
 
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In.../:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
 
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… AbridgedLean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
Lean: From Theory to Practice — One City’s (and Library’s) Lean Story… Abridged
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
 
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts ServiceVip Female Escorts Noida 9711199171 Greater Noida Escorts Service
Vip Female Escorts Noida 9711199171 Greater Noida Escorts Service
 
rishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdfrishikeshgirls.in- Rishikesh call girl.pdf
rishikeshgirls.in- Rishikesh call girl.pdf
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
(8264348440) 🔝 Call Girls In Mahipalpur 🔝 Delhi NCR
 

E-commerce Security and Payment Systems Chapter

  • 1. v Chapter 5 E-commerce Security and Payment Systems Member : Annisa salwa (1702518001) Arenda Lolyta (1702518038) D3 Manajemen Pemasaran B 2018
  • 2. The E-commerce Security Environment • Overall size and losses of cybercrime unclear • Reporting issues • 2012 survey: Average annualized cost of cybercrime was $8.9 million/year • Underground economy marketplace: • Stolen information stored on underground economy servers
  • 3. What Is Good E-commerce Security? • To achieve highest degree of security • New technologies • Organizational policies and procedures • Industry standards and government laws • Other factors • Time value of money • Cost of security vs. potential loss • Security often breaks at weakest link
  • 5.
  • 6. The Tension Between Security andOther Values • Ease of use • The more security measures added, the more difficult a site is to use, and the slower it becomes • Public safety and criminal uses of the Internet • Use of technology by criminals to plan crimes or threaten nation-state
  • 7. Security Threats in the E-commerce Environment • Three key points of vulnerability in e-commerce environment: 1. Client 2. Server 3. Communications pipeline (Internet communications channels)
  • 8. A Typical E-commerce Transaction
  • 9. Vulnerable Points in an E-commerce Transaction
  • 10. Most Common Security Threats in the E-commerce Environment • Malicious code (malware, exploits) • Drive-by downloads • Viruses • Worms • Ransomware • Trojan horses • Backdoors • Bots, botnets • Threats at both client and server levels
  • 11. Most Common Security Threats (cont.) • Potentially unwanted programs (PUPs) • Browser parasites • Adware • Spyware • Phishing • Social engineering • E-mail scams • Spear-phishing • Identity fraud/theft
  • 12. Most Common Security Threats (cont.) •Credit card fraud/theft •Spoofing and pharming •Spam (junk) Web sites (link farms) •Identity fraud/theft •Denial of service (DoS) attack • Hackers flood site with useless traffic to overwhelm network •Distributed denial of service (DDoS) attack
  • 13. Technology Solutions • Protecting Internet communications • Encryption • Securing channels of communication • SSL, VPNs • Protecting networks • Firewalls • Protecting servers and clients
  • 14. Encryption • Transforms data into cipher text readable only by sender and receiver • Secures stored information and information transmission • Provides 4 of 6 key dimensions of e-commerce security: • Message integrity • Nonrepudiation • Authentication • Confidentiality
  • 15. Public Key Encryption •Uses two mathematically related digital keys • Public key (widely disseminated) • Private key (kept secret by owner) •Both keys used to encrypt and decrypt message •Once key used to encrypt message, same key cannot be used to decrypt message •Sender uses recipient’s public key to encrypt message; recipient uses private key to decrypt it
  • 16. Public Key Cryptography: A Simple Case Figure 5.6, Page 279
  • 17. PubliSignatures and Hash Digestsc Key Encryption using Digital •Hash function: • Mathematical algorithm that produces fixed-length number called message or hash digest •Hash digest of message sent to recipient along with message to verify integrity •Hash digest and message encrypted with recipient’s public key •Entire cipher text then encrypted with recipient’s private key—creating digital signature—for authenticity, nonrepudiation
  • 18. Digital Envelopes •Address weaknesses of: • Public key encryption • Computationally slow, decreased transmission speed, increased processing time • Symmetric key encryption • Insecure transmission lines •Uses symmetric key encryption to encrypt document •Uses public key encryption to encrypt and send symmetric key
  • 19. Creating a Digital Envelope
  • 20. Digital Certificates and Certification Authorities
  • 21. Securing Channels of Communication • Secure Sockets Layer (SSL)/Transport Layer Security (TLS) • Establishes secure, negotiated client–server session • Virtual Private Network (VPN) • Allows remote users to securely access internal network via the Internet • Wireless (Wi-Fi) networks • WPA2
  • 22. Secure Negotiated Sessions Using SSL/TLS
  • 23. Protecting Networks •Firewall • Hardware or software • Uses security policy to filter packets • Two main methods: • Packet filters • Application gateways •Proxy servers (proxies) • Software servers that handle all communications from or sent to the Internet •Intrusion detection systems •Intrusion prevention systems
  • 25. Protecting Servers and Clients • Operating system security enhancements • Upgrades, patches • Anti-virus software • Easiest and least expensive way to prevent threats to system integrity • Requires daily updates
  • 26. A Security Plan: Management Policies • Risk assessment • Security policy • Implementation plan • Security organization • Access controls • Authentication procedures, including biometrics • Authorization policies, authorization management systems • Security audit
  • 27. Developing an E-commerce Security Plan
  • 28. Types of Payment Systems •Cash • Most common form of payment • Instantly convertible into other forms of value • No float •Checking transfer • Second most common payment form in United States •Credit card • Credit card associations • Issuing banks • Processing centers
  • 29. Payment System Stakeholders •Consumers • Low-risk, low-cost, refutable, convenience, reliability •Merchants • Low-risk, low-cost, irrefutable, secure, reliable •Financial intermediaries • Secure, low-risk, maximizing profit •Government regulators • Security, trust, protecting participants and enforcing reporting
  • 30. E-commerce Payment Systems • Credit cards • 42% of online payments in 2013 (United States) • Debit cards • 29% online payments in 2013 (United States) • Limitations of online credit card payment • Security, merchant risk • Cost • Social equity
  • 31. How an Online Credit Transaction Works
  • 32. Mobile Payment Systems •Use of mobile phones as payment devices established in Europe, Japan, South Korea •Near field communication (NFC) • Short-range (2”) wireless for sharing data between devices •Expanding in United States • Google Wallet • Mobile app designed to work with NFC chips • PayPal • Square
  • 33. Digital Cash and Virtual Currencies • Digital cash • Based on algorithm that generates unique tokens that can be used in “real” world • Example: Bitcoin • Virtual currencies • Circulate within internal virtual world • Example: Linden Dollars in Second Life, Facebook Credits
  • 34. Electronic Billing Presentment and Payment (EBPP) •Online payment systems for monthly bills •50% of all bill payments •Two competing EBPP business models: • Biller-direct (dominant model) • Consolidator •Both models are supported by EBPP infrastructure providers