SlideShare a Scribd company logo
EC05.02b Internet Security Issues 1
E-Commerce I
Analyzing Secure Websites
EC05.02b Internet Security Issues 2
Secure websites
Definition
Security confirmation
EC05.02b Internet Security Issues 3
What is a secure website?
A secure website is one that uses data
encryption to protect all information.
EC05.02b Internet Security Issues 4
How can you tell a site is secure?
There are three ways to confirm that a
website is secure:
Click the VeriSign icon to verify that
the certificate is valid.
A secure page should include a small
padlock symbol displayed on the
bottom line of your browser.
On a secure page, in the browser
address box, the URL will begin with
an https: prefix rather than the
standard http: prefix. The s means
that the page is secure.
EC05.02b Internet Security Issues 5
Identity theft
Definition
Types of identity theft
Examples of identity theft
Protect against identity theft
EC05.02b Internet Security Issues 6
Definition
 Any instance where a
person uses someone
else's identification
documents or other
identifiers in order to
impersonate that person.
 It intrudes into many areas
of people’s daily lives.
EC05.02b Internet Security Issues 7
Types of identity theft
Financial fraud - includes bank
fraud, credit card fraud, computer
and telecommunications fraud,
social program fraud, tax refund
fraud, mail fraud, and several
more.
EC05.02b Internet Security Issues 8
Types of identity theft
Criminal activities - involves taking
on someone else's identity in
order to commit a crime, enter a
country, obtain special permits,
hide one's own identity, or commit
acts of terrorism.
EC05.02b Internet Security Issues 9
Types of identity theft
Credit card fraud is identity theft in
its most simple and common form.
It can be accomplished either by a
thief who steals your account
number or when your pre-
approved credit card offers fall
into the wrong hands.
EC05.02b Internet Security Issues 10
Common modes of identity theft:
Dumpster diving - Dug out of trash cans and
dumpsters
Memorized or copied by sales clerks and
waiters
Removed from mailboxes in the form of tax
notices, financial account statements, and
other bills
Removed from your employer's files, either
secretly or with the help of an inside
accomplice
Removed from hospital records, usually with
the help of an inside accomplice
Removed from your financial lender's files
Examples of identity theft
EC05.02b Internet Security Issues 11
Common modes of identity theft:
Removed from your landlord's files
Purchased (or found free) in online (or offline)
databases
Collected from "cloned" Web sites - someone
may recreate a legitimate merchant Web site in
order to capture your personal information and
credit card information when you place an order.
Stolen from a merchant database through
computer hacking (not as simple as other forms
of theft)
Snatched using software that mirrors keystrokes
to capture credit card account information
More Examples of identity theft
EC05.02b Internet Security Issues 12
Ways to protect yourself
 DON'T give out your Social Security number
unless it’s critical.
 DESTROY any unwanted credit card offers.
 ONLY include your name and address on
checks.
 SHRED (cross-cut) any sensitive documents
before discarding.
 DON'T carry your Social Security card, passport,
or birth certificate in your wallet or purse.
 REVIEW your credit report annually to verify its
accuracy.
EC05.02b Internet Security Issues 13
More Ways to protect yourself
 NEVER give out personal information on the phone
to someone you don't know and who initiated the
call.
 REVIEW your credit card statement each month to
make sure there are no unauthorized charges.
 DON'T mail bills or documents that contain personal
data (like tax forms or checks) from your personal
mail box.
 If you're ever denied credit, FIND OUT WHY.
 REACT QUICKLY if a creditor calls about charges
you didn't make.
 GUARD deposit slips as closely as you do checks.
EC05.02b Internet Security Issues 14
What is Netiquette?
 "Netiquette" is network
etiquette, the do's and don'ts of
online communication.
 Netiquette includes both
common courtesy online and
the informal "rules of the road"
of cyberspace.
 In other words, Netiquette is a
set of rules for behaving
properly online.
EC05.02b Internet Security Issues 15
Core Rules of Netiquette
Rule 1: Remember the Human
Rule 2: Adhere to the same standards of behavior online that you follow in
real life
Rule 3: Know where you are in cyberspace
Rule 4: Respect other people's time and bandwidth
Rule 5: Make yourself look good online
Rule 6: Share expert knowledge
Rule 7: Help keep flame wars under control
Rule 8: Respect other people's privacy
Rule 9: Don't abuse your power
Rule 10: Be forgiving of other people's mistakes
http://www.albion.com/netiquette/corerules.html
EC05.02b Internet Security Issues 16
Sources
 “Electronic Commerce.” 1999.
http://www.wapa.gov/CorpSrvs/procurmt/ecomm.htm (2 Jan 2006).
 Stein, Lincoln D. “WWW Security FAQ: What’s New.” 2000.
http://www.w3.org/Security/Faq/www-security-faq.html (2 Jan 2006)
 Strom, David. “The Challenge of Electronic Commerce: Selling
Lemonade has Never Been This Tough.” 2000.
http://www.strom.com/pubwork/ecommerce.html (2 Jan. 2006).
 “Bureau of Industry and Security.” US Department of Commerce
http://www.bis.doc.gov/ComplianceAndEnforcement/E-Commerce.htm (2
Jan 2006)
 Electronic Commerce NC WiseOwl
http://www.mywiseowl.com/articles/Electronic_commerce (2 Jan 2006)
 Kennedy, Dennis, An Internet Tool Kit for E-Commerce Law Jan 15,
2001 The John Marshall Law School (2 Jan 2006)

More Related Content

What's hot

Identity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsIdentity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - Basics
Deb Vosejpka
 
Identity Theft
Identity Theft Identity Theft
Identity Theft
Fairfax County
 
Online security and payment system
Online security and payment systemOnline security and payment system
Online security and payment system
Gc university faisalabad
 
Chase phising mail example
Chase phising mail exampleChase phising mail example
Chase phising mail example
Aldo Mayo
 
10 Ways To Prevent Internet Fraud
10 Ways To Prevent Internet Fraud10 Ways To Prevent Internet Fraud
10 Ways To Prevent Internet Fraud
Goose & Gander
 
Identity theft
Identity theftIdentity theft
Identity theft
Eqhball Ghazizadeh
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
Alan Greggo
 
Identity theft in the internet
Identity theft in the internetIdentity theft in the internet
Identity theft in the internet
mohmd-kutbi
 
5 Tips for Protecting Your Checking Account
5 Tips for Protecting Your Checking Account5 Tips for Protecting Your Checking Account
5 Tips for Protecting Your Checking Account
- Mark - Fullbright
 
Cybercrime
CybercrimeCybercrime
Identity theft ppt
Identity theft pptIdentity theft ppt
Identity theft ppt
Cut 2 Shreds
 
Identity Fraud Precautions
Identity Fraud PrecautionsIdentity Fraud Precautions
Identity Fraud Precautions
TwinVasion
 
Anonymous email 26 aug14
Anonymous email 26 aug14Anonymous email 26 aug14
Anonymous email 26 aug14
Naval OPSEC
 
e-Fraud ppt
e-Fraud ppte-Fraud ppt
e-Fraud ppt
jasonsirmon
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
Sachin Saini
 
Identity Fraud Precautions
Identity Fraud PrecautionsIdentity Fraud Precautions
Identity Fraud Precautions
theresa34
 
Identity Theft and Strategies for Crime Prevention
Identity Theft and Strategies for Crime PreventionIdentity Theft and Strategies for Crime Prevention
Identity Theft and Strategies for Crime Prevention
- Mark - Fullbright
 
Phishing
PhishingPhishing
Identity theft 10 mar15
Identity theft 10 mar15Identity theft 10 mar15
Identity theft 10 mar15
Naval OPSEC
 
Phising a Threat to Network Security
Phising a Threat to Network SecurityPhising a Threat to Network Security
Phising a Threat to Network Security
anjuselina
 

What's hot (20)

Identity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsIdentity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - Basics
 
Identity Theft
Identity Theft Identity Theft
Identity Theft
 
Online security and payment system
Online security and payment systemOnline security and payment system
Online security and payment system
 
Chase phising mail example
Chase phising mail exampleChase phising mail example
Chase phising mail example
 
10 Ways To Prevent Internet Fraud
10 Ways To Prevent Internet Fraud10 Ways To Prevent Internet Fraud
10 Ways To Prevent Internet Fraud
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Identity Theft Prevention
Identity Theft PreventionIdentity Theft Prevention
Identity Theft Prevention
 
Identity theft in the internet
Identity theft in the internetIdentity theft in the internet
Identity theft in the internet
 
5 Tips for Protecting Your Checking Account
5 Tips for Protecting Your Checking Account5 Tips for Protecting Your Checking Account
5 Tips for Protecting Your Checking Account
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Identity theft ppt
Identity theft pptIdentity theft ppt
Identity theft ppt
 
Identity Fraud Precautions
Identity Fraud PrecautionsIdentity Fraud Precautions
Identity Fraud Precautions
 
Anonymous email 26 aug14
Anonymous email 26 aug14Anonymous email 26 aug14
Anonymous email 26 aug14
 
e-Fraud ppt
e-Fraud ppte-Fraud ppt
e-Fraud ppt
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
 
Identity Fraud Precautions
Identity Fraud PrecautionsIdentity Fraud Precautions
Identity Fraud Precautions
 
Identity Theft and Strategies for Crime Prevention
Identity Theft and Strategies for Crime PreventionIdentity Theft and Strategies for Crime Prevention
Identity Theft and Strategies for Crime Prevention
 
Phishing
PhishingPhishing
Phishing
 
Identity theft 10 mar15
Identity theft 10 mar15Identity theft 10 mar15
Identity theft 10 mar15
 
Phising a Threat to Network Security
Phising a Threat to Network SecurityPhising a Threat to Network Security
Phising a Threat to Network Security
 

Viewers also liked

STEM Resources for K-12 Educators
STEM Resources for K-12 EducatorsSTEM Resources for K-12 Educators
STEM Resources for K-12 Educators
Dr. TJ Wolfe
 
Overview Of Major Project Efforts
Overview Of Major Project EffortsOverview Of Major Project Efforts
Overview Of Major Project Efforts
skvanbibber
 
Effects of the_internet_on_education_and_training
Effects of the_internet_on_education_and_trainingEffects of the_internet_on_education_and_training
Effects of the_internet_on_education_and_training
Dr. TJ Wolfe
 
Characteristics and purpose_of_e_commercei
Characteristics and purpose_of_e_commerceiCharacteristics and purpose_of_e_commercei
Characteristics and purpose_of_e_commercei
Dr. TJ Wolfe
 
Cache
CacheCache
Newspapers
NewspapersNewspapers
Newspapers
monicahayes
 
Analyzinglegislation
AnalyzinglegislationAnalyzinglegislation
Analyzinglegislation
Dr. TJ Wolfe
 
Effects of the_internet_on_consumers_and_businesses
Effects of the_internet_on_consumers_and_businessesEffects of the_internet_on_consumers_and_businesses
Effects of the_internet_on_consumers_and_businesses
Dr. TJ Wolfe
 
Pengutipan Dana Kerja Sosial Komuniti
Pengutipan Dana Kerja Sosial KomunitiPengutipan Dana Kerja Sosial Komuniti
Pengutipan Dana Kerja Sosial KomunitiEngku Fatin
 
Analyzing internetsecurity
Analyzing internetsecurityAnalyzing internetsecurity
Analyzing internetsecurity
Dr. TJ Wolfe
 
Tech Integration for Dummies. A Simple 5 Step Plan
Tech Integration for Dummies. A Simple 5 Step PlanTech Integration for Dummies. A Simple 5 Step Plan
Tech Integration for Dummies. A Simple 5 Step Plan
Dr. TJ Wolfe
 
Storyboarding and planning_your_website
Storyboarding and planning_your_websiteStoryboarding and planning_your_website
Storyboarding and planning_your_website
Dr. TJ Wolfe
 
Principles design lecture
Principles design lecturePrinciples design lecture
Principles design lecture
Dr. TJ Wolfe
 
35 Attitudes and Behaviours Ideal for Success in today's World of Work
35 Attitudes and Behaviours Ideal for Success in today's World of Work35 Attitudes and Behaviours Ideal for Success in today's World of Work
35 Attitudes and Behaviours Ideal for Success in today's World of Work
Sharon Shakung
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
Dr. TJ Wolfe
 

Viewers also liked (15)

STEM Resources for K-12 Educators
STEM Resources for K-12 EducatorsSTEM Resources for K-12 Educators
STEM Resources for K-12 Educators
 
Overview Of Major Project Efforts
Overview Of Major Project EffortsOverview Of Major Project Efforts
Overview Of Major Project Efforts
 
Effects of the_internet_on_education_and_training
Effects of the_internet_on_education_and_trainingEffects of the_internet_on_education_and_training
Effects of the_internet_on_education_and_training
 
Characteristics and purpose_of_e_commercei
Characteristics and purpose_of_e_commerceiCharacteristics and purpose_of_e_commercei
Characteristics and purpose_of_e_commercei
 
Cache
CacheCache
Cache
 
Newspapers
NewspapersNewspapers
Newspapers
 
Analyzinglegislation
AnalyzinglegislationAnalyzinglegislation
Analyzinglegislation
 
Effects of the_internet_on_consumers_and_businesses
Effects of the_internet_on_consumers_and_businessesEffects of the_internet_on_consumers_and_businesses
Effects of the_internet_on_consumers_and_businesses
 
Pengutipan Dana Kerja Sosial Komuniti
Pengutipan Dana Kerja Sosial KomunitiPengutipan Dana Kerja Sosial Komuniti
Pengutipan Dana Kerja Sosial Komuniti
 
Analyzing internetsecurity
Analyzing internetsecurityAnalyzing internetsecurity
Analyzing internetsecurity
 
Tech Integration for Dummies. A Simple 5 Step Plan
Tech Integration for Dummies. A Simple 5 Step PlanTech Integration for Dummies. A Simple 5 Step Plan
Tech Integration for Dummies. A Simple 5 Step Plan
 
Storyboarding and planning_your_website
Storyboarding and planning_your_websiteStoryboarding and planning_your_website
Storyboarding and planning_your_website
 
Principles design lecture
Principles design lecturePrinciples design lecture
Principles design lecture
 
35 Attitudes and Behaviours Ideal for Success in today's World of Work
35 Attitudes and Behaviours Ideal for Success in today's World of Work35 Attitudes and Behaviours Ideal for Success in today's World of Work
35 Attitudes and Behaviours Ideal for Success in today's World of Work
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 

Similar to Analyzing securewebsites

Preventing Internet Fraud By Preventing Identity Theft
Preventing Internet Fraud By Preventing Identity TheftPreventing Internet Fraud By Preventing Identity Theft
Preventing Internet Fraud By Preventing Identity Theft
Diane M. Metcalf
 
Matt Luallen Explains What, How and Responding to Identity Theft
Matt Luallen Explains What, How and Responding to Identity TheftMatt Luallen Explains What, How and Responding to Identity Theft
Matt Luallen Explains What, How and Responding to Identity Theft
guest3151b0
 
cyber security presentation 1234567.pptx
cyber security presentation 1234567.pptxcyber security presentation 1234567.pptx
cyber security presentation 1234567.pptx
prashanth73488
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_point
efandeye
 
Social Media and the Law
Social Media and the LawSocial Media and the Law
Social Media and the Law
Christina Gagnier
 
Be prepared to deal with fraud for web
Be prepared to deal with fraud for webBe prepared to deal with fraud for web
Be prepared to deal with fraud for web
Katie Farrow
 
Self-Sovereign-Identity.pptx
Self-Sovereign-Identity.pptxSelf-Sovereign-Identity.pptx
Self-Sovereign-Identity.pptx
SanketKulkarni94
 
Infosec 4 The Home
Infosec 4 The HomeInfosec 4 The Home
Infosec 4 The Home
jaysonstreet
 
Reducing Fraud with the Right SSL Certificate in E-Commerce
Reducing Fraud with the Right SSL Certificate in E-CommerceReducing Fraud with the Right SSL Certificate in E-Commerce
Reducing Fraud with the Right SSL Certificate in E-Commerce
RapidSSLOnline.com
 
12002040701065 SEMINAR this is ppt in pd
12002040701065 SEMINAR this is ppt in pd12002040701065 SEMINAR this is ppt in pd
12002040701065 SEMINAR this is ppt in pd
jeelsonani003567
 
Ict lec#9
Ict lec#9Ict lec#9
Ict lec#9
amberkhan59
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
Bushra22
 
Slideshow - Lil Rat
Slideshow - Lil RatSlideshow - Lil Rat
Slideshow - Lil Rat
megg16
 
Phishing
PhishingPhishing
Phishing
shivli0769
 
How To: Prevent Loan Application Fraud
How To: Prevent Loan Application FraudHow To: Prevent Loan Application Fraud
How To: Prevent Loan Application Fraud
Geo Coelho
 
IST Presentation
IST PresentationIST Presentation
IST Presentation
guest1d1ed5
 
Internet secutity ppt by vaishnavi khandelwal
Internet secutity ppt by vaishnavi khandelwalInternet secutity ppt by vaishnavi khandelwal
Internet secutity ppt by vaishnavi khandelwal
VaishnaviKhandelwal6
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptx
Achu69
 
What to do after a data breach
What to do after a data breachWhat to do after a data breach
What to do after a data breach
Oregon Law Practice Management
 
Masterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy BasicsMasterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy Basics
Excellence Foundation for South Sudan
 

Similar to Analyzing securewebsites (20)

Preventing Internet Fraud By Preventing Identity Theft
Preventing Internet Fraud By Preventing Identity TheftPreventing Internet Fraud By Preventing Identity Theft
Preventing Internet Fraud By Preventing Identity Theft
 
Matt Luallen Explains What, How and Responding to Identity Theft
Matt Luallen Explains What, How and Responding to Identity TheftMatt Luallen Explains What, How and Responding to Identity Theft
Matt Luallen Explains What, How and Responding to Identity Theft
 
cyber security presentation 1234567.pptx
cyber security presentation 1234567.pptxcyber security presentation 1234567.pptx
cyber security presentation 1234567.pptx
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_point
 
Social Media and the Law
Social Media and the LawSocial Media and the Law
Social Media and the Law
 
Be prepared to deal with fraud for web
Be prepared to deal with fraud for webBe prepared to deal with fraud for web
Be prepared to deal with fraud for web
 
Self-Sovereign-Identity.pptx
Self-Sovereign-Identity.pptxSelf-Sovereign-Identity.pptx
Self-Sovereign-Identity.pptx
 
Infosec 4 The Home
Infosec 4 The HomeInfosec 4 The Home
Infosec 4 The Home
 
Reducing Fraud with the Right SSL Certificate in E-Commerce
Reducing Fraud with the Right SSL Certificate in E-CommerceReducing Fraud with the Right SSL Certificate in E-Commerce
Reducing Fraud with the Right SSL Certificate in E-Commerce
 
12002040701065 SEMINAR this is ppt in pd
12002040701065 SEMINAR this is ppt in pd12002040701065 SEMINAR this is ppt in pd
12002040701065 SEMINAR this is ppt in pd
 
Ict lec#9
Ict lec#9Ict lec#9
Ict lec#9
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Slideshow - Lil Rat
Slideshow - Lil RatSlideshow - Lil Rat
Slideshow - Lil Rat
 
Phishing
PhishingPhishing
Phishing
 
How To: Prevent Loan Application Fraud
How To: Prevent Loan Application FraudHow To: Prevent Loan Application Fraud
How To: Prevent Loan Application Fraud
 
IST Presentation
IST PresentationIST Presentation
IST Presentation
 
Internet secutity ppt by vaishnavi khandelwal
Internet secutity ppt by vaishnavi khandelwalInternet secutity ppt by vaishnavi khandelwal
Internet secutity ppt by vaishnavi khandelwal
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptx
 
What to do after a data breach
What to do after a data breachWhat to do after a data breach
What to do after a data breach
 
Masterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy BasicsMasterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy Basics
 

Recently uploaded

BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
Lifelines of National Economy chapter for Class 10 STUDY MATERIAL PDF
Lifelines of National Economy chapter for Class 10 STUDY MATERIAL PDFLifelines of National Economy chapter for Class 10 STUDY MATERIAL PDF
Lifelines of National Economy chapter for Class 10 STUDY MATERIAL PDF
Vivekanand Anglo Vedic Academy
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
haiqairshad
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
math operations ued in python and all used
math operations ued in python and all usedmath operations ued in python and all used
math operations ued in python and all used
ssuser13ffe4
 
Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
MysoreMuleSoftMeetup
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
TechSoup
 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
MJDuyan
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
Standardized tool for Intelligence test.
Standardized tool for Intelligence test.Standardized tool for Intelligence test.
Standardized tool for Intelligence test.
deepaannamalai16
 
Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
danielkiash986
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
imrankhan141184
 
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptxBIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
RidwanHassanYusuf
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching AptitudeUGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
S. Raj Kumar
 
SWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptxSWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptx
zuzanka
 
Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"
National Information Standards Organization (NISO)
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 

Recently uploaded (20)

BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
Lifelines of National Economy chapter for Class 10 STUDY MATERIAL PDF
Lifelines of National Economy chapter for Class 10 STUDY MATERIAL PDFLifelines of National Economy chapter for Class 10 STUDY MATERIAL PDF
Lifelines of National Economy chapter for Class 10 STUDY MATERIAL PDF
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
math operations ued in python and all used
math operations ued in python and all usedmath operations ued in python and all used
math operations ued in python and all used
 
Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
Standardized tool for Intelligence test.
Standardized tool for Intelligence test.Standardized tool for Intelligence test.
Standardized tool for Intelligence test.
 
Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
 
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptxBIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching AptitudeUGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
 
SWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptxSWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptx
 
Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 

Analyzing securewebsites

  • 1. EC05.02b Internet Security Issues 1 E-Commerce I Analyzing Secure Websites
  • 2. EC05.02b Internet Security Issues 2 Secure websites Definition Security confirmation
  • 3. EC05.02b Internet Security Issues 3 What is a secure website? A secure website is one that uses data encryption to protect all information.
  • 4. EC05.02b Internet Security Issues 4 How can you tell a site is secure? There are three ways to confirm that a website is secure: Click the VeriSign icon to verify that the certificate is valid. A secure page should include a small padlock symbol displayed on the bottom line of your browser. On a secure page, in the browser address box, the URL will begin with an https: prefix rather than the standard http: prefix. The s means that the page is secure.
  • 5. EC05.02b Internet Security Issues 5 Identity theft Definition Types of identity theft Examples of identity theft Protect against identity theft
  • 6. EC05.02b Internet Security Issues 6 Definition  Any instance where a person uses someone else's identification documents or other identifiers in order to impersonate that person.  It intrudes into many areas of people’s daily lives.
  • 7. EC05.02b Internet Security Issues 7 Types of identity theft Financial fraud - includes bank fraud, credit card fraud, computer and telecommunications fraud, social program fraud, tax refund fraud, mail fraud, and several more.
  • 8. EC05.02b Internet Security Issues 8 Types of identity theft Criminal activities - involves taking on someone else's identity in order to commit a crime, enter a country, obtain special permits, hide one's own identity, or commit acts of terrorism.
  • 9. EC05.02b Internet Security Issues 9 Types of identity theft Credit card fraud is identity theft in its most simple and common form. It can be accomplished either by a thief who steals your account number or when your pre- approved credit card offers fall into the wrong hands.
  • 10. EC05.02b Internet Security Issues 10 Common modes of identity theft: Dumpster diving - Dug out of trash cans and dumpsters Memorized or copied by sales clerks and waiters Removed from mailboxes in the form of tax notices, financial account statements, and other bills Removed from your employer's files, either secretly or with the help of an inside accomplice Removed from hospital records, usually with the help of an inside accomplice Removed from your financial lender's files Examples of identity theft
  • 11. EC05.02b Internet Security Issues 11 Common modes of identity theft: Removed from your landlord's files Purchased (or found free) in online (or offline) databases Collected from "cloned" Web sites - someone may recreate a legitimate merchant Web site in order to capture your personal information and credit card information when you place an order. Stolen from a merchant database through computer hacking (not as simple as other forms of theft) Snatched using software that mirrors keystrokes to capture credit card account information More Examples of identity theft
  • 12. EC05.02b Internet Security Issues 12 Ways to protect yourself  DON'T give out your Social Security number unless it’s critical.  DESTROY any unwanted credit card offers.  ONLY include your name and address on checks.  SHRED (cross-cut) any sensitive documents before discarding.  DON'T carry your Social Security card, passport, or birth certificate in your wallet or purse.  REVIEW your credit report annually to verify its accuracy.
  • 13. EC05.02b Internet Security Issues 13 More Ways to protect yourself  NEVER give out personal information on the phone to someone you don't know and who initiated the call.  REVIEW your credit card statement each month to make sure there are no unauthorized charges.  DON'T mail bills or documents that contain personal data (like tax forms or checks) from your personal mail box.  If you're ever denied credit, FIND OUT WHY.  REACT QUICKLY if a creditor calls about charges you didn't make.  GUARD deposit slips as closely as you do checks.
  • 14. EC05.02b Internet Security Issues 14 What is Netiquette?  "Netiquette" is network etiquette, the do's and don'ts of online communication.  Netiquette includes both common courtesy online and the informal "rules of the road" of cyberspace.  In other words, Netiquette is a set of rules for behaving properly online.
  • 15. EC05.02b Internet Security Issues 15 Core Rules of Netiquette Rule 1: Remember the Human Rule 2: Adhere to the same standards of behavior online that you follow in real life Rule 3: Know where you are in cyberspace Rule 4: Respect other people's time and bandwidth Rule 5: Make yourself look good online Rule 6: Share expert knowledge Rule 7: Help keep flame wars under control Rule 8: Respect other people's privacy Rule 9: Don't abuse your power Rule 10: Be forgiving of other people's mistakes http://www.albion.com/netiquette/corerules.html
  • 16. EC05.02b Internet Security Issues 16 Sources  “Electronic Commerce.” 1999. http://www.wapa.gov/CorpSrvs/procurmt/ecomm.htm (2 Jan 2006).  Stein, Lincoln D. “WWW Security FAQ: What’s New.” 2000. http://www.w3.org/Security/Faq/www-security-faq.html (2 Jan 2006)  Strom, David. “The Challenge of Electronic Commerce: Selling Lemonade has Never Been This Tough.” 2000. http://www.strom.com/pubwork/ecommerce.html (2 Jan. 2006).  “Bureau of Industry and Security.” US Department of Commerce http://www.bis.doc.gov/ComplianceAndEnforcement/E-Commerce.htm (2 Jan 2006)  Electronic Commerce NC WiseOwl http://www.mywiseowl.com/articles/Electronic_commerce (2 Jan 2006)  Kennedy, Dennis, An Internet Tool Kit for E-Commerce Law Jan 15, 2001 The John Marshall Law School (2 Jan 2006)