SlideShare a Scribd company logo
E-Commerce Security:
A Primer
John Iliadis
jiliad@aegean.gr

E-Commerce Security: A Primer
John Iliadis

Slide 1/70
Presentation Outline
– Introduction to E-Commerce
– Enabling E-Commerce through Security
– A Short Primer on Information Security
– Confronting with E-Commerce Threats
– A Survey of E-Payment and M-Payment Systems
– Case Study: ATM Fraud

E-Commerce Security: A Primer
John Iliadis

Slide 2/70
Introduction to e-Commerce

E-Commerce Security: A Primer
John Iliadis

Slide 3/70
E-Commerce: Business and Technology Innovation

E-commerce introduces new methods in:
–
–
–
–
–

Communications
Business Transactions
Market Structure
Education
Work

E-Commerce Security: A Primer
John Iliadis

Slide 4/70
E-Commerce Pros
– Fast and easy access to information for
individuals
– Reduces costs
– Opens up new markets
– Increases competition
– Lowers prices

E-Commerce Security: A Primer
John Iliadis

Slide 5/70
E-Commerce Cons
– Cyberspace is anarchic
– E-commerce also reduces costs for fraudsters
– It retracts the trustful nature of business which we were
used to practice
• Contracts,
• Invoices,
• Person to person contact,
• Existing legal framework for doing business
– “Digital divide” cultural, gender and race gap in the use
of Internet)
E-Commerce Security: A Primer
John Iliadis

Slide 6/70
Adoption of E-Commerce in Greece
– 38% of the participant companies use
electronic commerce practices
• 12.5% integrated e-commerce to their
business
• the rest 25.5% are opportunistic users of ecommerce
– 47% of the companies are planning to adopt
electronic commerce while the 33% of those
are planning to do so within the next year.
Study by ELTRUN, AUEB, Greece (2001); statistical sample: 240
Greek companies

E-Commerce Security: A Primer
John Iliadis

Slide 7/70
E-commerce & Trust
What is Trust?
– Trust allows us to reasonably rely on the
information or actions of another party.
– Trust is an intrinsic and subjective property
which may be propagated but not transferred

E-Commerce Security: A Primer
John Iliadis

Slide 8/70
E-Commerce & Trust (2)
Trust in traditional commerce environment
– Contracts, invoices, person to person contact,
existing legal framework for doing business in a
trustful manner
Trust in e-commerce
– No apparent legal framework, at least for B2C
commerce; under development
– Distant transactions between unknown parties
• Lack of identification, the way customers
were used to practice it
• Lack of authentication, the way customers
were used to practice it

E-Commerce Security: A Primer
John Iliadis

Slide 9/70
Inherent Need for Trust
– The need for maximising trust is inherent,
because trust enables business, but…
• More Trust = More Risk
– We need to analyse and manage the risk
(eliminate, accept or transfer the risk)
– Risk Management is well understood in
contemporary organisations

E-Commerce Security: A Primer
John Iliadis

Slide 10/70
Enabling E-Commerce
through Security

E-Commerce Security: A Primer
John Iliadis

Slide 11/70
Management Decisions & Risk Analysis
– There is no 100% security
– Need for a solution that balances cost and security
requirements
– Information Security is not a hindering factor, it is
an enabler

E-Commerce Security: A Primer
John Iliadis

Slide 12/70
Costs of Information Security
– Implementation costs
– Costs of incorporating procedures, services and
mechanisms to existing systems
– Costs of deploying new procedures, services and
mechanisms
– Functional costs
• Hardware
• Software
• People
• Change Management
• New Business Processes
E-Commerce Security: A Primer
John Iliadis

Slide 13/70
Where do Security Requirements come from?
– Risk analysis, based on
• Existing business processes
• Interviews with company executives
• Legal issues (e.g. privacy laws)
• Corporate image
• Potential enemies (likelihood of a security attack)

E-Commerce Security: A Primer
John Iliadis

Slide 14/70
Security Life-Cycle

– Risk analysis
– Security policy
– Overall system re-engineering
– Security management of deployed system
– Incident Response
– Business Continuity Planning

E-Commerce Security: A Primer
John Iliadis

Slide 15/70
Risk Analysis!
What is at risk
– Qualitative analysis
– Quantitative analysis
What vulnerabilities can be exploited
– Technical
– Process
– People
Risk management
– Eliminate/reduce risk
– Accept risk
– Transfer risk
Managing risk becomes part of
the everyday business process

E-Commerce Security: A Primer
John Iliadis

Slide 16/70
Information Security Policy
– The basis for all information security efforts
– Directs how issues should be addressed and
technologies used
– The least expensive control to execute, but the most
difficult to implement
– Shaping policy is difficult because policies must:
• Never conflict with laws
• Stand up in court, if challenged
• Be properly administered
E-Commerce Security: A Primer
John Iliadis

Slide 17/70
Need for E-Commerce Security

– The number of cyber attacks skyrocketed
from approximately 22,000 in 2000 to over
82,000 in 2002
– First quarter of 2003 the number was
already over 43,000

Source: US Computer Emergency Response Team (US CERT)

E-Commerce Security: A Primer
John Iliadis

Slide 18/70
A Short Primer on
Information Security

E-Commerce Security: A Primer
John Iliadis

Slide 19/70
A Short Primer on Information Security

– …it is not about technology, or at least not only about
technology
– It is about building Information Systems in a way that
risk is being managed (eliminated, accepted,
transferred)
– Basic Information Security properties: CIA
• Confidentiality
• Integrity
• Availability
E-Commerce Security: A Primer
John Iliadis

Slide 20/70
…more Information Security services
– Authentication: verification of one’s identity
– Access Control: control over what information or resources can be
accessed by specific people
– Non-repudiation: the inability to deny having done something (e.g.
sent an email, received an email, digitally signed stg, etc)
– Privacy: confidentiality of personal information
– Anonymity: confidentiality of identity

E-Commerce Security: A Primer
John Iliadis

Slide 21/70
Challenges for Information Security

Information Systems
Then

Now

•Centralised, Closed,
•private or semi-private, no
access allowed,
•wide spectrum of proprietary
networking/communication
protocols,
•expensive,
•targeted user group,
•early Internet instances.

•Distributed, Open,
•no ownership,
•no central control,
•resilience,
•access to anyone,
•standardised protocols,
•Internet access,
•low-cost access.

E-Commerce Security: A Primer
John Iliadis

Slide 22/70
Some General Principles
– Security must have a total approach—you’re only as
strong as your weakest link
– The risks do not only stem from external sources; most
of the times, they stem from internal sources (e.g.
disgruntled employees)
– Security is not a cousin of Obscurity (“… the only good
locks are open, public and accessible ones”, W. Diffie)

E-Commerce Security: A Primer
John Iliadis

Slide 23/70
Bottom Up Approach to Security
– Systems’ administrators attempting to improve the
security of their systems
– technical expertise of the persons involved
– Seldom works since it lacks critical features:
• Management support
• Employees’ support

E-Commerce Security: A Primer
John Iliadis

Slide 24/70
Top-down Approach to Security
Initiated by higher-level management:
– Issue policy and procedures
– Dictate the expected outcomes
– Determine who is accountable for each action
Advantages:
– Strong management support
– Dedicated IT personnel
– Dedicated funding
– Clear planning
– Support from employees
E-Commerce Security: A Primer
John Iliadis

Slide 25/70
Security Project Team
– Chief Security Officer
– Chief Information Officer
– Risk assessment specialists
– Security administrators
– Security engineers
– System administrators
– End users (!)

E-Commerce Security: A Primer
John Iliadis

Slide 26/70
A Short Introduction to Cryptography

– Symmetric Cryptosystems
– Asymmetric Cryptosystems
– Digital Signatures

E-Commerce Security: A Primer
John Iliadis

Slide 27/70
A Short Introduction to Cryptography:
Symmetric Cryptosystems
Symmetric key: “pass21”

ENCRYPT

Network

Alice

Encrypted
document

document

Symmetric key: “pass21”

Network

DECRYPT

Bob
E-Commerce Security: A Primer
John Iliadis

Encrypted
document

Slide 28/70
A Short Introduction to Cryptography:
Symmetric Cryptosystems
– Both Alice and Bob have the same key (pass21)
– Encryption/decryption:
• Step 1: Alice encrypts the document with key
“pass21” and sends to Bob (e.g. over e-mail) the
encrypted document
• Step2: Bob receives (e.g. e-mail) the encrypted
document and uses key “pass21” to decrypt it and
retrieve the original document
– Alice has got to communicate to Bob the key (“pass21”)
in a secure manner, i.e. no one else must know what
they key was (mail?).
E-Commerce Security: A Primer
John Iliadis

Slide 29/70
A Short Introduction to Cryptography:
Asymmetric Cryptosystems
Alice’s asymmetric PUBLIC key “pert35”

Alice
Alice’s asymmetric PRIVATE key “proe34”

Bob’s asymmetric PUBLIC key “dfgsd34”

Bob
E-Commerce Security: A Primer
John Iliadis

Bob’s asymmetric PRIVATE key “3trer4”
Slide 30/70
A Short Introduction to Cryptography:
Asymmetric Cryptosystems
Bob’s asymmetric PUBLIC key “dfgsd34”

ENCRYPT

Network

Alice

Encrypted
document

document

Bob’s asymmetric
PRIVATE key “3trer4”

Network

DECRYPT
Bob

E-Commerce Security: A Primer
John Iliadis

Encrypted
document

Slide 31/70
A Short Introduction to Cryptography:
Asymmetric Cryptosystems
– Alice has a public and private keypair
– Bob has another public and private keypair
– Encryption/decryption:
• Step 1: Alice encrypts the document with Bob’s
public key “dfgsd34” and sends to Bob (e.g. over email) the encrypted document
• Step2: Bob receives (e.g. e-mail) the encrypted
document and uses his private key “3trer4” to
decrypt it and retrieve the original document
– Bob has got to communicate to Alice his public key
(“dfgsd34”) in a secure manner, i.e. no one else must
be able to tamper with the key (mail?).
E-Commerce Security: A Primer
John Iliadis

Slide 32/70
Symmetric versus Asymmetric Cryptosystems
– Symmetric cryptosystems
• they involve the use of one key only, shared between
A(lice) and B(ob),
• this key must be confidential, i.e. known only to A(lice)
and B(ob).
– Asymmetric cryptosystems
• they involve the use of a keypair (public+private key)
for each party, i.e. Alice has a public and a private
key, while Bob has his own public and his own private
key,
• Bob’s public key must be made known to Alice in a
way that Alice can be sure that the integrity of Bob’s
public key has not been violated.
E-Commerce Security: A Primer
John Iliadis

Slide 33/70
Digital Signatures
Alice’s asymmetric PRIVATE key “3trer4”

SIGN

Network

Alice

Signed
document

document

Alice’s asymmetric
PUBLIC key “dfgsd34”

Network

VERIFY SIGNATURE
Bob

E-Commerce Security: A Primer
John Iliadis

Signed
document

Slide 34/70
Certification Service Provider
Alice’s asymmetric
PRIVATE key “3trer4”

Alice’s asymmetric
PUBLIC key “dfgsd34”
Signed by CSP

Alice
E-Commerce Security: A Primer
John Iliadis

Bob’s asymmetric
PRIVATE key “a3fd43”

Bob’s asymmetric
PUBLIC key “dr34w5”
Signed by CSP

Bob
Slide 35/70
Confronting with
E-Commerce Threats

E-Commerce Security: A Primer
John Iliadis

Slide 36/70
Some Threats in Electronic Transactions
–
–
–
–
–
–
–

Monitoring of communication lines
Shared key guessing
Shared key stealing
Unauthorised modification of information in transit
Masquerade - Web spoofing
Password stealing
Unauthorised access

E-Commerce Security: A Primer
John Iliadis

Slide 37/70
Insecure Electronic Transactions

Entity1
(e.g. Internet user)

Network

Entity2
(e.g. e-banking
Site)

insecure communication channel

E-Commerce Security: A Primer
John Iliadis

Slide 38/70
Facing Threats using Cryptography
– monitoring of communication lines
Encryption with randomly generated shared session key
– shared session key stealing/guessing
-cryptographically secure random key generators
-encryption of shared session key with the public key of
the receiving entity
– Non-authorised modification of (in-transit) information
secure hashing algorithms for message authentication
codes

E-Commerce Security: A Primer
John Iliadis

Slide 39/70
Facing Threats (cont.)
– Masquerade - Web spoofing
Exchange of X509v3 certificates and verification against
a Directory
– Password stealing
Passwords are never transmitted in the network
– Unauthorised access
Local Access Control List. Authentication using
certificates

E-Commerce Security: A Primer
John Iliadis

Slide 40/70
Securing electronic transactions using Public
Key Infrastructure
Entity1
(e.g. Internet user)

Network

Issuing certificates

Entity2
(e.g. e-banking
Site)

Issuing certificates

CSP

E-Commerce Security: A Primer
John Iliadis

Slide 41/70
Certification Service Provider : The
Cornerstone of Public Key Infrastructure
TTP : “an impartial organisation delivering business
confidence, through commercial and technical security
features, to an electronic transaction”
CSPs are Trusted Third Parties that control the life cycle of
certificates

E-Commerce Security: A Primer
John Iliadis

Slide 42/70
Fashion and PKI: Current trends…
– It’s fashionable
– It’s easy to deploy…
– It meets several security requirements, through
a wide set of security services ranging from
confidentiality to public notary
– It’s a panacea!

E-Commerce Security: A Primer
John Iliadis

Slide 43/70
Fashion and PKI: Current trends (cont.)
…however:
– Typical installations and operation of CSP
software, withour prior analysis of requirements
and without designing a Security Policy and a
Certificate Policy, are a present tense situation,
at least on an internal company-wide level. The
resulting problems will soon be present and
tense. PKI is nor a cure-all, neither a magical
solution to security problems

E-Commerce Security: A Primer
John Iliadis

Slide 44/70
Malicious Software

…the software that contains the necessary
instructions to carry out an attack to a computer
system
…attack: the violation (or attempt to violate) the
confidentiality, integrity or availability of a system

E-Commerce Security: A Primer
John Iliadis

Slide 45/70
Species of Malicious Software
Viral software

Non-viral software

•Boot sector viruses

•Trapdoors

•Parasitic Viruses

•Logic Bombs

•Multipartite Viruses

•Trojan Horses

•Resident Viruses

•Worms

•Stealth Viruses

•Bacteria

•Encrypted Viruses

•Hoaxes

•Polymorphic Viruses
•Retro-Viruses
•Overwritters
•Macro Viruses

E-Commerce Security: A Primer
John Iliadis

Slide 46/70
Confronting with Malicious Software
•
•
•
•
•

Security Awareness
Antivirus Software
Operating System logs
Strict access control
Forbid the execution of
mobile code/programs
downloaded from the
Internet
• Firewalls

E-Commerce Security: A Primer
John Iliadis

• Intrusion Detection Tools
• Documented procedure
for recovery from
Malicious Software
infection
• Co-operation with the
organisations that
produce antivirus products

Slide 47/70
Confronting with Attempts to Intrude
Intrusion Detection Systems
– Anomaly Detection

They detect a series of actions that are unusual to
occur, at least in that sequence
– Misuse Models

They detect a series of actions that are known to
violate the security policy
– Specification based

They detect a series of actions that do not comply
with the specifications the IDS has been made
aware of

E-Commerce Security: A Primer
John Iliadis

Slide 48/70
E-commerce and Legal Issues
• Basic liability for online activities (Computer
Misuse Act, UK)
• Legal restrictions on the movement and use of
cryptographic technology (USA)
• Digital signature and electronic signature laws
• Electronic `money'
• Corporate re-organisation and the IT security
manager (Data Protection Act)
• Regulation of CAs/TTPs
• Data privacy legislation
• Taxation of e-commerce

E-Commerce Security: A Primer
John Iliadis

Slide 49/70
Social Engineering

… the process of using social skills to convince
people to reveal access credentials or other
valuable information to the attacker

E-Commerce Security: A Primer
John Iliadis

Slide 50/70
Securing E-Commerce: Summary
Network Security
–
–
–
–
–
–

Firewalls
Packet—filtering routers
Application-level proxy
VPNs
Intrusion Detection Systems (IDS)
Network-based IDS

E-Commerce Security: A Primer
John Iliadis

Slide 51/70
Securing E-Commerce: Summary (2)
Application Security

Other

– Secure Electronic Payments
• Secure Electronic
Transactions (SET),
Secure Socket Layer
(SSL)
• Electronic cash
• Micropayments
– Chipcard protection,
electronic wallets
– Content protection (digital
watermarking)

E-Commerce Security: A Primer
John Iliadis

– Biometric technology
– Public Key
Infrastructure
– Other privacy issues
(remailers, rewebbers
PyTHIA)
– Antivirus Software
– Legal protection (Data
Protection, Digital
Signature, Computer
Misuse Act)
– Security awareness!
Slide 52/70
E-Commerce Security Survey on Greek SMEs (1)
– Questioned whether there has been a security violation
in their network:
• 62% answered no
• 21% answered yes
• 16% answered “Don’t answer”
– Protection measures based on
• Internal knowhow (76%)
• External consultants (24%)
– less than 50% of authorities have elaborated plans for
the continuation of their business activities
Source: E-business forum, Work cycle B, Task Force TF B1,
“Information & Communication Systems Security in e-Business”

E-Commerce Security: A Primer
John Iliadis

Slide 53/70
E-Commerce Security Survey on Greek SMEs (2)
– 47% of authorities have contacted the Personal Data Protection
Agency within the framework of business activities
– 45% of businesses stated that their website/ webpage contains a
privacy statement
– almost all businesses stated that they believe that fears and
hesitations on the protection of personal data have dissuaded
consumers from making internet transactions.
Source: E-business forum, Work cycle B, Task Force TF B1, “Information &
Communication Systems Security in e-Business”

E-Commerce Security: A Primer
John Iliadis

Slide 54/70
A Survey of E-Payment and
M-Payment Systems

E-Commerce Security: A Primer
John Iliadis

Slide 55/70
Secure Electronic Transaction Protocols
–
–
–
–
–
–
–

Visa 3-D Secure international.visa.com/fb/paytech/secure/
Bank Internet Payment System (BIPS, www.fstc.com)
Fix (www.fixprotocol.org)
Homebanking Computer Interface (HBCI, www.hbci.de)
Open Financial Exchange (www.ofx.net/ofx/default.asp)
Secure Electronic Transaction (SET, 56www.setco.org)
Universal Cardholder Authentication Field (UCAF,
http://www.mastercardintl.com/newtechnology/
ecommercesecurity/spa/ucaf.html)
– Jalda (www.jalda.com)
– Magic Axess (www.magicaxess.com)

E-Commerce Security: A Primer
John Iliadis

Slide 56/70
Secure Electronic Transaction Protocols (2)
– XMLPay (www.verisign.com/developer/xml/xmlpay
.html)
– OBI (Opening Buying on the Internet,
www.openbuy.org)
– IOTP (Internet Open Trading Protocol, www.iotp.org/)
– Echeck (www.echeck.org)

E-Commerce Security: A Primer
John Iliadis

Slide 57/70
E-payments: a definition

“… the term electronic payments includes any
payment to businesses, banks or public services
from citizens or businesses, which are executed
through a telecommunications or electronic
network using modern technology”

Source : e-Business Forum, Ε΄ Work Cycle: Work Group Ε3,
Summary of Final Results on Electronic Payment: Problems and
Perspectives

E-Commerce Security: A Primer
John Iliadis

Slide 58/70
E-payments in Greece: a survey
Cash on Delivery

The results in the chart above stem from a study of the Work Group E3, of eBusiness forum. The sample data was 30 electronic stores, selling a
variety of goods.
E-Commerce Security: A Primer
John Iliadis

Slide 59/70
E-payment systems

– E-cash payment systems
– Micropayment systems
– Mobile payment systems

E-Commerce Security: A Primer
John Iliadis

Slide 60/70
E-payment Systems: E-cash payment systems

– Ecash (www.digicash.com)
– CAFÉ (www.semper.org/sirene/projects/cafe/)
– NetCash (www.isi.edu/gost/gost-group/)
– Mondex (www.mondex.com)
– AMADIGI (www.oakington.com/amadigi.htm)
– SmartAxis (www.smartaxis.com)
– Bibit (www.bibit.com)
– CyberCash (www.cybercash.com)

E-Commerce Security: A Primer
John Iliadis

Slide 61/70
Micropayment Systems
– Millicent (www.millicent.com)
– PayWord (theory.lcs.mit.edu/~cis/pubs/rivest/
RivestShamir-mpay.ps)
– MicroMint (theory.lcs.mit.edu/~cis/pubs/rivest/
RivestShamir-mpay.ps)
– CEPS (www.ecbs.org)
– CLIP (www.europay.com)
– Visa Cash (international.visa.com/ps/products/vcash/)
– VISA Direct (www.visa.de/presse/presse_15112002.
htm)
– Yahoo PayDirect (paydirect.yahoo.com)

E-Commerce Security: A Primer
John Iliadis

Slide 62/70
MicroPayment Systems (2)
–
–
–
–
–
–
–
–
–
–

iPIN (www.ipin.com)
W-HA (www.w-ha.com)
WISP (www.trivnet.com)
Telia PayIT (www.telia.se)
AvA (www.leskiosques.com/V2/k_webwap/ava/index.htm)
Cartio MicroPayments (www.cartio.com)
InternetCash (www.internetcash.com)
Coulomb IMPS (www.coulomb.co.uk)
Geldkarte (www.scard.de)
Proton (www.protonworld.com)

E-Commerce Security: A Primer
John Iliadis

Slide 63/70
Mobile payment systems
– TELEPAY (www.ertico.com/activiti/projects/telepay
/home.htm)
– Sm-PaySoc (www.smpaysoc.org)
– Sonera (www.sonera.fi/english/)
– PayBox (www.paybox.net)
– PayByTel (www.paybytel.net)
– M-pay bill (http://mpay-bill.vodafone.co.uk)
– Mobipay (www.mobipay.com)
– Visa Movíl (www.visa.es)
– Street Cash (www.streetcash.de)

E-Commerce Security: A Primer
John Iliadis

Slide 64/70
Mobile payment systems (2)
– Safetrader (www.ehpt.com)
– EartPort (www.earthport.com)
– SPA - Secure Payment Application (http://www.mastercardintl
.com/spa/)
– EMPS (http://www.nordea.fi/E/Merita/sijoita/uutta/990524.ASP
)
– GiSMo (www.gismo.net)
– Fundamo (www.fundamo.com)
– Faircash (www.e-faircash.com)
– eCharge Phone (www.echarge.com)
– Genion m-payment (www.genion.de)

E-Commerce Security: A Primer
John Iliadis

Slide 65/70
Mobile payment systems (3)

–
–
–
–
–
–

Easybuy (http://www.gsmagazine.com/timeasybuy.htm)
NewGenPay (www.newgenpay.com)
eTopup.com (www.etopup.com)
MoxMo (www.moxmo.com)
Beam Trust (www.beamtrust.com)
i-mode (www.nttdocomo.co.jp/english/p_s/imode/index.html)

E-Commerce Security: A Primer
John Iliadis

Slide 66/70
Case Study: ATM Fraud

E-Commerce Security: A Primer
John Iliadis

Slide 67/70
Case Study: Automatic Teller Machines
Security awareness is of paramount importance; the
best security countermeasures can become
useless due to the human factor
Social Engineering
– Sign posted at an ATM (Maryville, Tennessee,
USA) reading
"Due to recent fraud attempts at this ATM
machine, we require you to swipe your card in
the reader below before using the machine“,
– Enquiries over the phone, regarding personal
data of the subject, on behalf of the bank and
for verification purposes,

E-Commerce Security: A Primer
John Iliadis

Slide 68/70
Case Study: Automatic Teller Machines (2)
– Card retained in ATM (plastic flap was glued
over the slot, blocking the card from exiting). As
the customer struggles to get the card, a
passer-by approaches, offers help and asks the
customer his PIN number. After faking an effort
to remove the card, the passer-by leaves, and
when the customer leaves the area too, the
malevolent passer-by returns to collect the
card,
– shoulder surfing,
– card traps (skimming),
– physical violence.

E-Commerce Security: A Primer
John Iliadis

Slide 69/70
Q&A

E-Commerce Security: A Primer
John Iliadis

Slide 70/70

More Related Content

What's hot

E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONSE-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
rausdeen anfas
 
Privacy and Security Issues in E-Commerce
Privacy and Security Issues in E-Commerce  Privacy and Security Issues in E-Commerce
Privacy and Security Issues in E-Commerce
Titas Ahmed
 
Ch19 E Commerce Security
Ch19 E Commerce SecurityCh19 E Commerce Security
Ch19 E Commerce Security
phanleson
 
E Commerce security
E Commerce securityE Commerce security
E Commerce security
Mayank Kashyap
 
Security issues in E-commerce
Security issues in E-commerceSecurity issues in E-commerce
Security issues in E-commerce
nikitaTahilyani1
 
E business security
E business securityE business security
E business security
Sameer Sharma
 
E commerce Security
E commerce Security E commerce Security
E commerce Security
Wisnu Dewobroto
 
E-commerce & Security
E-commerce & SecurityE-commerce & Security
E-commerce & SecurityNetstarterSL
 
Security in E-commerce
Security in E-commerceSecurity in E-commerce
Security in E-commercem8817
 
Eamonn O Raghallaigh The Major Security Issues In E Commerce
Eamonn O Raghallaigh   The Major Security Issues In E CommerceEamonn O Raghallaigh   The Major Security Issues In E Commerce
Eamonn O Raghallaigh The Major Security Issues In E Commerce
EamonnORagh
 
E-commerce Security and Payment
E-commerce Security and PaymentE-commerce Security and Payment
E-commerce Security and Payment
Laguna State Polytechnic University
 
Security issues in e commerce
Security issues in e commerceSecurity issues in e commerce
Security issues in e commerce
sadaf tst
 
04-1 E-commerce Security slides
04-1 E-commerce Security slides04-1 E-commerce Security slides
04-1 E-commerce Security slidesmonchai sopitka
 
e-Commerce: Chapter 6
e-Commerce: Chapter 6e-Commerce: Chapter 6
e-Commerce: Chapter 6
annwhyjay
 
Unit 4 e security
Unit 4 e securityUnit 4 e security
Unit 4 e security
Dr. C.V. Suresh Babu
 
Security@ecommerce
Security@ecommerceSecurity@ecommerce
Security@ecommerce
Om Vikram Thapa
 
Ecommerce Security
Ecommerce SecurityEcommerce Security
Ecommerce Security
Rebecca Jones
 
E-commerce Security and Threats
E-commerce Security and ThreatsE-commerce Security and Threats
E-commerce Security and Threats
BPalmer13
 
Security issues in e business
Security issues in e businessSecurity issues in e business
Security issues in e business
Rahul Kumar
 
Security environment
Security environmentSecurity environment
Security environmentJay Choudhary
 

What's hot (20)

E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONSE-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
 
Privacy and Security Issues in E-Commerce
Privacy and Security Issues in E-Commerce  Privacy and Security Issues in E-Commerce
Privacy and Security Issues in E-Commerce
 
Ch19 E Commerce Security
Ch19 E Commerce SecurityCh19 E Commerce Security
Ch19 E Commerce Security
 
E Commerce security
E Commerce securityE Commerce security
E Commerce security
 
Security issues in E-commerce
Security issues in E-commerceSecurity issues in E-commerce
Security issues in E-commerce
 
E business security
E business securityE business security
E business security
 
E commerce Security
E commerce Security E commerce Security
E commerce Security
 
E-commerce & Security
E-commerce & SecurityE-commerce & Security
E-commerce & Security
 
Security in E-commerce
Security in E-commerceSecurity in E-commerce
Security in E-commerce
 
Eamonn O Raghallaigh The Major Security Issues In E Commerce
Eamonn O Raghallaigh   The Major Security Issues In E CommerceEamonn O Raghallaigh   The Major Security Issues In E Commerce
Eamonn O Raghallaigh The Major Security Issues In E Commerce
 
E-commerce Security and Payment
E-commerce Security and PaymentE-commerce Security and Payment
E-commerce Security and Payment
 
Security issues in e commerce
Security issues in e commerceSecurity issues in e commerce
Security issues in e commerce
 
04-1 E-commerce Security slides
04-1 E-commerce Security slides04-1 E-commerce Security slides
04-1 E-commerce Security slides
 
e-Commerce: Chapter 6
e-Commerce: Chapter 6e-Commerce: Chapter 6
e-Commerce: Chapter 6
 
Unit 4 e security
Unit 4 e securityUnit 4 e security
Unit 4 e security
 
Security@ecommerce
Security@ecommerceSecurity@ecommerce
Security@ecommerce
 
Ecommerce Security
Ecommerce SecurityEcommerce Security
Ecommerce Security
 
E-commerce Security and Threats
E-commerce Security and ThreatsE-commerce Security and Threats
E-commerce Security and Threats
 
Security issues in e business
Security issues in e businessSecurity issues in e business
Security issues in e business
 
Security environment
Security environmentSecurity environment
Security environment
 

Viewers also liked

Aprovechamiento energético de los Residuos de la Industria Agroalimentaria.
Aprovechamiento energético de los Residuos de la Industria Agroalimentaria. Aprovechamiento energético de los Residuos de la Industria Agroalimentaria.
Aprovechamiento energético de los Residuos de la Industria Agroalimentaria.
CTAEX
 
97 drenaje intersección
97 drenaje intersección97 drenaje intersección
97 drenaje intersección
Sierra Francisco Justo
 
Safety Culture Definitions and Enhancement Process
Safety Culture Definitions and Enhancement ProcessSafety Culture Definitions and Enhancement Process
Safety Culture Definitions and Enhancement ProcessISOB
 
El sonido del universo.
El sonido del universo. El sonido del universo.
El sonido del universo.
Octavio Lowry
 
La inteligencia espiritual - Escrito número 7
La inteligencia espiritual - Escrito número 7La inteligencia espiritual - Escrito número 7
La inteligencia espiritual - Escrito número 7
COMUNIDADES CRISTIANAS COMPROMETIDAS EAS DE COLOMBIA
 
Madrid network and clusters april 2013
Madrid network and clusters april 2013Madrid network and clusters april 2013
Madrid network and clusters april 2013Eugenio Fontán
 
Libro complementario | Capítulo 9 | Pedro líder misional conservador | Escuel...
Libro complementario | Capítulo 9 | Pedro líder misional conservador | Escuel...Libro complementario | Capítulo 9 | Pedro líder misional conservador | Escuel...
Libro complementario | Capítulo 9 | Pedro líder misional conservador | Escuel...
jespadill
 
Gestion energetica eficiente
Gestion energetica eficienteGestion energetica eficiente
Gestion energetica eficiente
Rafael Ojeda Ruiz
 
High lights on Sleep physiology
High lights on Sleep physiology High lights on Sleep physiology
High lights on Sleep physiology
Ashraf ElAdawy
 
Los epacientes ante la salud 2.0: una vision de conjunto
Los epacientes ante la salud 2.0:  una vision de conjuntoLos epacientes ante la salud 2.0:  una vision de conjunto
Los epacientes ante la salud 2.0: una vision de conjunto
Universitat Politècnica de València
 
CATALOGO JLC - Repuestos maquinas de Jardin y Bosque - Jorge L Carranza SA
CATALOGO JLC - Repuestos maquinas de Jardin y Bosque - Jorge L Carranza SACATALOGO JLC - Repuestos maquinas de Jardin y Bosque - Jorge L Carranza SA
CATALOGO JLC - Repuestos maquinas de Jardin y Bosque - Jorge L Carranza SA
Martin Funes
 
Grecia Antigua. El Erotismo en la Historia del Arte.
Grecia Antigua. El Erotismo en la Historia del Arte.Grecia Antigua. El Erotismo en la Historia del Arte.
Grecia Antigua. El Erotismo en la Historia del Arte.
Ars Erótica
 
BSidesPGH - Never Surrender - Reducing Social Engineering Risk
BSidesPGH - Never Surrender - Reducing Social Engineering RiskBSidesPGH - Never Surrender - Reducing Social Engineering Risk
BSidesPGH - Never Surrender - Reducing Social Engineering Risk
Rob Ragan
 
Why Asana is Great for Project Management
Why Asana is Great for Project ManagementWhy Asana is Great for Project Management
Why Asana is Great for Project Management
Dom Cushnan
 
La Carrera Científica en el Csic Juan De Dios Alché
La Carrera Científica en el Csic  Juan De Dios AlchéLa Carrera Científica en el Csic  Juan De Dios Alché
La Carrera Científica en el Csic Juan De Dios AlchéLcdo. Biologia
 

Viewers also liked (16)

Aprovechamiento energético de los Residuos de la Industria Agroalimentaria.
Aprovechamiento energético de los Residuos de la Industria Agroalimentaria. Aprovechamiento energético de los Residuos de la Industria Agroalimentaria.
Aprovechamiento energético de los Residuos de la Industria Agroalimentaria.
 
97 drenaje intersección
97 drenaje intersección97 drenaje intersección
97 drenaje intersección
 
Safety Culture Definitions and Enhancement Process
Safety Culture Definitions and Enhancement ProcessSafety Culture Definitions and Enhancement Process
Safety Culture Definitions and Enhancement Process
 
El sonido del universo.
El sonido del universo. El sonido del universo.
El sonido del universo.
 
La inteligencia espiritual - Escrito número 7
La inteligencia espiritual - Escrito número 7La inteligencia espiritual - Escrito número 7
La inteligencia espiritual - Escrito número 7
 
Madrid network and clusters april 2013
Madrid network and clusters april 2013Madrid network and clusters april 2013
Madrid network and clusters april 2013
 
Project_702
Project_702Project_702
Project_702
 
Libro complementario | Capítulo 9 | Pedro líder misional conservador | Escuel...
Libro complementario | Capítulo 9 | Pedro líder misional conservador | Escuel...Libro complementario | Capítulo 9 | Pedro líder misional conservador | Escuel...
Libro complementario | Capítulo 9 | Pedro líder misional conservador | Escuel...
 
Gestion energetica eficiente
Gestion energetica eficienteGestion energetica eficiente
Gestion energetica eficiente
 
High lights on Sleep physiology
High lights on Sleep physiology High lights on Sleep physiology
High lights on Sleep physiology
 
Los epacientes ante la salud 2.0: una vision de conjunto
Los epacientes ante la salud 2.0:  una vision de conjuntoLos epacientes ante la salud 2.0:  una vision de conjunto
Los epacientes ante la salud 2.0: una vision de conjunto
 
CATALOGO JLC - Repuestos maquinas de Jardin y Bosque - Jorge L Carranza SA
CATALOGO JLC - Repuestos maquinas de Jardin y Bosque - Jorge L Carranza SACATALOGO JLC - Repuestos maquinas de Jardin y Bosque - Jorge L Carranza SA
CATALOGO JLC - Repuestos maquinas de Jardin y Bosque - Jorge L Carranza SA
 
Grecia Antigua. El Erotismo en la Historia del Arte.
Grecia Antigua. El Erotismo en la Historia del Arte.Grecia Antigua. El Erotismo en la Historia del Arte.
Grecia Antigua. El Erotismo en la Historia del Arte.
 
BSidesPGH - Never Surrender - Reducing Social Engineering Risk
BSidesPGH - Never Surrender - Reducing Social Engineering RiskBSidesPGH - Never Surrender - Reducing Social Engineering Risk
BSidesPGH - Never Surrender - Reducing Social Engineering Risk
 
Why Asana is Great for Project Management
Why Asana is Great for Project ManagementWhy Asana is Great for Project Management
Why Asana is Great for Project Management
 
La Carrera Científica en el Csic Juan De Dios Alché
La Carrera Científica en el Csic  Juan De Dios AlchéLa Carrera Científica en el Csic  Juan De Dios Alché
La Carrera Científica en el Csic Juan De Dios Alché
 

Similar to E-Commerce Security: A Primer

Case Study: The Role of Human Error in Information Security
Case Study: The Role of Human Error in Information SecurityCase Study: The Role of Human Error in Information Security
Case Study: The Role of Human Error in Information Security
PECB
 
What is Information Security and why you should care ...
What is Information Security and why you should care ...What is Information Security and why you should care ...
What is Information Security and why you should care ...
James Mulhern
 
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Knowledge Group
 
Information Security: Effects On Businesses and Consumers
Information Security: Effects On Businesses and ConsumersInformation Security: Effects On Businesses and Consumers
Information Security: Effects On Businesses and Consumersvictoriamac2009
 
Gus Hunt's Work-Bench Enterprise Security Summit Keynote
Gus Hunt's Work-Bench Enterprise Security Summit KeynoteGus Hunt's Work-Bench Enterprise Security Summit Keynote
Gus Hunt's Work-Bench Enterprise Security Summit Keynote
Work-Bench
 
Network Security
Network Security Network Security
Network Security
Vipul Mosaic
 
Application security meetup 27012021
Application security meetup 27012021Application security meetup 27012021
Application security meetup 27012021
lior mazor
 
MCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk ManagementMCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk Management
William McBorrough
 
MCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk ManagementMCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk Management
William McBorrough
 
Cyber Domain Security
Cyber Domain SecurityCyber Domain Security
Cyber Domain Security
ICSA, LLC
 
Showreel ICSA Technology Conference
Showreel ICSA Technology ConferenceShowreel ICSA Technology Conference
Showreel ICSA Technology Conference
Institute of Chartered Secretaries and Administrators
 
Cyber Security and the National Central Banks
Cyber Security and the National Central BanksCyber Security and the National Central Banks
Cyber Security and the National Central Banks
Community Protection Forum
 
Trending it security threats in the public sector
Trending it security threats in the public sectorTrending it security threats in the public sector
Trending it security threats in the public sector
Core Security
 
unit-1-is1.pptx
unit-1-is1.pptxunit-1-is1.pptx
unit-1-is1.pptx
sorabhsingh17
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and Compliance
Bankingdotcom
 
Intro to Security
Intro to SecurityIntro to Security
Intro to Security
primeteacher32
 
Data Security in the Insurance Industry: what you need to know about data pro...
Data Security in the Insurance Industry: what you need to know about data pro...Data Security in the Insurance Industry: what you need to know about data pro...
Data Security in the Insurance Industry: what you need to know about data pro...
XeniT Solutions nv
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
Mohan Jadhav
 
CRI Retail Cyber Threats
CRI Retail Cyber ThreatsCRI Retail Cyber Threats
CRI Retail Cyber Threats
OCTF Industry Engagement
 

Similar to E-Commerce Security: A Primer (20)

Case Study: The Role of Human Error in Information Security
Case Study: The Role of Human Error in Information SecurityCase Study: The Role of Human Error in Information Security
Case Study: The Role of Human Error in Information Security
 
What is Information Security and why you should care ...
What is Information Security and why you should care ...What is Information Security and why you should care ...
What is Information Security and why you should care ...
 
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
 
Information Security: Effects On Businesses and Consumers
Information Security: Effects On Businesses and ConsumersInformation Security: Effects On Businesses and Consumers
Information Security: Effects On Businesses and Consumers
 
Gus Hunt's Work-Bench Enterprise Security Summit Keynote
Gus Hunt's Work-Bench Enterprise Security Summit KeynoteGus Hunt's Work-Bench Enterprise Security Summit Keynote
Gus Hunt's Work-Bench Enterprise Security Summit Keynote
 
Network Security
Network Security Network Security
Network Security
 
Intro
IntroIntro
Intro
 
Application security meetup 27012021
Application security meetup 27012021Application security meetup 27012021
Application security meetup 27012021
 
MCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk ManagementMCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk Management
 
MCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk ManagementMCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk Management
 
Cyber Domain Security
Cyber Domain SecurityCyber Domain Security
Cyber Domain Security
 
Showreel ICSA Technology Conference
Showreel ICSA Technology ConferenceShowreel ICSA Technology Conference
Showreel ICSA Technology Conference
 
Cyber Security and the National Central Banks
Cyber Security and the National Central BanksCyber Security and the National Central Banks
Cyber Security and the National Central Banks
 
Trending it security threats in the public sector
Trending it security threats in the public sectorTrending it security threats in the public sector
Trending it security threats in the public sector
 
unit-1-is1.pptx
unit-1-is1.pptxunit-1-is1.pptx
unit-1-is1.pptx
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and Compliance
 
Intro to Security
Intro to SecurityIntro to Security
Intro to Security
 
Data Security in the Insurance Industry: what you need to know about data pro...
Data Security in the Insurance Industry: what you need to know about data pro...Data Security in the Insurance Industry: what you need to know about data pro...
Data Security in the Insurance Industry: what you need to know about data pro...
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
 
CRI Retail Cyber Threats
CRI Retail Cyber ThreatsCRI Retail Cyber Threats
CRI Retail Cyber Threats
 

More from John ILIADIS

Information security and digital payments; thoughts about current trends
Information security and digital payments; thoughts about current trendsInformation security and digital payments; thoughts about current trends
Information security and digital payments; thoughts about current trends
John ILIADIS
 
Security in RegTech's Playground
Security in RegTech's PlaygroundSecurity in RegTech's Playground
Security in RegTech's Playground
John ILIADIS
 
Malicious Software. In Greek.
Malicious Software. In Greek.Malicious Software. In Greek.
Malicious Software. In Greek.
John ILIADIS
 
PKI : The role of TTPs for the Development of secure Transaction Systems
PKI : The role of TTPs for the Development of secure Transaction SystemsPKI : The role of TTPs for the Development of secure Transaction Systems
PKI : The role of TTPs for the Development of secure Transaction Systems
John ILIADIS
 
Reshaping Key Management: A Tale of Two Decades
Reshaping Key Management: A Tale of Two DecadesReshaping Key Management: A Tale of Two Decades
Reshaping Key Management: A Tale of Two Decades
John ILIADIS
 
PKI: Is it worth something, or what?
PKI: Is it worth something, or what?PKI: Is it worth something, or what?
PKI: Is it worth something, or what?
John ILIADIS
 
Certificate Revocation: What Is It And What Should It Be
Certificate Revocation: What Is It And What Should It BeCertificate Revocation: What Is It And What Should It Be
Certificate Revocation: What Is It And What Should It Be
John ILIADIS
 
Evaluating Open Source Security Software
Evaluating Open Source Security SoftwareEvaluating Open Source Security Software
Evaluating Open Source Security Software
John ILIADIS
 
ADoCSI: Towards a Transparent Mechanism for Disseminating Certificate Status ...
ADoCSI: Towards a Transparent Mechanism for Disseminating Certificate Status ...ADoCSI: Towards a Transparent Mechanism for Disseminating Certificate Status ...
ADoCSI: Towards a Transparent Mechanism for Disseminating Certificate Status ...
John ILIADIS
 
PKI: Overpromising and Underdelivering
PKI: Overpromising and UnderdeliveringPKI: Overpromising and Underdelivering
PKI: Overpromising and Underdelivering
John ILIADIS
 
What is (not) Network Security
What is (not) Network SecurityWhat is (not) Network Security
What is (not) Network Security
John ILIADIS
 
Network Security: Putting Theory into Practice, the Wrong Way
Network Security: Putting Theory into Practice, the Wrong WayNetwork Security: Putting Theory into Practice, the Wrong Way
Network Security: Putting Theory into Practice, the Wrong Way
John ILIADIS
 
Addressing security issues in programming languages for mobile code - Confere...
Addressing security issues in programming languages for mobile code - Confere...Addressing security issues in programming languages for mobile code - Confere...
Addressing security issues in programming languages for mobile code - Confere...
John ILIADIS
 

More from John ILIADIS (13)

Information security and digital payments; thoughts about current trends
Information security and digital payments; thoughts about current trendsInformation security and digital payments; thoughts about current trends
Information security and digital payments; thoughts about current trends
 
Security in RegTech's Playground
Security in RegTech's PlaygroundSecurity in RegTech's Playground
Security in RegTech's Playground
 
Malicious Software. In Greek.
Malicious Software. In Greek.Malicious Software. In Greek.
Malicious Software. In Greek.
 
PKI : The role of TTPs for the Development of secure Transaction Systems
PKI : The role of TTPs for the Development of secure Transaction SystemsPKI : The role of TTPs for the Development of secure Transaction Systems
PKI : The role of TTPs for the Development of secure Transaction Systems
 
Reshaping Key Management: A Tale of Two Decades
Reshaping Key Management: A Tale of Two DecadesReshaping Key Management: A Tale of Two Decades
Reshaping Key Management: A Tale of Two Decades
 
PKI: Is it worth something, or what?
PKI: Is it worth something, or what?PKI: Is it worth something, or what?
PKI: Is it worth something, or what?
 
Certificate Revocation: What Is It And What Should It Be
Certificate Revocation: What Is It And What Should It BeCertificate Revocation: What Is It And What Should It Be
Certificate Revocation: What Is It And What Should It Be
 
Evaluating Open Source Security Software
Evaluating Open Source Security SoftwareEvaluating Open Source Security Software
Evaluating Open Source Security Software
 
ADoCSI: Towards a Transparent Mechanism for Disseminating Certificate Status ...
ADoCSI: Towards a Transparent Mechanism for Disseminating Certificate Status ...ADoCSI: Towards a Transparent Mechanism for Disseminating Certificate Status ...
ADoCSI: Towards a Transparent Mechanism for Disseminating Certificate Status ...
 
PKI: Overpromising and Underdelivering
PKI: Overpromising and UnderdeliveringPKI: Overpromising and Underdelivering
PKI: Overpromising and Underdelivering
 
What is (not) Network Security
What is (not) Network SecurityWhat is (not) Network Security
What is (not) Network Security
 
Network Security: Putting Theory into Practice, the Wrong Way
Network Security: Putting Theory into Practice, the Wrong WayNetwork Security: Putting Theory into Practice, the Wrong Way
Network Security: Putting Theory into Practice, the Wrong Way
 
Addressing security issues in programming languages for mobile code - Confere...
Addressing security issues in programming languages for mobile code - Confere...Addressing security issues in programming languages for mobile code - Confere...
Addressing security issues in programming languages for mobile code - Confere...
 

Recently uploaded

Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
Globus
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
Jen Stirrup
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 

Recently uploaded (20)

Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 

E-Commerce Security: A Primer

  • 1. E-Commerce Security: A Primer John Iliadis jiliad@aegean.gr E-Commerce Security: A Primer John Iliadis Slide 1/70
  • 2. Presentation Outline – Introduction to E-Commerce – Enabling E-Commerce through Security – A Short Primer on Information Security – Confronting with E-Commerce Threats – A Survey of E-Payment and M-Payment Systems – Case Study: ATM Fraud E-Commerce Security: A Primer John Iliadis Slide 2/70
  • 3. Introduction to e-Commerce E-Commerce Security: A Primer John Iliadis Slide 3/70
  • 4. E-Commerce: Business and Technology Innovation E-commerce introduces new methods in: – – – – – Communications Business Transactions Market Structure Education Work E-Commerce Security: A Primer John Iliadis Slide 4/70
  • 5. E-Commerce Pros – Fast and easy access to information for individuals – Reduces costs – Opens up new markets – Increases competition – Lowers prices E-Commerce Security: A Primer John Iliadis Slide 5/70
  • 6. E-Commerce Cons – Cyberspace is anarchic – E-commerce also reduces costs for fraudsters – It retracts the trustful nature of business which we were used to practice • Contracts, • Invoices, • Person to person contact, • Existing legal framework for doing business – “Digital divide” cultural, gender and race gap in the use of Internet) E-Commerce Security: A Primer John Iliadis Slide 6/70
  • 7. Adoption of E-Commerce in Greece – 38% of the participant companies use electronic commerce practices • 12.5% integrated e-commerce to their business • the rest 25.5% are opportunistic users of ecommerce – 47% of the companies are planning to adopt electronic commerce while the 33% of those are planning to do so within the next year. Study by ELTRUN, AUEB, Greece (2001); statistical sample: 240 Greek companies E-Commerce Security: A Primer John Iliadis Slide 7/70
  • 8. E-commerce & Trust What is Trust? – Trust allows us to reasonably rely on the information or actions of another party. – Trust is an intrinsic and subjective property which may be propagated but not transferred E-Commerce Security: A Primer John Iliadis Slide 8/70
  • 9. E-Commerce & Trust (2) Trust in traditional commerce environment – Contracts, invoices, person to person contact, existing legal framework for doing business in a trustful manner Trust in e-commerce – No apparent legal framework, at least for B2C commerce; under development – Distant transactions between unknown parties • Lack of identification, the way customers were used to practice it • Lack of authentication, the way customers were used to practice it E-Commerce Security: A Primer John Iliadis Slide 9/70
  • 10. Inherent Need for Trust – The need for maximising trust is inherent, because trust enables business, but… • More Trust = More Risk – We need to analyse and manage the risk (eliminate, accept or transfer the risk) – Risk Management is well understood in contemporary organisations E-Commerce Security: A Primer John Iliadis Slide 10/70
  • 11. Enabling E-Commerce through Security E-Commerce Security: A Primer John Iliadis Slide 11/70
  • 12. Management Decisions & Risk Analysis – There is no 100% security – Need for a solution that balances cost and security requirements – Information Security is not a hindering factor, it is an enabler E-Commerce Security: A Primer John Iliadis Slide 12/70
  • 13. Costs of Information Security – Implementation costs – Costs of incorporating procedures, services and mechanisms to existing systems – Costs of deploying new procedures, services and mechanisms – Functional costs • Hardware • Software • People • Change Management • New Business Processes E-Commerce Security: A Primer John Iliadis Slide 13/70
  • 14. Where do Security Requirements come from? – Risk analysis, based on • Existing business processes • Interviews with company executives • Legal issues (e.g. privacy laws) • Corporate image • Potential enemies (likelihood of a security attack) E-Commerce Security: A Primer John Iliadis Slide 14/70
  • 15. Security Life-Cycle – Risk analysis – Security policy – Overall system re-engineering – Security management of deployed system – Incident Response – Business Continuity Planning E-Commerce Security: A Primer John Iliadis Slide 15/70
  • 16. Risk Analysis! What is at risk – Qualitative analysis – Quantitative analysis What vulnerabilities can be exploited – Technical – Process – People Risk management – Eliminate/reduce risk – Accept risk – Transfer risk Managing risk becomes part of the everyday business process E-Commerce Security: A Primer John Iliadis Slide 16/70
  • 17. Information Security Policy – The basis for all information security efforts – Directs how issues should be addressed and technologies used – The least expensive control to execute, but the most difficult to implement – Shaping policy is difficult because policies must: • Never conflict with laws • Stand up in court, if challenged • Be properly administered E-Commerce Security: A Primer John Iliadis Slide 17/70
  • 18. Need for E-Commerce Security – The number of cyber attacks skyrocketed from approximately 22,000 in 2000 to over 82,000 in 2002 – First quarter of 2003 the number was already over 43,000 Source: US Computer Emergency Response Team (US CERT) E-Commerce Security: A Primer John Iliadis Slide 18/70
  • 19. A Short Primer on Information Security E-Commerce Security: A Primer John Iliadis Slide 19/70
  • 20. A Short Primer on Information Security – …it is not about technology, or at least not only about technology – It is about building Information Systems in a way that risk is being managed (eliminated, accepted, transferred) – Basic Information Security properties: CIA • Confidentiality • Integrity • Availability E-Commerce Security: A Primer John Iliadis Slide 20/70
  • 21. …more Information Security services – Authentication: verification of one’s identity – Access Control: control over what information or resources can be accessed by specific people – Non-repudiation: the inability to deny having done something (e.g. sent an email, received an email, digitally signed stg, etc) – Privacy: confidentiality of personal information – Anonymity: confidentiality of identity E-Commerce Security: A Primer John Iliadis Slide 21/70
  • 22. Challenges for Information Security Information Systems Then Now •Centralised, Closed, •private or semi-private, no access allowed, •wide spectrum of proprietary networking/communication protocols, •expensive, •targeted user group, •early Internet instances. •Distributed, Open, •no ownership, •no central control, •resilience, •access to anyone, •standardised protocols, •Internet access, •low-cost access. E-Commerce Security: A Primer John Iliadis Slide 22/70
  • 23. Some General Principles – Security must have a total approach—you’re only as strong as your weakest link – The risks do not only stem from external sources; most of the times, they stem from internal sources (e.g. disgruntled employees) – Security is not a cousin of Obscurity (“… the only good locks are open, public and accessible ones”, W. Diffie) E-Commerce Security: A Primer John Iliadis Slide 23/70
  • 24. Bottom Up Approach to Security – Systems’ administrators attempting to improve the security of their systems – technical expertise of the persons involved – Seldom works since it lacks critical features: • Management support • Employees’ support E-Commerce Security: A Primer John Iliadis Slide 24/70
  • 25. Top-down Approach to Security Initiated by higher-level management: – Issue policy and procedures – Dictate the expected outcomes – Determine who is accountable for each action Advantages: – Strong management support – Dedicated IT personnel – Dedicated funding – Clear planning – Support from employees E-Commerce Security: A Primer John Iliadis Slide 25/70
  • 26. Security Project Team – Chief Security Officer – Chief Information Officer – Risk assessment specialists – Security administrators – Security engineers – System administrators – End users (!) E-Commerce Security: A Primer John Iliadis Slide 26/70
  • 27. A Short Introduction to Cryptography – Symmetric Cryptosystems – Asymmetric Cryptosystems – Digital Signatures E-Commerce Security: A Primer John Iliadis Slide 27/70
  • 28. A Short Introduction to Cryptography: Symmetric Cryptosystems Symmetric key: “pass21” ENCRYPT Network Alice Encrypted document document Symmetric key: “pass21” Network DECRYPT Bob E-Commerce Security: A Primer John Iliadis Encrypted document Slide 28/70
  • 29. A Short Introduction to Cryptography: Symmetric Cryptosystems – Both Alice and Bob have the same key (pass21) – Encryption/decryption: • Step 1: Alice encrypts the document with key “pass21” and sends to Bob (e.g. over e-mail) the encrypted document • Step2: Bob receives (e.g. e-mail) the encrypted document and uses key “pass21” to decrypt it and retrieve the original document – Alice has got to communicate to Bob the key (“pass21”) in a secure manner, i.e. no one else must know what they key was (mail?). E-Commerce Security: A Primer John Iliadis Slide 29/70
  • 30. A Short Introduction to Cryptography: Asymmetric Cryptosystems Alice’s asymmetric PUBLIC key “pert35” Alice Alice’s asymmetric PRIVATE key “proe34” Bob’s asymmetric PUBLIC key “dfgsd34” Bob E-Commerce Security: A Primer John Iliadis Bob’s asymmetric PRIVATE key “3trer4” Slide 30/70
  • 31. A Short Introduction to Cryptography: Asymmetric Cryptosystems Bob’s asymmetric PUBLIC key “dfgsd34” ENCRYPT Network Alice Encrypted document document Bob’s asymmetric PRIVATE key “3trer4” Network DECRYPT Bob E-Commerce Security: A Primer John Iliadis Encrypted document Slide 31/70
  • 32. A Short Introduction to Cryptography: Asymmetric Cryptosystems – Alice has a public and private keypair – Bob has another public and private keypair – Encryption/decryption: • Step 1: Alice encrypts the document with Bob’s public key “dfgsd34” and sends to Bob (e.g. over email) the encrypted document • Step2: Bob receives (e.g. e-mail) the encrypted document and uses his private key “3trer4” to decrypt it and retrieve the original document – Bob has got to communicate to Alice his public key (“dfgsd34”) in a secure manner, i.e. no one else must be able to tamper with the key (mail?). E-Commerce Security: A Primer John Iliadis Slide 32/70
  • 33. Symmetric versus Asymmetric Cryptosystems – Symmetric cryptosystems • they involve the use of one key only, shared between A(lice) and B(ob), • this key must be confidential, i.e. known only to A(lice) and B(ob). – Asymmetric cryptosystems • they involve the use of a keypair (public+private key) for each party, i.e. Alice has a public and a private key, while Bob has his own public and his own private key, • Bob’s public key must be made known to Alice in a way that Alice can be sure that the integrity of Bob’s public key has not been violated. E-Commerce Security: A Primer John Iliadis Slide 33/70
  • 34. Digital Signatures Alice’s asymmetric PRIVATE key “3trer4” SIGN Network Alice Signed document document Alice’s asymmetric PUBLIC key “dfgsd34” Network VERIFY SIGNATURE Bob E-Commerce Security: A Primer John Iliadis Signed document Slide 34/70
  • 35. Certification Service Provider Alice’s asymmetric PRIVATE key “3trer4” Alice’s asymmetric PUBLIC key “dfgsd34” Signed by CSP Alice E-Commerce Security: A Primer John Iliadis Bob’s asymmetric PRIVATE key “a3fd43” Bob’s asymmetric PUBLIC key “dr34w5” Signed by CSP Bob Slide 35/70
  • 36. Confronting with E-Commerce Threats E-Commerce Security: A Primer John Iliadis Slide 36/70
  • 37. Some Threats in Electronic Transactions – – – – – – – Monitoring of communication lines Shared key guessing Shared key stealing Unauthorised modification of information in transit Masquerade - Web spoofing Password stealing Unauthorised access E-Commerce Security: A Primer John Iliadis Slide 37/70
  • 38. Insecure Electronic Transactions Entity1 (e.g. Internet user) Network Entity2 (e.g. e-banking Site) insecure communication channel E-Commerce Security: A Primer John Iliadis Slide 38/70
  • 39. Facing Threats using Cryptography – monitoring of communication lines Encryption with randomly generated shared session key – shared session key stealing/guessing -cryptographically secure random key generators -encryption of shared session key with the public key of the receiving entity – Non-authorised modification of (in-transit) information secure hashing algorithms for message authentication codes E-Commerce Security: A Primer John Iliadis Slide 39/70
  • 40. Facing Threats (cont.) – Masquerade - Web spoofing Exchange of X509v3 certificates and verification against a Directory – Password stealing Passwords are never transmitted in the network – Unauthorised access Local Access Control List. Authentication using certificates E-Commerce Security: A Primer John Iliadis Slide 40/70
  • 41. Securing electronic transactions using Public Key Infrastructure Entity1 (e.g. Internet user) Network Issuing certificates Entity2 (e.g. e-banking Site) Issuing certificates CSP E-Commerce Security: A Primer John Iliadis Slide 41/70
  • 42. Certification Service Provider : The Cornerstone of Public Key Infrastructure TTP : “an impartial organisation delivering business confidence, through commercial and technical security features, to an electronic transaction” CSPs are Trusted Third Parties that control the life cycle of certificates E-Commerce Security: A Primer John Iliadis Slide 42/70
  • 43. Fashion and PKI: Current trends… – It’s fashionable – It’s easy to deploy… – It meets several security requirements, through a wide set of security services ranging from confidentiality to public notary – It’s a panacea! E-Commerce Security: A Primer John Iliadis Slide 43/70
  • 44. Fashion and PKI: Current trends (cont.) …however: – Typical installations and operation of CSP software, withour prior analysis of requirements and without designing a Security Policy and a Certificate Policy, are a present tense situation, at least on an internal company-wide level. The resulting problems will soon be present and tense. PKI is nor a cure-all, neither a magical solution to security problems E-Commerce Security: A Primer John Iliadis Slide 44/70
  • 45. Malicious Software …the software that contains the necessary instructions to carry out an attack to a computer system …attack: the violation (or attempt to violate) the confidentiality, integrity or availability of a system E-Commerce Security: A Primer John Iliadis Slide 45/70
  • 46. Species of Malicious Software Viral software Non-viral software •Boot sector viruses •Trapdoors •Parasitic Viruses •Logic Bombs •Multipartite Viruses •Trojan Horses •Resident Viruses •Worms •Stealth Viruses •Bacteria •Encrypted Viruses •Hoaxes •Polymorphic Viruses •Retro-Viruses •Overwritters •Macro Viruses E-Commerce Security: A Primer John Iliadis Slide 46/70
  • 47. Confronting with Malicious Software • • • • • Security Awareness Antivirus Software Operating System logs Strict access control Forbid the execution of mobile code/programs downloaded from the Internet • Firewalls E-Commerce Security: A Primer John Iliadis • Intrusion Detection Tools • Documented procedure for recovery from Malicious Software infection • Co-operation with the organisations that produce antivirus products Slide 47/70
  • 48. Confronting with Attempts to Intrude Intrusion Detection Systems – Anomaly Detection They detect a series of actions that are unusual to occur, at least in that sequence – Misuse Models They detect a series of actions that are known to violate the security policy – Specification based They detect a series of actions that do not comply with the specifications the IDS has been made aware of E-Commerce Security: A Primer John Iliadis Slide 48/70
  • 49. E-commerce and Legal Issues • Basic liability for online activities (Computer Misuse Act, UK) • Legal restrictions on the movement and use of cryptographic technology (USA) • Digital signature and electronic signature laws • Electronic `money' • Corporate re-organisation and the IT security manager (Data Protection Act) • Regulation of CAs/TTPs • Data privacy legislation • Taxation of e-commerce E-Commerce Security: A Primer John Iliadis Slide 49/70
  • 50. Social Engineering … the process of using social skills to convince people to reveal access credentials or other valuable information to the attacker E-Commerce Security: A Primer John Iliadis Slide 50/70
  • 51. Securing E-Commerce: Summary Network Security – – – – – – Firewalls Packet—filtering routers Application-level proxy VPNs Intrusion Detection Systems (IDS) Network-based IDS E-Commerce Security: A Primer John Iliadis Slide 51/70
  • 52. Securing E-Commerce: Summary (2) Application Security Other – Secure Electronic Payments • Secure Electronic Transactions (SET), Secure Socket Layer (SSL) • Electronic cash • Micropayments – Chipcard protection, electronic wallets – Content protection (digital watermarking) E-Commerce Security: A Primer John Iliadis – Biometric technology – Public Key Infrastructure – Other privacy issues (remailers, rewebbers PyTHIA) – Antivirus Software – Legal protection (Data Protection, Digital Signature, Computer Misuse Act) – Security awareness! Slide 52/70
  • 53. E-Commerce Security Survey on Greek SMEs (1) – Questioned whether there has been a security violation in their network: • 62% answered no • 21% answered yes • 16% answered “Don’t answer” – Protection measures based on • Internal knowhow (76%) • External consultants (24%) – less than 50% of authorities have elaborated plans for the continuation of their business activities Source: E-business forum, Work cycle B, Task Force TF B1, “Information & Communication Systems Security in e-Business” E-Commerce Security: A Primer John Iliadis Slide 53/70
  • 54. E-Commerce Security Survey on Greek SMEs (2) – 47% of authorities have contacted the Personal Data Protection Agency within the framework of business activities – 45% of businesses stated that their website/ webpage contains a privacy statement – almost all businesses stated that they believe that fears and hesitations on the protection of personal data have dissuaded consumers from making internet transactions. Source: E-business forum, Work cycle B, Task Force TF B1, “Information & Communication Systems Security in e-Business” E-Commerce Security: A Primer John Iliadis Slide 54/70
  • 55. A Survey of E-Payment and M-Payment Systems E-Commerce Security: A Primer John Iliadis Slide 55/70
  • 56. Secure Electronic Transaction Protocols – – – – – – – Visa 3-D Secure international.visa.com/fb/paytech/secure/ Bank Internet Payment System (BIPS, www.fstc.com) Fix (www.fixprotocol.org) Homebanking Computer Interface (HBCI, www.hbci.de) Open Financial Exchange (www.ofx.net/ofx/default.asp) Secure Electronic Transaction (SET, 56www.setco.org) Universal Cardholder Authentication Field (UCAF, http://www.mastercardintl.com/newtechnology/ ecommercesecurity/spa/ucaf.html) – Jalda (www.jalda.com) – Magic Axess (www.magicaxess.com) E-Commerce Security: A Primer John Iliadis Slide 56/70
  • 57. Secure Electronic Transaction Protocols (2) – XMLPay (www.verisign.com/developer/xml/xmlpay .html) – OBI (Opening Buying on the Internet, www.openbuy.org) – IOTP (Internet Open Trading Protocol, www.iotp.org/) – Echeck (www.echeck.org) E-Commerce Security: A Primer John Iliadis Slide 57/70
  • 58. E-payments: a definition “… the term electronic payments includes any payment to businesses, banks or public services from citizens or businesses, which are executed through a telecommunications or electronic network using modern technology” Source : e-Business Forum, Ε΄ Work Cycle: Work Group Ε3, Summary of Final Results on Electronic Payment: Problems and Perspectives E-Commerce Security: A Primer John Iliadis Slide 58/70
  • 59. E-payments in Greece: a survey Cash on Delivery The results in the chart above stem from a study of the Work Group E3, of eBusiness forum. The sample data was 30 electronic stores, selling a variety of goods. E-Commerce Security: A Primer John Iliadis Slide 59/70
  • 60. E-payment systems – E-cash payment systems – Micropayment systems – Mobile payment systems E-Commerce Security: A Primer John Iliadis Slide 60/70
  • 61. E-payment Systems: E-cash payment systems – Ecash (www.digicash.com) – CAFÉ (www.semper.org/sirene/projects/cafe/) – NetCash (www.isi.edu/gost/gost-group/) – Mondex (www.mondex.com) – AMADIGI (www.oakington.com/amadigi.htm) – SmartAxis (www.smartaxis.com) – Bibit (www.bibit.com) – CyberCash (www.cybercash.com) E-Commerce Security: A Primer John Iliadis Slide 61/70
  • 62. Micropayment Systems – Millicent (www.millicent.com) – PayWord (theory.lcs.mit.edu/~cis/pubs/rivest/ RivestShamir-mpay.ps) – MicroMint (theory.lcs.mit.edu/~cis/pubs/rivest/ RivestShamir-mpay.ps) – CEPS (www.ecbs.org) – CLIP (www.europay.com) – Visa Cash (international.visa.com/ps/products/vcash/) – VISA Direct (www.visa.de/presse/presse_15112002. htm) – Yahoo PayDirect (paydirect.yahoo.com) E-Commerce Security: A Primer John Iliadis Slide 62/70
  • 63. MicroPayment Systems (2) – – – – – – – – – – iPIN (www.ipin.com) W-HA (www.w-ha.com) WISP (www.trivnet.com) Telia PayIT (www.telia.se) AvA (www.leskiosques.com/V2/k_webwap/ava/index.htm) Cartio MicroPayments (www.cartio.com) InternetCash (www.internetcash.com) Coulomb IMPS (www.coulomb.co.uk) Geldkarte (www.scard.de) Proton (www.protonworld.com) E-Commerce Security: A Primer John Iliadis Slide 63/70
  • 64. Mobile payment systems – TELEPAY (www.ertico.com/activiti/projects/telepay /home.htm) – Sm-PaySoc (www.smpaysoc.org) – Sonera (www.sonera.fi/english/) – PayBox (www.paybox.net) – PayByTel (www.paybytel.net) – M-pay bill (http://mpay-bill.vodafone.co.uk) – Mobipay (www.mobipay.com) – Visa Movíl (www.visa.es) – Street Cash (www.streetcash.de) E-Commerce Security: A Primer John Iliadis Slide 64/70
  • 65. Mobile payment systems (2) – Safetrader (www.ehpt.com) – EartPort (www.earthport.com) – SPA - Secure Payment Application (http://www.mastercardintl .com/spa/) – EMPS (http://www.nordea.fi/E/Merita/sijoita/uutta/990524.ASP ) – GiSMo (www.gismo.net) – Fundamo (www.fundamo.com) – Faircash (www.e-faircash.com) – eCharge Phone (www.echarge.com) – Genion m-payment (www.genion.de) E-Commerce Security: A Primer John Iliadis Slide 65/70
  • 66. Mobile payment systems (3) – – – – – – Easybuy (http://www.gsmagazine.com/timeasybuy.htm) NewGenPay (www.newgenpay.com) eTopup.com (www.etopup.com) MoxMo (www.moxmo.com) Beam Trust (www.beamtrust.com) i-mode (www.nttdocomo.co.jp/english/p_s/imode/index.html) E-Commerce Security: A Primer John Iliadis Slide 66/70
  • 67. Case Study: ATM Fraud E-Commerce Security: A Primer John Iliadis Slide 67/70
  • 68. Case Study: Automatic Teller Machines Security awareness is of paramount importance; the best security countermeasures can become useless due to the human factor Social Engineering – Sign posted at an ATM (Maryville, Tennessee, USA) reading "Due to recent fraud attempts at this ATM machine, we require you to swipe your card in the reader below before using the machine“, – Enquiries over the phone, regarding personal data of the subject, on behalf of the bank and for verification purposes, E-Commerce Security: A Primer John Iliadis Slide 68/70
  • 69. Case Study: Automatic Teller Machines (2) – Card retained in ATM (plastic flap was glued over the slot, blocking the card from exiting). As the customer struggles to get the card, a passer-by approaches, offers help and asks the customer his PIN number. After faking an effort to remove the card, the passer-by leaves, and when the customer leaves the area too, the malevolent passer-by returns to collect the card, – shoulder surfing, – card traps (skimming), – physical violence. E-Commerce Security: A Primer John Iliadis Slide 69/70
  • 70. Q&A E-Commerce Security: A Primer John Iliadis Slide 70/70