SlideShare a Scribd company logo
1 of 22
E-COMMERCE SECURITY AND PAYMENT SYSTEMS
LEARNING OBJECTIVES
Understand the scope of e-commerce crime and security problems,
Identify the key security threats in the e-commerce environment.
Describe how technology helps secure Internet communications channels and protect networks,
servers, and clients. Identify the major e-commerce payment systems in use today.
Describe the features and functionality of electronic billing presentment and payment systems
THE E-COMMERCE SECURITY ENVIRONMENT
DIMENSIONS OF E-COMMERCE SECURITY
Integrity
Nonrepudiation
Authenticity
Confidentiality
Privacy
Availability
DIMENSIONS OF E-COMMERCE SECURITY
Integrity the ability to ensure that information being displayed on a website or transmitted or received over the Internet
has not been altered in any way by an unauthorized party
Nonrepudiation the ability to ensure that e-commerce participants do not deny (i.e., repudiate) their online actions
Authenticity the ability to identify the identity of a person or entity with whom you are dealing on the Interne
Confidentiality the ability to ensure that messages and data are available only to those who are authorized to view them
Privacy the ability to control the use of information about oneself
Availability the ability to ensure that an e-commerce site continues to function as intended
SECURITY THREATS IN THE E-COMMERCE ENVIRONMENT
SECURITY THREATS
 Malicious code (malware)
 POTENTIALLY UNWANTED PROGRAMS (PUPS)
 PHISHING
 HACKING, CYBERVANDALISM, AND HACKTIVISM
 DATA BREACHES
 CREDIT CARD FRAUD/THEFT
 IDENTITY FRAUD
 SPOOFING, PHARMING, AND SPAM (JUNK) WEBSITES
 SNIFFING AND MAN-IN-THE-MIDDLE ATTACKS
 DENIAL OF SERVICE (DOS) AND DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS
 INSIDER ATTACKS
 POORLY DESIGNED SOFTWARE
MALICIOUS CODE (MALWARE)
Exploit kit collection of exploits bundled together and rented or sold as a commercial product
Maladvertising online advertising that contains malicious code
Virus a computer program that has the ability to replicate or make copies of itself, and spread to
other files
Worm malware that is designed to spread from computer to computer
Trojan horse appears to be benign, but then does something other than expected. Often a way
for viruses or other malicious code to be introduced into a computer system
Backdoor feature of viruses, worms, and Trojans that allows an attacker to remotely access a
compromised computer
Bot type of malicious code that can be covertly installed on a computer when connected to the
Internet. Once installed, the bot responds to external commands sent by the attacker
Botnet collection of captured bot computer
Drive-by download malware that comes with a downloaded file that a user requests
POTENTIALLY UNWANTED PROGRAMS (PUPS
Adware a PUP that serves pop-up ads to your computer
Browser parasite a program that can monitor and change the
settings of a user’s browser
Spyware a program used to obtain information such as a user’s
keystrokes, e-mail, instant messages, and so on
PHISHING
Social engineering exploitation of human fallibility and
gullibility to distribute malware
Phishing any deceptive, online attempt by a third party
to obtain confidential information for financial gain
HACKING, CYBERVANDALISM, AND HACKTIVISM
Hacker an individual who intends to gain unauthorized access to a computer
system
Cracker within the hacking community, a term typically used to denote a hacker
with criminal intent
Cybervandalism intentionally disrupting, defacing, or even destroying a site
Hacktivism cybervandalism and data theft for political purposes
White hats “good” hackers who help organizations locate and fix security flaws
Black hats hackers who act with the intention of causing harm
Grey hats hackers who believe they are pursuing some greater good by
breaking in and revealing system flaws
DATA BREACHES
Data breach occurs when an
organization loses control over
its information to outsiders
CREDIT CARD FRAUD/THEFT
Theft of credit card data is one of the most
feared occurrences on the Internet. Fear
that credit card information will be stolen
prevents users from making online
purchases
IDENTITY FRAUD
Identity fraud involves the
unauthorized use of another
person’s personal data for illegal
financial benefit
SPOOFING, PHARMING, AND SPAM (JUNK) WEBSITES
Spoofing involves attempting to hide a true identity by using someone else’s
e-mail or IP address
Pharming automatically redirecting a web link to an address different from
the intended one, with the site masquerading as the intended destination
Spam (junk) websites also referred to as link farms; promise to offer
products or services, but in fact are just collections of advertisements
SNIFFING AND MAN-IN-THE-MIDDLE ATTACKS
Sniffer a type of eavesdropping program that monitors information traveling
over a network
Man-in-the-middle (MitM) attack attack in which the attacker is able to
intercept communications between two parties who believe they are directly
communicating with one another, when in fact the attacker is controlling the
communications
DENIAL OF SERVICE (DOS) AND DISTRIBUTED DENIAL OF SERVICE
(DDOS) ATTACKS
Denial of Service (DoS) attack flooding a website with useless
traffic to inundate and overwhelm the network
Distributed Denial of Service (DDoS) attack using numerous
computers to attack the target network from numerous
launch point
INSIDER ATTACKS
Indicate that insiders are more likely
to be the source of cyberattacks
than outsiders, and to cause more
damage to an organization
POORLY DESIGNED SOFTWARE
SQL injection attack takes advantage of poorly coded web application software that
fails to properly validate or filter data entered by a user on a web page
Zero-day vulnerability software vulnerability that has been previously unreported
and for which no patch yet exists
Heartbleed bug flaw in OpenSSL encryption system that allowed hackers to decrypt
an SSL session and discover user names, passwords, and other user data
TITLE LOREM IPSUM DOLOR SIT AMET
2017
Lorem ipsum dolor sit amet
2018
Lorem ipsum dolor sit amet
2019
Lorem ipsum dolor sit amet

More Related Content

What's hot

Introduction to E-Commerce
Introduction to E-CommerceIntroduction to E-Commerce
Introduction to E-Commercefaisal ilyas
 
Building an E-commerce website.ppt
Building an E-commerce website.pptBuilding an E-commerce website.ppt
Building an E-commerce website.pptLilianNjoki2
 
Legal ethical issues E commerce
Legal ethical issues E commerceLegal ethical issues E commerce
Legal ethical issues E commerceWisnu Dewobroto
 
M commerce and its applications
M commerce and its applicationsM commerce and its applications
M commerce and its applicationsAlok Gupta
 
Lecture 10 e-cmmerce marketing and advertising concepts -chapter 6
Lecture 10  e-cmmerce marketing and advertising concepts -chapter 6Lecture 10  e-cmmerce marketing and advertising concepts -chapter 6
Lecture 10 e-cmmerce marketing and advertising concepts -chapter 6Habib Ullah Qamar
 
E Business & E Commerce +
E Business & E Commerce +E Business & E Commerce +
E Business & E Commerce +UMaine
 
1 introduction to e commerce
1 introduction to e commerce1 introduction to e commerce
1 introduction to e commercesajid ullah
 
E-Commerce in Marketing Communications
E-Commerce in Marketing Communications E-Commerce in Marketing Communications
E-Commerce in Marketing Communications Anubha Rastogi
 
E.commerce & Digital marketing
E.commerce & Digital marketingE.commerce & Digital marketing
E.commerce & Digital marketingAnmol Chaturvedi
 
Ecommerce security
Ecommerce securityEcommerce security
Ecommerce securitypolitegcuf
 
E commerce Marketing and Advertising concepts
E commerce Marketing and Advertising conceptsE commerce Marketing and Advertising concepts
E commerce Marketing and Advertising conceptstintingregorio
 

What's hot (20)

E-Commerce Infrastructures
E-Commerce InfrastructuresE-Commerce Infrastructures
E-Commerce Infrastructures
 
E business
E businessE business
E business
 
Introduction to E-Commerce
Introduction to E-CommerceIntroduction to E-Commerce
Introduction to E-Commerce
 
Building an E-commerce website.ppt
Building an E-commerce website.pptBuilding an E-commerce website.ppt
Building an E-commerce website.ppt
 
Legal ethical issues E commerce
Legal ethical issues E commerceLegal ethical issues E commerce
Legal ethical issues E commerce
 
E-marketplace
E-marketplaceE-marketplace
E-marketplace
 
Ecommerce Business Models
Ecommerce Business ModelsEcommerce Business Models
Ecommerce Business Models
 
E commerce
E commerceE commerce
E commerce
 
M commerce and its applications
M commerce and its applicationsM commerce and its applications
M commerce and its applications
 
E-Commerce Security
E-Commerce SecurityE-Commerce Security
E-Commerce Security
 
Lecture 10 e-cmmerce marketing and advertising concepts -chapter 6
Lecture 10  e-cmmerce marketing and advertising concepts -chapter 6Lecture 10  e-cmmerce marketing and advertising concepts -chapter 6
Lecture 10 e-cmmerce marketing and advertising concepts -chapter 6
 
E business
E businessE business
E business
 
E Business & E Commerce +
E Business & E Commerce +E Business & E Commerce +
E Business & E Commerce +
 
1 introduction to e commerce
1 introduction to e commerce1 introduction to e commerce
1 introduction to e commerce
 
E-Commerce in Marketing Communications
E-Commerce in Marketing Communications E-Commerce in Marketing Communications
E-Commerce in Marketing Communications
 
Security in e commerce
Security in e commerceSecurity in e commerce
Security in e commerce
 
E-Commerce 01
E-Commerce 01E-Commerce 01
E-Commerce 01
 
E.commerce & Digital marketing
E.commerce & Digital marketingE.commerce & Digital marketing
E.commerce & Digital marketing
 
Ecommerce security
Ecommerce securityEcommerce security
Ecommerce security
 
E commerce Marketing and Advertising concepts
E commerce Marketing and Advertising conceptsE commerce Marketing and Advertising concepts
E commerce Marketing and Advertising concepts
 

Similar to E-commerce Security and Payment Systems.pptx

Untitled presentation.pptx
Untitled presentation.pptxUntitled presentation.pptx
Untitled presentation.pptxtechanicguy
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsDrPraveenKumar37
 
1 understanding cyber threats
1   understanding cyber threats 1   understanding cyber threats
1 understanding cyber threats mohamad Hamizi
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacyHaider Ali Malik
 
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONSE-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONSrausdeen anfas
 
2_2 DangersComputerCrime.pptx
2_2 DangersComputerCrime.pptx2_2 DangersComputerCrime.pptx
2_2 DangersComputerCrime.pptxChloeLucas4
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRameesha1
 
INTERNET SECURITY.pptx
INTERNET SECURITY.pptxINTERNET SECURITY.pptx
INTERNET SECURITY.pptxbabepa2317
 
Different Types Of Cyber Security Threats
Different Types Of Cyber Security ThreatsDifferent Types Of Cyber Security Threats
Different Types Of Cyber Security ThreatsDaniel Martin
 
8 Different Types of Cybersecurity and Threats Involved
8 Different Types of Cybersecurity and Threats Involved8 Different Types of Cybersecurity and Threats Involved
8 Different Types of Cybersecurity and Threats InvolvedSumitKala7
 
cyber threats and attacks.pptx
cyber threats and attacks.pptxcyber threats and attacks.pptx
cyber threats and attacks.pptxsakshiyad2611
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptxSibyJames1
 

Similar to E-commerce Security and Payment Systems.pptx (20)

Cyber Security.docx
Cyber Security.docxCyber Security.docx
Cyber Security.docx
 
Computer security and
Computer security andComputer security and
Computer security and
 
Untitled presentation.pptx
Untitled presentation.pptxUntitled presentation.pptx
Untitled presentation.pptx
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering students
 
1 understanding cyber threats
1   understanding cyber threats 1   understanding cyber threats
1 understanding cyber threats
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacy
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptx
 
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONSE-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
E-COMMERCE SECURITY, FRAUD ISSUES AND PROTECTIONS
 
2_2 DangersComputerCrime.pptx
2_2 DangersComputerCrime.pptx2_2 DangersComputerCrime.pptx
2_2 DangersComputerCrime.pptx
 
System-Security-acit-Institute
System-Security-acit-InstituteSystem-Security-acit-Institute
System-Security-acit-Institute
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
INTERNET SECURITY.pptx
INTERNET SECURITY.pptxINTERNET SECURITY.pptx
INTERNET SECURITY.pptx
 
Cyber security
Cyber security Cyber security
Cyber security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Different Types Of Cyber Security Threats
Different Types Of Cyber Security ThreatsDifferent Types Of Cyber Security Threats
Different Types Of Cyber Security Threats
 
8 Different Types of Cybersecurity and Threats Involved
8 Different Types of Cybersecurity and Threats Involved8 Different Types of Cybersecurity and Threats Involved
8 Different Types of Cybersecurity and Threats Involved
 
cyber security
cyber security cyber security
cyber security
 
cyber threats and attacks.pptx
cyber threats and attacks.pptxcyber threats and attacks.pptx
cyber threats and attacks.pptx
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptx
 

Recently uploaded

Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdfOrient Homes
 
Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Delhi Call girls
 
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...noida100girls
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Tina Ji
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth MarketingShawn Pang
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
Socio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptxSocio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptxtrishalcan8
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdfCatalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdfOrient Homes
 

Recently uploaded (20)

Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdf
 
Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
 
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
Socio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptxSocio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptx
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdfCatalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
 
KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)
 

E-commerce Security and Payment Systems.pptx

  • 1. E-COMMERCE SECURITY AND PAYMENT SYSTEMS
  • 2. LEARNING OBJECTIVES Understand the scope of e-commerce crime and security problems, Identify the key security threats in the e-commerce environment. Describe how technology helps secure Internet communications channels and protect networks, servers, and clients. Identify the major e-commerce payment systems in use today. Describe the features and functionality of electronic billing presentment and payment systems
  • 4. DIMENSIONS OF E-COMMERCE SECURITY Integrity Nonrepudiation Authenticity Confidentiality Privacy Availability
  • 5. DIMENSIONS OF E-COMMERCE SECURITY Integrity the ability to ensure that information being displayed on a website or transmitted or received over the Internet has not been altered in any way by an unauthorized party Nonrepudiation the ability to ensure that e-commerce participants do not deny (i.e., repudiate) their online actions Authenticity the ability to identify the identity of a person or entity with whom you are dealing on the Interne Confidentiality the ability to ensure that messages and data are available only to those who are authorized to view them Privacy the ability to control the use of information about oneself Availability the ability to ensure that an e-commerce site continues to function as intended
  • 6.
  • 7. SECURITY THREATS IN THE E-COMMERCE ENVIRONMENT
  • 8.
  • 9. SECURITY THREATS  Malicious code (malware)  POTENTIALLY UNWANTED PROGRAMS (PUPS)  PHISHING  HACKING, CYBERVANDALISM, AND HACKTIVISM  DATA BREACHES  CREDIT CARD FRAUD/THEFT  IDENTITY FRAUD  SPOOFING, PHARMING, AND SPAM (JUNK) WEBSITES  SNIFFING AND MAN-IN-THE-MIDDLE ATTACKS  DENIAL OF SERVICE (DOS) AND DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS  INSIDER ATTACKS  POORLY DESIGNED SOFTWARE
  • 10. MALICIOUS CODE (MALWARE) Exploit kit collection of exploits bundled together and rented or sold as a commercial product Maladvertising online advertising that contains malicious code Virus a computer program that has the ability to replicate or make copies of itself, and spread to other files Worm malware that is designed to spread from computer to computer Trojan horse appears to be benign, but then does something other than expected. Often a way for viruses or other malicious code to be introduced into a computer system Backdoor feature of viruses, worms, and Trojans that allows an attacker to remotely access a compromised computer Bot type of malicious code that can be covertly installed on a computer when connected to the Internet. Once installed, the bot responds to external commands sent by the attacker Botnet collection of captured bot computer Drive-by download malware that comes with a downloaded file that a user requests
  • 11. POTENTIALLY UNWANTED PROGRAMS (PUPS Adware a PUP that serves pop-up ads to your computer Browser parasite a program that can monitor and change the settings of a user’s browser Spyware a program used to obtain information such as a user’s keystrokes, e-mail, instant messages, and so on
  • 12. PHISHING Social engineering exploitation of human fallibility and gullibility to distribute malware Phishing any deceptive, online attempt by a third party to obtain confidential information for financial gain
  • 13. HACKING, CYBERVANDALISM, AND HACKTIVISM Hacker an individual who intends to gain unauthorized access to a computer system Cracker within the hacking community, a term typically used to denote a hacker with criminal intent Cybervandalism intentionally disrupting, defacing, or even destroying a site Hacktivism cybervandalism and data theft for political purposes White hats “good” hackers who help organizations locate and fix security flaws Black hats hackers who act with the intention of causing harm Grey hats hackers who believe they are pursuing some greater good by breaking in and revealing system flaws
  • 14. DATA BREACHES Data breach occurs when an organization loses control over its information to outsiders
  • 15. CREDIT CARD FRAUD/THEFT Theft of credit card data is one of the most feared occurrences on the Internet. Fear that credit card information will be stolen prevents users from making online purchases
  • 16. IDENTITY FRAUD Identity fraud involves the unauthorized use of another person’s personal data for illegal financial benefit
  • 17. SPOOFING, PHARMING, AND SPAM (JUNK) WEBSITES Spoofing involves attempting to hide a true identity by using someone else’s e-mail or IP address Pharming automatically redirecting a web link to an address different from the intended one, with the site masquerading as the intended destination Spam (junk) websites also referred to as link farms; promise to offer products or services, but in fact are just collections of advertisements
  • 18. SNIFFING AND MAN-IN-THE-MIDDLE ATTACKS Sniffer a type of eavesdropping program that monitors information traveling over a network Man-in-the-middle (MitM) attack attack in which the attacker is able to intercept communications between two parties who believe they are directly communicating with one another, when in fact the attacker is controlling the communications
  • 19. DENIAL OF SERVICE (DOS) AND DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS Denial of Service (DoS) attack flooding a website with useless traffic to inundate and overwhelm the network Distributed Denial of Service (DDoS) attack using numerous computers to attack the target network from numerous launch point
  • 20. INSIDER ATTACKS Indicate that insiders are more likely to be the source of cyberattacks than outsiders, and to cause more damage to an organization
  • 21. POORLY DESIGNED SOFTWARE SQL injection attack takes advantage of poorly coded web application software that fails to properly validate or filter data entered by a user on a web page Zero-day vulnerability software vulnerability that has been previously unreported and for which no patch yet exists Heartbleed bug flaw in OpenSSL encryption system that allowed hackers to decrypt an SSL session and discover user names, passwords, and other user data
  • 22. TITLE LOREM IPSUM DOLOR SIT AMET 2017 Lorem ipsum dolor sit amet 2018 Lorem ipsum dolor sit amet 2019 Lorem ipsum dolor sit amet