SlideShare a Scribd company logo
eCommerce:
Security
and Challenges
1
Trends, pitfalls, and where
eCommerce will go in 2016
PRESENTED BY
Inderjit Singh
eCommerce
2016
Outline of the Presentation
• Changing Canvas of E-Commerce
• E-Commerce Challenges
• E-Commerce Security
• Technological Solutions
• Policies and Procedures
Internet Use3
BASED ON REPORTED ACITIVE INTERNET USER DATA AND USER CLAMED MOBLIE INTERNET
TOTAL NUMBER
OF ACTIVE
INTERNET USERS
INTERNET USERS AS A
PERCENTAGE OF THE
TOTAL POPULATION
TOTAL NUMBER OF
ACTIVE MOBILE
INTERNET USERS
MOBILE INTERNET USERS AS
A PERCENTAGE OF THE
TOTAL POPULATION
We are
social
We are
social
We are
social
We are
social
243 M 19% 200M 16%
E-Commerce Market in India
5 E-Tailing Formats in India
Things People Intend to Buy Online
Some idea about what people normally intend to buy online
Rank2Rank1 Rank3 Rank4
• E books
• Designs
• Air Tickets and Train Tickets
• Apparels
• Photos
• Home Appliances
• SEO Services
• Security Services
• Electronic Equipment
Why Consumer Prefer Shopping Online?7
Simple, easy, quick and limited travelling
73% 54% 50% 42% 28%
Time Saving Less Prices More Variety Less Taxes No Crowd
80% of Internet users prefer to buy online for the following main reasons
Quick Stats: E-Commerce Sales (in Cr)
1,20,000
1,00,000
80,000
60,000
40,000
20,000
0
Rs107,600
Rs77,100
Rs55,600
Rs40,300
Rs28,500
Rs21,700
Rs16,600
2009 2011 2012 2013 2014 20152009
Sales
Year
9 E-COMMERCE IN INDIA
PENETRATION OF CATEGORIES
2014 2016
34%
ELECTRONICS
30% APPARELS
& ACCESSORIES
SIZE OF ECOMMERCE
10
ONLINE SHOPPERS IN INDIA AVERAGE REVENUE PER USER
Rs 6000
67%
Increase Rs 10000
2014 2015
40Mn
2014
65Mn
2015
Mobile eCommerce Today
Anytime Access
Gives you the flexibility of
reaching anywhere by the
user.
As you know time had
been the most important
factor in Ecommerce
Browser or App
App allows more
closer reach of the
users.
Android and iOS had
been two majorly
used platform today
Large User – Base
Mobile user base is adding
upto 9 million connections a
month .
90% of the users use mobile
phones for the day today
India stands 11th in the ranking for Online Crime in the World,
constituting 3% of the Global Cyber Crime.
Monday, 15 February 2016
eCommerce
Challenges
14
eCommerce
2016
“The economic growth of any nation and its
security whether internal or external and
competitiveness depends on how well is its
cyberspace secured and protected”.
16
 Gaining and Maintaining Commitment from
Management
 Maintaining IT Resources
 Determining E-Business Applications
 Integrating Internet Technologies and
Existing Business Processes
 Security of information assets
 Legal Considerations
 Rollout of plans and fulfilment of
transactions
Challenges in E-Commerce
17 Challenges in E-Commerce in India
E-Commerce: Challenges
Trusting Others
• Trusting the medium
• Am I connected to the correct web site?
• Is the right person using the other
computer?
• Did the appropriate party send the last
email?
• Did the last message get there in time,
correctly?
eCommerce
Security Threats
19
eCommerce
2016
Growing internet penetration and rising popularity
of online banking have made India a favorite
among the cybercriminals, who target online
financial transactions using malware,”.
Several Major Trends are having Significant Impact on Security20
 End point diversity
 Perimeter virtualization
 Digital activity increase
 Networked users and partners
 Disruptive Attacks
 Malicious Software
 Cross – Channel
Mobile Cloud
Big Data
Social Media
Networked
Value Chains Disruption
Sophisticated Fraud
Infrastructure
Transformation
Threat Landscape
Transformation
Business
Transformation
Authentication
making sure that the message
senders or principles are who
they say they are.
Integrity
making sure that information is not
accidentally or maliciously altered or
corrupted in transit.
Access Control
restricting the use of a
resource to authorized
principles
Non repudiation
ensuring that principals cannot
deny that they sent the
message
Security
Concerns
Security Concerns
Security Threats in the E-commerce Environment
• Three key points of vulnerability:
 Client
 Server
 Communications channel
• Most common threats:
 Malicious code
 Hacking and cyber vandalism
 Credit card fraud/theft
 Spoofing
 Denial of service attacks
 Sniffing
 Insider jobs
Types of Frauds in E-Commerce Marketplace24
• Buyer fraud
○ Credit Card Fraud
○ Reseller Fraud
○ COD/RTO Fraud
○ Product Exchange Fraud
● Seller fraud
○ Reviews/Ratings Fraud
○ Fake Listing
○ Price Abuse (MRP abuse)
○ Brand Infringement
○ Seller Protection Fund Fraud
Risk vs Convenience?
Risk vs Convenience?
Passwords – How many do you have?
University Bank Work login
Email Google Microsoft
Facebook Twitter Instagram
Skype TradeMe Pinterest
Online shops Blogs Online communities
Phone login Utility companies YouTube
http://www.youtube.com/watch?v=Srh_TV_J144
E-commerce Security Tools
eCommerce
Plans and Policies
29
eCommerce
2016
Developing an E-commerce Security Plan32
5
Audit
4
Launch
3
Implement2
Security
Policy1
Risk Assessment
Perform a Risk Assessment
Develop a
Implementation Plan
Perform a
Security Audit
Develop a
Security Policy
Create a
Security Organization

 No specific e-commerce laws and regulations in India
and they are still evolving.
 Info Tech Act 2000 (IT Act 2000) governs the online
issues of e-commerce in India.
 Legal requirements for undertaking e-commerce in
India also involve compliance with other laws like
contract law, Indian penal code, etc.
 Online shopping in India also involves compliance with
the banking and financial norms.
 E-commerce websites in India must ensure privacy
protection, data protection, data security, cyber
security, confidentiality maintenance, etc as well.
Govt. Rules and Regulation & Legal Aspect(IT LAWS)
• Change the password from time to time.
• Don’t keep the protected and sensitive files in folders
that have revealing name.
• Choose passwords with numbers, lower and upper case
letters, 8 digitals long and have special characters.
• Get regular audits (www.comodo.com) – these services
usually come with an icon that you can put in your store and
they have been known to boost sales.
• Apply updates to your shopping carts whenever available.
Basic Ways To Protect Yourself
• Always use https while navigating through your admin area (if
you have SSL installed on your server.
• If you want (and have the option), consider deleting all the
customer credit card details after purchases.
• Sign up with a managed firewall service (www.able-commerce.com)
these services usually come with an icon that you can put in your
store and they have been known to boost sales.
• Choose a shopping cart that can blacklist (block) IP addresses and
users.
Basic Ways To Protect Yourself
Conclusion
• E-commerce has changed the relative importance of time, but as the
pillars of indicator of the country’s economic state that the
importance of time should not be ignored.
• E-commerce is not a kind of new industry, but it is creating a new
economic model.
THANK YOU
Questions?
Email: inderjit.barara@gmail.com

More Related Content

What's hot

Electronic Payment Systems in E Commerce
Electronic Payment Systems in E CommerceElectronic Payment Systems in E Commerce
Electronic Payment Systems in E Commerce
Vinay Chaithanya
 
Electronic Payment System
Electronic Payment SystemElectronic Payment System
Electronic Payment SystemRitesh Goyal
 
Security Threats in E-Commerce
Security Threats in E-CommerceSecurity Threats in E-Commerce
Security Threats in E-Commerce
Dattatreya Reddy Peram
 
overview of electronic payment system
overview of electronic payment system overview of electronic payment system
overview of electronic payment system
Kavitha Ravi
 
Digital signatures and e-Commerce
Digital signatures and e-CommerceDigital signatures and e-Commerce
Digital signatures and e-Commerce
Naveen Jakhar, I.T.S
 
Security issues in e commerce
Security issues in e commerceSecurity issues in e commerce
Security issues in e commerce
sadaf tst
 
E-Commerce
E-CommerceE-Commerce
E-Commerce
Nashwan Doaqan
 
Introduction to E - Commerce
Introduction to E - CommerceIntroduction to E - Commerce
Introduction to E - Commerce
Anoushka Srivastava
 
Network security for E-Commerce
Network security for E-CommerceNetwork security for E-Commerce
Network security for E-Commerce
Hem Pokhrel
 
E business
E businessE business
E business
Raj vardhan
 
E business models
E business modelsE business models
E business models
Madhur Choudhary
 
A presentation on e commerece
A presentation on e commerece A presentation on e commerece
A presentation on e commerece
Swarnima Tiwari
 
Web Security
Web SecurityWeb Security
Web Security
Bharath Manoharan
 
E - Commerce
E - CommerceE - Commerce
E - Commerce
Anoushka Srivastava
 
E payment
E paymentE payment
E payment
Vishal Sancheti
 
e-Commerce
e-Commercee-Commerce
e-Commerce
Iranna Teggi
 
Lecture 6 e-cmmerce , e commerce infrastructure,the internet -chapter 3
Lecture 6  e-cmmerce ,  e commerce infrastructure,the internet -chapter 3Lecture 6  e-cmmerce ,  e commerce infrastructure,the internet -chapter 3
Lecture 6 e-cmmerce , e commerce infrastructure,the internet -chapter 3
Habib Ullah Qamar
 
1 introduction to e commerce
1 introduction to e commerce1 introduction to e commerce
1 introduction to e commerce
sajid ullah
 
E-commerce- Security & Encryption
E-commerce- Security & EncryptionE-commerce- Security & Encryption
E-commerce- Security & EncryptionBiroja
 
Online security and payment system
Online security and payment systemOnline security and payment system
Online security and payment system
Gc university faisalabad
 

What's hot (20)

Electronic Payment Systems in E Commerce
Electronic Payment Systems in E CommerceElectronic Payment Systems in E Commerce
Electronic Payment Systems in E Commerce
 
Electronic Payment System
Electronic Payment SystemElectronic Payment System
Electronic Payment System
 
Security Threats in E-Commerce
Security Threats in E-CommerceSecurity Threats in E-Commerce
Security Threats in E-Commerce
 
overview of electronic payment system
overview of electronic payment system overview of electronic payment system
overview of electronic payment system
 
Digital signatures and e-Commerce
Digital signatures and e-CommerceDigital signatures and e-Commerce
Digital signatures and e-Commerce
 
Security issues in e commerce
Security issues in e commerceSecurity issues in e commerce
Security issues in e commerce
 
E-Commerce
E-CommerceE-Commerce
E-Commerce
 
Introduction to E - Commerce
Introduction to E - CommerceIntroduction to E - Commerce
Introduction to E - Commerce
 
Network security for E-Commerce
Network security for E-CommerceNetwork security for E-Commerce
Network security for E-Commerce
 
E business
E businessE business
E business
 
E business models
E business modelsE business models
E business models
 
A presentation on e commerece
A presentation on e commerece A presentation on e commerece
A presentation on e commerece
 
Web Security
Web SecurityWeb Security
Web Security
 
E - Commerce
E - CommerceE - Commerce
E - Commerce
 
E payment
E paymentE payment
E payment
 
e-Commerce
e-Commercee-Commerce
e-Commerce
 
Lecture 6 e-cmmerce , e commerce infrastructure,the internet -chapter 3
Lecture 6  e-cmmerce ,  e commerce infrastructure,the internet -chapter 3Lecture 6  e-cmmerce ,  e commerce infrastructure,the internet -chapter 3
Lecture 6 e-cmmerce , e commerce infrastructure,the internet -chapter 3
 
1 introduction to e commerce
1 introduction to e commerce1 introduction to e commerce
1 introduction to e commerce
 
E-commerce- Security & Encryption
E-commerce- Security & EncryptionE-commerce- Security & Encryption
E-commerce- Security & Encryption
 
Online security and payment system
Online security and payment systemOnline security and payment system
Online security and payment system
 

Similar to E Commerce -Security Threats and Challenges

Electronic Commerce
Electronic CommerceElectronic Commerce
Electronic Commerce
SanjaySharma1059
 
SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...
SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...
SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...
Prasanna Hegde
 
Oath appsec sf 2015 dem rev. 2
Oath appsec sf 2015 dem rev. 2Oath appsec sf 2015 dem rev. 2
Oath appsec sf 2015 dem rev. 2
Donald Malloy
 
Strong Authentication - Open Source
Strong Authentication - Open SourceStrong Authentication - Open Source
Strong Authentication - Open Source
Donald Malloy
 
E-commerce and Internet Marketing
E-commerce and Internet MarketingE-commerce and Internet Marketing
E-commerce and Internet Marketing
Sheeja Joseph
 
E-commerce Additional Assignment Presentation Group No- 13.pptx
E-commerce Additional Assignment Presentation Group No- 13.pptxE-commerce Additional Assignment Presentation Group No- 13.pptx
E-commerce Additional Assignment Presentation Group No- 13.pptx
RishiJain557686
 
E commerce and types
E commerce and typesE commerce and types
E commerce and types
Knowledge Center Computer
 
Hard problems in mobile commerce
Hard problems in mobile commerceHard problems in mobile commerce
Hard problems in mobile commerce
Pragati Rai
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
Mark Albala
 
Economics project, class 12. CBSE.
Economics project, class 12. CBSE.Economics project, class 12. CBSE.
Economics project, class 12. CBSE.
HrishiKesh59
 
Economics(E-Commerce)Project.pdf
Economics(E-Commerce)Project.pdfEconomics(E-Commerce)Project.pdf
Economics(E-Commerce)Project.pdf
HrishiKesh59
 
e-Commerce Facts and Stats 2015 and Beyond
e-Commerce Facts and Stats 2015 and Beyonde-Commerce Facts and Stats 2015 and Beyond
e-Commerce Facts and Stats 2015 and Beyond
Euro IT Group
 
E commerce ppt
E commerce pptE commerce ppt
E commerce ppt
Karan Singh
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and Compliance
Bankingdotcom
 
1. introduction e business management
1. introduction e business management1. introduction e business management
1. introduction e business management
Jitendra Tomar
 
Use of Advanced Technology in Procurement
Use of Advanced Technology in ProcurementUse of Advanced Technology in Procurement
Use of Advanced Technology in Procurement
Dr Mark Lovatt
 
Creating New Payforit Business Models
Creating New Payforit Business ModelsCreating New Payforit Business Models
Creating New Payforit Business Models
Oxygen8 Group
 

Similar to E Commerce -Security Threats and Challenges (20)

Electronic Commerce
Electronic CommerceElectronic Commerce
Electronic Commerce
 
SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...
SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...
SecureWeb3 - Developing a Comprehensive Cybersecurity Strategy for the Decent...
 
Oath appsec sf 2015 dem rev. 2
Oath appsec sf 2015 dem rev. 2Oath appsec sf 2015 dem rev. 2
Oath appsec sf 2015 dem rev. 2
 
Strong Authentication - Open Source
Strong Authentication - Open SourceStrong Authentication - Open Source
Strong Authentication - Open Source
 
E-commerce and Internet Marketing
E-commerce and Internet MarketingE-commerce and Internet Marketing
E-commerce and Internet Marketing
 
E-commerce Additional Assignment Presentation Group No- 13.pptx
E-commerce Additional Assignment Presentation Group No- 13.pptxE-commerce Additional Assignment Presentation Group No- 13.pptx
E-commerce Additional Assignment Presentation Group No- 13.pptx
 
E commerce and types
E commerce and typesE commerce and types
E commerce and types
 
Chapter7
Chapter7Chapter7
Chapter7
 
Hard problems in mobile commerce
Hard problems in mobile commerceHard problems in mobile commerce
Hard problems in mobile commerce
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
 
Economics project, class 12. CBSE.
Economics project, class 12. CBSE.Economics project, class 12. CBSE.
Economics project, class 12. CBSE.
 
Economics(E-Commerce)Project.pdf
Economics(E-Commerce)Project.pdfEconomics(E-Commerce)Project.pdf
Economics(E-Commerce)Project.pdf
 
e-Commerce Facts and Stats 2015 and Beyond
e-Commerce Facts and Stats 2015 and Beyonde-Commerce Facts and Stats 2015 and Beyond
e-Commerce Facts and Stats 2015 and Beyond
 
Ecommerce (2)
Ecommerce (2)Ecommerce (2)
Ecommerce (2)
 
E commerce ppt
E commerce pptE commerce ppt
E commerce ppt
 
E commerce ppts
E commerce pptsE commerce ppts
E commerce ppts
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and Compliance
 
1. introduction e business management
1. introduction e business management1. introduction e business management
1. introduction e business management
 
Use of Advanced Technology in Procurement
Use of Advanced Technology in ProcurementUse of Advanced Technology in Procurement
Use of Advanced Technology in Procurement
 
Creating New Payforit Business Models
Creating New Payforit Business ModelsCreating New Payforit Business Models
Creating New Payforit Business Models
 

More from Inderjeet Singh

Perils of social media
Perils of social mediaPerils of social media
Perils of social media
Inderjeet Singh
 
Combating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceCombating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial Intelligence
Inderjeet Singh
 
Bitcoin and Ransomware Analysis
Bitcoin and Ransomware AnalysisBitcoin and Ransomware Analysis
Bitcoin and Ransomware Analysis
Inderjeet Singh
 
Ransomware- What you need to know to Safeguard your Data
Ransomware- What you need to know to Safeguard your DataRansomware- What you need to know to Safeguard your Data
Ransomware- What you need to know to Safeguard your Data
Inderjeet Singh
 
E governance and digital india by col inderjit singh
E governance  and digital india by col inderjit singhE governance  and digital india by col inderjit singh
E governance and digital india by col inderjit singh
Inderjeet Singh
 
Challenges in implementating cyber security
Challenges in implementating cyber securityChallenges in implementating cyber security
Challenges in implementating cyber security
Inderjeet Singh
 
Fixed Mobile Convergence
Fixed Mobile ConvergenceFixed Mobile Convergence
Fixed Mobile Convergence
Inderjeet Singh
 

More from Inderjeet Singh (7)

Perils of social media
Perils of social mediaPerils of social media
Perils of social media
 
Combating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceCombating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial Intelligence
 
Bitcoin and Ransomware Analysis
Bitcoin and Ransomware AnalysisBitcoin and Ransomware Analysis
Bitcoin and Ransomware Analysis
 
Ransomware- What you need to know to Safeguard your Data
Ransomware- What you need to know to Safeguard your DataRansomware- What you need to know to Safeguard your Data
Ransomware- What you need to know to Safeguard your Data
 
E governance and digital india by col inderjit singh
E governance  and digital india by col inderjit singhE governance  and digital india by col inderjit singh
E governance and digital india by col inderjit singh
 
Challenges in implementating cyber security
Challenges in implementating cyber securityChallenges in implementating cyber security
Challenges in implementating cyber security
 
Fixed Mobile Convergence
Fixed Mobile ConvergenceFixed Mobile Convergence
Fixed Mobile Convergence
 

Recently uploaded

This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Sanjeev Rampal
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
Himani415946
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
Output determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CCOutput determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CC
ShahulHameed54211
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptxLiving-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
TristanJasperRamos
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
natyesu
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 

Recently uploaded (16)

This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
Output determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CCOutput determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CC
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptxLiving-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 

E Commerce -Security Threats and Challenges

  • 1. eCommerce: Security and Challenges 1 Trends, pitfalls, and where eCommerce will go in 2016 PRESENTED BY Inderjit Singh eCommerce 2016
  • 2. Outline of the Presentation • Changing Canvas of E-Commerce • E-Commerce Challenges • E-Commerce Security • Technological Solutions • Policies and Procedures
  • 3. Internet Use3 BASED ON REPORTED ACITIVE INTERNET USER DATA AND USER CLAMED MOBLIE INTERNET TOTAL NUMBER OF ACTIVE INTERNET USERS INTERNET USERS AS A PERCENTAGE OF THE TOTAL POPULATION TOTAL NUMBER OF ACTIVE MOBILE INTERNET USERS MOBILE INTERNET USERS AS A PERCENTAGE OF THE TOTAL POPULATION We are social We are social We are social We are social 243 M 19% 200M 16%
  • 6. Things People Intend to Buy Online Some idea about what people normally intend to buy online Rank2Rank1 Rank3 Rank4 • E books • Designs • Air Tickets and Train Tickets • Apparels • Photos • Home Appliances • SEO Services • Security Services • Electronic Equipment
  • 7. Why Consumer Prefer Shopping Online?7 Simple, easy, quick and limited travelling 73% 54% 50% 42% 28% Time Saving Less Prices More Variety Less Taxes No Crowd 80% of Internet users prefer to buy online for the following main reasons
  • 8. Quick Stats: E-Commerce Sales (in Cr) 1,20,000 1,00,000 80,000 60,000 40,000 20,000 0 Rs107,600 Rs77,100 Rs55,600 Rs40,300 Rs28,500 Rs21,700 Rs16,600 2009 2011 2012 2013 2014 20152009 Sales Year
  • 9. 9 E-COMMERCE IN INDIA PENETRATION OF CATEGORIES 2014 2016 34% ELECTRONICS 30% APPARELS & ACCESSORIES SIZE OF ECOMMERCE
  • 10. 10 ONLINE SHOPPERS IN INDIA AVERAGE REVENUE PER USER Rs 6000 67% Increase Rs 10000 2014 2015 40Mn 2014 65Mn 2015
  • 11. Mobile eCommerce Today Anytime Access Gives you the flexibility of reaching anywhere by the user. As you know time had been the most important factor in Ecommerce Browser or App App allows more closer reach of the users. Android and iOS had been two majorly used platform today Large User – Base Mobile user base is adding upto 9 million connections a month . 90% of the users use mobile phones for the day today
  • 12. India stands 11th in the ranking for Online Crime in the World, constituting 3% of the Global Cyber Crime. Monday, 15 February 2016
  • 13. eCommerce Challenges 14 eCommerce 2016 “The economic growth of any nation and its security whether internal or external and competitiveness depends on how well is its cyberspace secured and protected”.
  • 14. 16  Gaining and Maintaining Commitment from Management  Maintaining IT Resources  Determining E-Business Applications  Integrating Internet Technologies and Existing Business Processes  Security of information assets  Legal Considerations  Rollout of plans and fulfilment of transactions Challenges in E-Commerce
  • 15. 17 Challenges in E-Commerce in India
  • 16. E-Commerce: Challenges Trusting Others • Trusting the medium • Am I connected to the correct web site? • Is the right person using the other computer? • Did the appropriate party send the last email? • Did the last message get there in time, correctly?
  • 17. eCommerce Security Threats 19 eCommerce 2016 Growing internet penetration and rising popularity of online banking have made India a favorite among the cybercriminals, who target online financial transactions using malware,”.
  • 18. Several Major Trends are having Significant Impact on Security20  End point diversity  Perimeter virtualization  Digital activity increase  Networked users and partners  Disruptive Attacks  Malicious Software  Cross – Channel Mobile Cloud Big Data Social Media Networked Value Chains Disruption Sophisticated Fraud Infrastructure Transformation Threat Landscape Transformation Business Transformation
  • 19. Authentication making sure that the message senders or principles are who they say they are. Integrity making sure that information is not accidentally or maliciously altered or corrupted in transit. Access Control restricting the use of a resource to authorized principles Non repudiation ensuring that principals cannot deny that they sent the message Security Concerns Security Concerns
  • 20. Security Threats in the E-commerce Environment • Three key points of vulnerability:  Client  Server  Communications channel • Most common threats:  Malicious code  Hacking and cyber vandalism  Credit card fraud/theft  Spoofing  Denial of service attacks  Sniffing  Insider jobs
  • 21. Types of Frauds in E-Commerce Marketplace24 • Buyer fraud ○ Credit Card Fraud ○ Reseller Fraud ○ COD/RTO Fraud ○ Product Exchange Fraud ● Seller fraud ○ Reviews/Ratings Fraud ○ Fake Listing ○ Price Abuse (MRP abuse) ○ Brand Infringement ○ Seller Protection Fund Fraud
  • 24. Passwords – How many do you have? University Bank Work login Email Google Microsoft Facebook Twitter Instagram Skype TradeMe Pinterest Online shops Blogs Online communities Phone login Utility companies YouTube http://www.youtube.com/watch?v=Srh_TV_J144
  • 27. Developing an E-commerce Security Plan32 5 Audit 4 Launch 3 Implement2 Security Policy1 Risk Assessment Perform a Risk Assessment Develop a Implementation Plan Perform a Security Audit Develop a Security Policy Create a Security Organization
  • 28.   No specific e-commerce laws and regulations in India and they are still evolving.  Info Tech Act 2000 (IT Act 2000) governs the online issues of e-commerce in India.  Legal requirements for undertaking e-commerce in India also involve compliance with other laws like contract law, Indian penal code, etc.  Online shopping in India also involves compliance with the banking and financial norms.  E-commerce websites in India must ensure privacy protection, data protection, data security, cyber security, confidentiality maintenance, etc as well. Govt. Rules and Regulation & Legal Aspect(IT LAWS)
  • 29. • Change the password from time to time. • Don’t keep the protected and sensitive files in folders that have revealing name. • Choose passwords with numbers, lower and upper case letters, 8 digitals long and have special characters. • Get regular audits (www.comodo.com) – these services usually come with an icon that you can put in your store and they have been known to boost sales. • Apply updates to your shopping carts whenever available. Basic Ways To Protect Yourself
  • 30. • Always use https while navigating through your admin area (if you have SSL installed on your server. • If you want (and have the option), consider deleting all the customer credit card details after purchases. • Sign up with a managed firewall service (www.able-commerce.com) these services usually come with an icon that you can put in your store and they have been known to boost sales. • Choose a shopping cart that can blacklist (block) IP addresses and users. Basic Ways To Protect Yourself
  • 31. Conclusion • E-commerce has changed the relative importance of time, but as the pillars of indicator of the country’s economic state that the importance of time should not be ignored. • E-commerce is not a kind of new industry, but it is creating a new economic model.