10
Most read
11
Most read
15
Most read
E-COMMERCE
TOPIC: - SECURITY
ISSUES IN
E-COMMERCE
SUBMITTED BY:
NIKITA TAHILYANI
•E-Commerce or Electronic Commerce, a subset of E-Business,
is the purchasing, selling and exchanging of goods and
services over computer networks (such as Internet) through
which transactions are performed.
•One of the main roadblocks to the wide acceptance of e-
commerce
by businesses and consumers alike is the perceived lack of
adequate security for on-line transactions.
•Increase in E-commerce has also led to increase in risks and
frauds in the E-business.
•For e.g. Consumers are growing increasingly worried about
providing credit card information over the Internet.
1.Privacy
2.Authentication
3.Authorization
4.Integration
5.Confidentiality
6.Non-repudiation
•Privacy in Ecommerce means that information exchanged
must be kept from unauthorized parties.
•It means that information is intelligible only to its rightful
recipients. Although third parties may be able to read a copy
of the message sent, they must not be able to make sense of
it.
•It is the biggest threat in security .
•Privacy is for “people” and confidentiality is for
“information”
•Examples are breach of site collects names, physical and
email addresses, IP address , payment details etc.
Privacy:
Security issues in E-commerce
•Authentication is the process of establishing confidence in user
identities electronically presented to an information system.
• Digital or e-authentication may be used synonymously when referring
to the authentication process that confirms or certifies a person's
identity and works.
•User proves his authorization to an information system and information
system has to confirm his identity.
•Example – Setting Password in any account
Security issues in E-commerce
Authorization:
•Authorization is a security mechanism to determine access
levels or user/client privileges related to system resources
including files, services, computer programs, data and
application features.
•It is the process of granting or denying access to a network
resource which allows the user access to various resources
based on the user's identity.
•Example – access to file directories, storage space, hours
allocated etc
Security issues in E-commerce
Integrity:
•Integrity in security means maintaining the accuracy, and
completeness of data.
• It is about protecting data from being modified or misused
by an unauthorized party. Integrity involves maintaining the
consistency and trustworthiness of data over its entire life
cycle.
•Example- A random user could try to enter a phone number
into a date field. If the system enforces data integrity, it will
prevent the user from making these mistakes.
Confidentiality:
•Confidentiality means that data, objects and resources are
protected from unauthorized viewing and other access.
•It means keeping the information between you and the
client.
•Confidential information often has value and systems are
therefore under frequent attack as criminals hunt for
vulnerabilities to exploit. Threat vectors include direct attacks
such as stealing passwords and capturing network traffic, and
more layered attacks such as social engineering and phishing.
•Example- Superior doesn’t tell subordinates about data of
client unless he has the permission from client.
Security issues in E-commerce
Non-repudiation:
•Non-repudiation is the assurance that someone cannot deny the
validity of something.
• It is the inability to refute responsibility
•It refers to the assurance that the owner of a signature key pair that
was capable of generating an existing signature corresponding to certain
data cannot convincingly deny having signed the data.
•For example- If you take a pen and sign a contract your signature is
a non repudiation device. You cannot later disagree to the terms of the
contract or refute ever taking party to the agreement.
Security issues in E-commerce
Ways to protect ecommerce site
from security threats:
•Choose a secure ecommerce platform.
•Use a secure connection for checkout (SSL) .
•Don't store sensitive user data.
•Request strong passwords from your users.
•Setup system alerts for suspicious activities.
•Use tracking numbers for all orders.
•Always backup your system and database.
•Use anti virus softwares and anti-malwares
•Deactivating auto-fills.
•Updating cookies.
•Encrypt and decrypt security and use two step verification methods.
Security issues in E-commerce
Security issues in E-commerce

More Related Content

PPTX
E-commerce- Security & Encryption
PPTX
Security issues in e commerce
PPTX
Security Threats in E-Commerce
PPT
E-Commerce Security
PPT
E Commerce Basics
PDF
E Commerce -Security Threats and Challenges
PPT
E commerce security
PPTX
Security in E-commerce
E-commerce- Security & Encryption
Security issues in e commerce
Security Threats in E-Commerce
E-Commerce Security
E Commerce Basics
E Commerce -Security Threats and Challenges
E commerce security
Security in E-commerce

What's hot (20)

PPTX
e payment system ppt
PPTX
Electronic payment system
PPTX
E commerce (edi)
PPTX
Electronic Payment Systems in E Commerce
PPTX
Industry framework of e commerce
PPT
Chapter 8 / Electronic Payment
PPTX
Electronic or digital cash
PDF
Consumer Oriented E commerce Application
PPT
e-commerce
PPTX
Electronic payment system(EPS)
PPTX
digital tokens based on E-payments
PPTX
electronic payment system
PPTX
Digital signatures and e-Commerce
PPT
Edi ppt
PPT
PDF
Network security for E-Commerce
PPTX
Network security and firewalls
PPTX
History of E commerce- Brief History
PPTX
E business models
PPTX
Electronic Payment System
e payment system ppt
Electronic payment system
E commerce (edi)
Electronic Payment Systems in E Commerce
Industry framework of e commerce
Chapter 8 / Electronic Payment
Electronic or digital cash
Consumer Oriented E commerce Application
e-commerce
Electronic payment system(EPS)
digital tokens based on E-payments
electronic payment system
Digital signatures and e-Commerce
Edi ppt
Network security for E-Commerce
Network security and firewalls
History of E commerce- Brief History
E business models
Electronic Payment System
Ad

Similar to Security issues in E-commerce (20)

PPTX
protection & security of e-commerce ...
PPTX
Security for e commerce
PPTX
E-commerce-Security-_20250212_131135_0000.pptx
PDF
IRJET - Data Privacy,Trust Issues and Solutions in Electronic Commerce
DOCX
Analysis the attack and E-commerce security
PPTX
E commerce-securityy
PPTX
Risks & secutiry in e commerce
PPTX
Security Environment in Online Systems and Issues
PPT
Maloney Slides
PPTX
E- Commerce presentation related with legal cases in industry
PPTX
E commerce security
PDF
A security requirement quality
PPTX
PPTX
laudon-traver-ec17-ppt-ch05-accessible-dg-revised-hw1z.pptx
PPTX
laudon-traver-ec17-ppt-ch05-accessible-dg-revised-hw1z.pptx
PPTX
laudon-traver-ec17-ppt-ch05-accessible-dg-revised-hw1z.pptx
PPT
Principles of Electronic Commerce_Unit_III.ppt
PPTX
Security Threats which security threat is any potential danger that can explo...
PDF
E-Commerce Privacy and Security System
protection & security of e-commerce ...
Security for e commerce
E-commerce-Security-_20250212_131135_0000.pptx
IRJET - Data Privacy,Trust Issues and Solutions in Electronic Commerce
Analysis the attack and E-commerce security
E commerce-securityy
Risks & secutiry in e commerce
Security Environment in Online Systems and Issues
Maloney Slides
E- Commerce presentation related with legal cases in industry
E commerce security
A security requirement quality
laudon-traver-ec17-ppt-ch05-accessible-dg-revised-hw1z.pptx
laudon-traver-ec17-ppt-ch05-accessible-dg-revised-hw1z.pptx
laudon-traver-ec17-ppt-ch05-accessible-dg-revised-hw1z.pptx
Principles of Electronic Commerce_Unit_III.ppt
Security Threats which security threat is any potential danger that can explo...
E-Commerce Privacy and Security System
Ad

Recently uploaded (20)

DOCX
Powerful Ways AIRCONNECT INFOSYSTEMS Pvt Ltd Enhances IT Infrastructure in In...
PPTX
Top Website Bugs That Hurt User Experience – And How Expert Web Design Fixes
PPTX
COPD_Management_Exacerbation_Detailed_Placeholders.pptx
PPTX
using the citation of Research to create a research
PPTX
Concepts of Object Oriented Programming.
PPTX
在线订购名古屋艺术大学毕业证, buy NUA diploma学历认证失败怎么办
PPTX
Viva Digitally Software-Defined Wide Area Network.pptx
PDF
Public for study about wiring to confirm.
PPTX
curriculumandpedagogyinearlychildhoodcurriculum-171021103104 - Copy.pptx
PDF
JuanConnect E-Wallet Guide for new users.pdf
PDF
KEY COB2 UNIT 1: The Business of businessĐH KInh tế TP.HCM
PPTX
最新版美国埃默里大学毕业证(Emory毕业证书)原版定制文凭学历认证
DOCX
Memecoinist Update: Best Meme Coins 2025, Trump Meme Coin Predictions, and th...
PPTX
Introduction to networking local area networking
PPTX
IT-Human Computer Interaction Report.pptx
PDF
Buy Cash App Verified Accounts Instantly – Secure Crypto Deal.pdf
PDF
Virtual Guard Technology Provider_ Remote Security Service Solutions.pdf
PDF
Course Overview and Agenda cloud security
PPTX
KSS ON CYBERSECURITY INCIDENT RESPONSE AND PLANNING MANAGEMENT.pptx
PDF
ilide.info-huawei-odn-solution-introduction-pdf-pr_a17152ead66ea2617ffbd01e8c...
Powerful Ways AIRCONNECT INFOSYSTEMS Pvt Ltd Enhances IT Infrastructure in In...
Top Website Bugs That Hurt User Experience – And How Expert Web Design Fixes
COPD_Management_Exacerbation_Detailed_Placeholders.pptx
using the citation of Research to create a research
Concepts of Object Oriented Programming.
在线订购名古屋艺术大学毕业证, buy NUA diploma学历认证失败怎么办
Viva Digitally Software-Defined Wide Area Network.pptx
Public for study about wiring to confirm.
curriculumandpedagogyinearlychildhoodcurriculum-171021103104 - Copy.pptx
JuanConnect E-Wallet Guide for new users.pdf
KEY COB2 UNIT 1: The Business of businessĐH KInh tế TP.HCM
最新版美国埃默里大学毕业证(Emory毕业证书)原版定制文凭学历认证
Memecoinist Update: Best Meme Coins 2025, Trump Meme Coin Predictions, and th...
Introduction to networking local area networking
IT-Human Computer Interaction Report.pptx
Buy Cash App Verified Accounts Instantly – Secure Crypto Deal.pdf
Virtual Guard Technology Provider_ Remote Security Service Solutions.pdf
Course Overview and Agenda cloud security
KSS ON CYBERSECURITY INCIDENT RESPONSE AND PLANNING MANAGEMENT.pptx
ilide.info-huawei-odn-solution-introduction-pdf-pr_a17152ead66ea2617ffbd01e8c...

Security issues in E-commerce

  • 1. E-COMMERCE TOPIC: - SECURITY ISSUES IN E-COMMERCE SUBMITTED BY: NIKITA TAHILYANI
  • 2. •E-Commerce or Electronic Commerce, a subset of E-Business, is the purchasing, selling and exchanging of goods and services over computer networks (such as Internet) through which transactions are performed. •One of the main roadblocks to the wide acceptance of e- commerce by businesses and consumers alike is the perceived lack of adequate security for on-line transactions. •Increase in E-commerce has also led to increase in risks and frauds in the E-business. •For e.g. Consumers are growing increasingly worried about providing credit card information over the Internet.
  • 4. •Privacy in Ecommerce means that information exchanged must be kept from unauthorized parties. •It means that information is intelligible only to its rightful recipients. Although third parties may be able to read a copy of the message sent, they must not be able to make sense of it. •It is the biggest threat in security . •Privacy is for “people” and confidentiality is for “information” •Examples are breach of site collects names, physical and email addresses, IP address , payment details etc. Privacy:
  • 6. •Authentication is the process of establishing confidence in user identities electronically presented to an information system. • Digital or e-authentication may be used synonymously when referring to the authentication process that confirms or certifies a person's identity and works. •User proves his authorization to an information system and information system has to confirm his identity. •Example – Setting Password in any account
  • 8. Authorization: •Authorization is a security mechanism to determine access levels or user/client privileges related to system resources including files, services, computer programs, data and application features. •It is the process of granting or denying access to a network resource which allows the user access to various resources based on the user's identity. •Example – access to file directories, storage space, hours allocated etc
  • 10. Integrity: •Integrity in security means maintaining the accuracy, and completeness of data. • It is about protecting data from being modified or misused by an unauthorized party. Integrity involves maintaining the consistency and trustworthiness of data over its entire life cycle. •Example- A random user could try to enter a phone number into a date field. If the system enforces data integrity, it will prevent the user from making these mistakes.
  • 11. Confidentiality: •Confidentiality means that data, objects and resources are protected from unauthorized viewing and other access. •It means keeping the information between you and the client. •Confidential information often has value and systems are therefore under frequent attack as criminals hunt for vulnerabilities to exploit. Threat vectors include direct attacks such as stealing passwords and capturing network traffic, and more layered attacks such as social engineering and phishing. •Example- Superior doesn’t tell subordinates about data of client unless he has the permission from client.
  • 13. Non-repudiation: •Non-repudiation is the assurance that someone cannot deny the validity of something. • It is the inability to refute responsibility •It refers to the assurance that the owner of a signature key pair that was capable of generating an existing signature corresponding to certain data cannot convincingly deny having signed the data. •For example- If you take a pen and sign a contract your signature is a non repudiation device. You cannot later disagree to the terms of the contract or refute ever taking party to the agreement.
  • 15. Ways to protect ecommerce site from security threats: •Choose a secure ecommerce platform. •Use a secure connection for checkout (SSL) . •Don't store sensitive user data. •Request strong passwords from your users. •Setup system alerts for suspicious activities. •Use tracking numbers for all orders. •Always backup your system and database. •Use anti virus softwares and anti-malwares •Deactivating auto-fills. •Updating cookies. •Encrypt and decrypt security and use two step verification methods.