Week:4
Week:4
E-commerce Security
E-commerce Security
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall
The E-commerce Security Environment
Figure 5.1, Page 252
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-2
Table 5.3, Page 254
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-3
The Tension Between Security and
Other Values
 Ease of use
The more security measures added, the more
difficult a site is to use, and the slower it becomes
 Public safety and criminal uses of the
Internet
Use of technology by criminals to plan crimes or
threaten nation-state
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-4
Vulnerable Points in an E-commerce
Transaction
Figure 5.3, Page 257
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-5
Most Common Security Threats in the
E-commerce Environment
 Malicious code (malware, exploits)
Drive-by downloads
Viruses
Worms
Ransomware
Trojan horses
Backdoors
Bots, botnets
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-6
Most Common Security Threats (cont.)
 Potentially unwanted programs (PUPs)
Browser parasites
Adware
Spyware
 Phishing
Social engineering
E-mail scams
Spear-phishing
Identity fraud/theft
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-7
Most Common Security Threats (cont.)
 Hacking
Hackers vs. crackers
Types of hackers: White, black
Hacktivism
 Cybervandalism:
Disrupting, defacing, destroying Web site
 Data breach
Losing control over corporate information to outsiders
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-8
Most Common Security Threats (cont.)
 Spoofing and pharming
 Spam (junk) Web sites (link farms)
 Denial of service (DoS) attack
 Hackers flood site with useless traffic to overwhelm
network
 Distributed denial of service (DDoS) attack
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-9
Most Common Security Threats (cont.)
 Sniffing
 Eavesdropping program that monitors information
traveling over a network
 Insider attacks
 Poorly designed server and client software
 Social network security issues
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-10
Insight on Technology: Class Discussion
Think Your Smartphone Is Secure?
 What types of threats do smartphones face?
 Are there any particular vulnerabilities to this
type of device?
 Are apps more or less likely to be subject to
threats than traditional PC software
programs?
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-11
Technology Solutions
 Protecting Internet communications
Encryption
 Securing channels of communication
SSL, VPNs
 Protecting networks
Firewalls
 Protecting servers and clients
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-12
Tools Available to Achieve Site Security
Figure 5.5, Page 276
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-13
Encryption
 Encryption
 Transforms data into cipher text readable only by sender
and receiver
 Secures stored information and information transmission
 Provides 4 of 6 key dimensions of e-commerce security:
 Message integrity
 Nonrepudiation
 Authentication
 Confidentiality
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-14
Securing Channels of Communication
 Secure Sockets Layer (SSL)
Establishes secure, negotiated client–server
session
 Virtual Private Network (VPN)
Allows remote users to securely access internal
network via the Internet
 Wireless (Wi-Fi) networks
WPA2
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-15
Protecting Networks
 Firewall
 Hardware or software
 Uses security policy to filter packets
 Two main methods:
 Packet filters
 Application gateways
 Proxy servers (proxies)
 Software servers that handle all communications from or
sent to the Internet
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-16
Firewalls and Proxy Servers
Figure 5.11, Page 289
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-17
Protecting Servers and Clients
 Operating system security
enhancements
Upgrades, patches
 Anti-virus software
Easiest and least expensive way to prevent threats
to system integrity
Requires daily updates
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-18

More Related Content

PPT
laudon-traver_ec10_ppt_ch05.ppt
PPT
laudon-traver_ec10_ppt_ch05.ppt
PDF
Laudon_Traver_3E_Chapter5_Final.pdf E-commerceKenneth C. LaudonCarol Guercio ...
PDF
Secure your network to secure your reputation and your income
PDF
04-1 E-commerce Security slides
PPT
Unit 2aa
PDF
PPT
Cisco Managed Security
laudon-traver_ec10_ppt_ch05.ppt
laudon-traver_ec10_ppt_ch05.ppt
Laudon_Traver_3E_Chapter5_Final.pdf E-commerceKenneth C. LaudonCarol Guercio ...
Secure your network to secure your reputation and your income
04-1 E-commerce Security slides
Unit 2aa
Cisco Managed Security

Similar to Understanding Security Measures in E-Commerce Systems (20)

PDF
Cisco Live Cancun PR Session
PPT
Chapter 3: Information Security Framework
PPTX
Information Security for Enterprise
PDF
CompTIA PenTest+ Certification All-in-One Exam Guide (Exam PT0-001) 1st Edition
PPT
E-commerce security.ppt
PPTX
Data Breaches. Are you next? What does the data say?
PPT
Borderware Security Platform
PPT
Information Security Seminar
PPS
www.more.net | University of Missouri
PDF
Web Security Field Guide 1st Edition Steve Kalman
PDF
CompTIA PenTest+ Certification All-in-One Exam Guide (Exam PT0-001) 1st Edition
PDF
Infosec 2014: Risk Analytics: Using Your Data to Solve Security Challenges
DOCX
CHap 13 and 12winsec3e_ppt_ch12(1).pptxSecurity Strategies
PDF
Slicksheet best practicesforkeepingyourhomenetworksecure
PPTX
Chapter 5
PPT
Information Security
PDF
The top 5 basics fundamentals of network security cyberhunter solutions
PDF
Small Business Administration Recommendations
PPTX
What the New OWASP Top 10 2013 and Latest X-Force Report Mean for App Sec
PPT
Partner Zymbian & Fortinet webinar on Web2.0 security
Cisco Live Cancun PR Session
Chapter 3: Information Security Framework
Information Security for Enterprise
CompTIA PenTest+ Certification All-in-One Exam Guide (Exam PT0-001) 1st Edition
E-commerce security.ppt
Data Breaches. Are you next? What does the data say?
Borderware Security Platform
Information Security Seminar
www.more.net | University of Missouri
Web Security Field Guide 1st Edition Steve Kalman
CompTIA PenTest+ Certification All-in-One Exam Guide (Exam PT0-001) 1st Edition
Infosec 2014: Risk Analytics: Using Your Data to Solve Security Challenges
CHap 13 and 12winsec3e_ppt_ch12(1).pptxSecurity Strategies
Slicksheet best practicesforkeepingyourhomenetworksecure
Chapter 5
Information Security
The top 5 basics fundamentals of network security cyberhunter solutions
Small Business Administration Recommendations
What the New OWASP Top 10 2013 and Latest X-Force Report Mean for App Sec
Partner Zymbian & Fortinet webinar on Web2.0 security
Ad

Recently uploaded (20)

PPT
hemostasis and its significance, physiology
PPTX
Cite It Right: A Compact Illustration of APA 7th Edition.pptx
PPTX
Neurology of Systemic disease all systems
PDF
Compact First Student's Book Cambridge Official
PPT
hsl powerpoint resource goyloveh feb 07.ppt
PDF
CHALLENGES FACED BY TEACHERS WHEN TEACHING LEARNERS WITH DEVELOPMENTAL DISABI...
PPTX
principlesofmanagementsem1slides-131211060335-phpapp01 (1).ppt
PDF
Chevening Scholarship Application and Interview Preparation Guide
PDF
Lecture on Viruses: Structure, Classification, Replication, Effects on Cells,...
PDF
fundamentals-of-heat-and-mass-transfer-6th-edition_incropera.pdf
PDF
Horaris_Grups_25-26_Definitiu_15_07_25.pdf
PDF
anganwadi services for the b.sc nursing and GNM
PDF
Health aspects of bilberry: A review on its general benefits
PDF
CAT 2024 VARC One - Shot Revision Marathon by Shabana.pptx.pdf
PPTX
2025 High Blood Pressure Guideline Slide Set.pptx
PDF
0520_Scheme_of_Work_(for_examination_from_2021).pdf
PDF
Everyday Spelling and Grammar by Kathi Wyldeck
PPTX
Key-Features-of-the-SHS-Program-v4-Slides (3) PPT2.pptx
PDF
The TKT Course. Modules 1, 2, 3.for self study
PPTX
Neurological complocations of systemic disease
hemostasis and its significance, physiology
Cite It Right: A Compact Illustration of APA 7th Edition.pptx
Neurology of Systemic disease all systems
Compact First Student's Book Cambridge Official
hsl powerpoint resource goyloveh feb 07.ppt
CHALLENGES FACED BY TEACHERS WHEN TEACHING LEARNERS WITH DEVELOPMENTAL DISABI...
principlesofmanagementsem1slides-131211060335-phpapp01 (1).ppt
Chevening Scholarship Application and Interview Preparation Guide
Lecture on Viruses: Structure, Classification, Replication, Effects on Cells,...
fundamentals-of-heat-and-mass-transfer-6th-edition_incropera.pdf
Horaris_Grups_25-26_Definitiu_15_07_25.pdf
anganwadi services for the b.sc nursing and GNM
Health aspects of bilberry: A review on its general benefits
CAT 2024 VARC One - Shot Revision Marathon by Shabana.pptx.pdf
2025 High Blood Pressure Guideline Slide Set.pptx
0520_Scheme_of_Work_(for_examination_from_2021).pdf
Everyday Spelling and Grammar by Kathi Wyldeck
Key-Features-of-the-SHS-Program-v4-Slides (3) PPT2.pptx
The TKT Course. Modules 1, 2, 3.for self study
Neurological complocations of systemic disease
Ad

Understanding Security Measures in E-Commerce Systems

  • 1. Week:4 Week:4 E-commerce Security E-commerce Security Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall
  • 2. The E-commerce Security Environment Figure 5.1, Page 252 Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-2
  • 3. Table 5.3, Page 254 Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-3
  • 4. The Tension Between Security and Other Values  Ease of use The more security measures added, the more difficult a site is to use, and the slower it becomes  Public safety and criminal uses of the Internet Use of technology by criminals to plan crimes or threaten nation-state Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-4
  • 5. Vulnerable Points in an E-commerce Transaction Figure 5.3, Page 257 Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-5
  • 6. Most Common Security Threats in the E-commerce Environment  Malicious code (malware, exploits) Drive-by downloads Viruses Worms Ransomware Trojan horses Backdoors Bots, botnets Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-6
  • 7. Most Common Security Threats (cont.)  Potentially unwanted programs (PUPs) Browser parasites Adware Spyware  Phishing Social engineering E-mail scams Spear-phishing Identity fraud/theft Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-7
  • 8. Most Common Security Threats (cont.)  Hacking Hackers vs. crackers Types of hackers: White, black Hacktivism  Cybervandalism: Disrupting, defacing, destroying Web site  Data breach Losing control over corporate information to outsiders Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-8
  • 9. Most Common Security Threats (cont.)  Spoofing and pharming  Spam (junk) Web sites (link farms)  Denial of service (DoS) attack  Hackers flood site with useless traffic to overwhelm network  Distributed denial of service (DDoS) attack Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-9
  • 10. Most Common Security Threats (cont.)  Sniffing  Eavesdropping program that monitors information traveling over a network  Insider attacks  Poorly designed server and client software  Social network security issues Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-10
  • 11. Insight on Technology: Class Discussion Think Your Smartphone Is Secure?  What types of threats do smartphones face?  Are there any particular vulnerabilities to this type of device?  Are apps more or less likely to be subject to threats than traditional PC software programs? Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-11
  • 12. Technology Solutions  Protecting Internet communications Encryption  Securing channels of communication SSL, VPNs  Protecting networks Firewalls  Protecting servers and clients Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-12
  • 13. Tools Available to Achieve Site Security Figure 5.5, Page 276 Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-13
  • 14. Encryption  Encryption  Transforms data into cipher text readable only by sender and receiver  Secures stored information and information transmission  Provides 4 of 6 key dimensions of e-commerce security:  Message integrity  Nonrepudiation  Authentication  Confidentiality Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-14
  • 15. Securing Channels of Communication  Secure Sockets Layer (SSL) Establishes secure, negotiated client–server session  Virtual Private Network (VPN) Allows remote users to securely access internal network via the Internet  Wireless (Wi-Fi) networks WPA2 Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-15
  • 16. Protecting Networks  Firewall  Hardware or software  Uses security policy to filter packets  Two main methods:  Packet filters  Application gateways  Proxy servers (proxies)  Software servers that handle all communications from or sent to the Internet Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-16
  • 17. Firewalls and Proxy Servers Figure 5.11, Page 289 Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-17
  • 18. Protecting Servers and Clients  Operating system security enhancements Upgrades, patches  Anti-virus software Easiest and least expensive way to prevent threats to system integrity Requires daily updates Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall Slide 5-18